Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/compsec/compsec23.bht:"
@article{DBLP:journals/compsec/AljifriN04, author = {Hassan Aljifri and Diego S{\'{a}}nchez Navarro}, title = {Search engines and privacy}, journal = {Comput. Secur.}, volume = {23}, number = {5}, pages = {379--388}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2003.11.004}, doi = {10.1016/J.COSE.2003.11.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AljifriN04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ApvrilleP04, author = {Axelle Apvrille and Makan Pourzandi}, title = {{XML} distributed security policy for clusters}, journal = {Comput. Secur.}, volume = {23}, number = {8}, pages = {649--658}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.09.006}, doi = {10.1016/J.COSE.2004.09.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ApvrilleP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Artail04, author = {Hassan Artail}, title = {Peer-assisted carrying authentication {(PACA)}}, journal = {Comput. Secur.}, volume = {23}, number = {6}, pages = {478--488}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.04.003}, doi = {10.1016/J.COSE.2004.04.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Artail04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Aslan04, author = {Heba Kamal Aslan}, title = {Logical analysis of AUTHMAC{\_}DH: a new protocol for authentication and key distribution}, journal = {Comput. Secur.}, volume = {23}, number = {4}, pages = {290--299}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2003.11.002}, doi = {10.1016/J.COSE.2003.11.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Aslan04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Aslan04a, author = {Heba Kamal Aslan}, title = {A scalable and distributed multicast security protocol using a subgroup-key hierarchy}, journal = {Comput. Secur.}, volume = {23}, number = {4}, pages = {320--329}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2003.11.003}, doi = {10.1016/J.COSE.2003.11.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Aslan04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Aslan04b, author = {Heba Kamal Aslan}, title = {A hybrid scheme for multicast authentication over lossy networks}, journal = {Comput. Secur.}, volume = {23}, number = {8}, pages = {705--713}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.06.010}, doi = {10.1016/J.COSE.2004.06.010}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Aslan04b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BaumerEP04, author = {David L. Baumer and Julia Brande Earp and J. C. Poindexter}, title = {Internet privacy law: a comparison between the United States and the European Union}, journal = {Comput. Secur.}, volume = {23}, number = {5}, pages = {400--412}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2003.11.001}, doi = {10.1016/J.COSE.2003.11.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BaumerEP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Beghdad04, author = {Rachid Beghdad}, title = {Modelling and solving the intrusion detection problem in computer networks}, journal = {Comput. Secur.}, volume = {23}, number = {8}, pages = {687--696}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.05.007}, doi = {10.1016/J.COSE.2004.05.007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Beghdad04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BesnardA04, author = {Denis Besnard and Budi Arief}, title = {Computer security impaired by legitimate users}, journal = {Comput. Secur.}, volume = {23}, number = {3}, pages = {253--264}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2003.09.002}, doi = {10.1016/J.COSE.2003.09.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BesnardA04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Chen04, author = {Tzer{-}Shyong Chen}, title = {An English auction scheme in the online transaction environment}, journal = {Comput. Secur.}, volume = {23}, number = {5}, pages = {389--399}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.02.002}, doi = {10.1016/J.COSE.2004.02.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Chen04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChenJC04, author = {Yu{-}Yi Chen and Jinn{-}ke Jan and Chin{-}Ling Chen}, title = {The design of a secure anonymous Internet voting system}, journal = {Comput. Secur.}, volume = {23}, number = {4}, pages = {330--337}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.01.015}, doi = {10.1016/J.COSE.2004.01.015}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChenJC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChenLC04, author = {Li{-}Chiou Chen and Thomas A. Longstaff and Kathleen M. Carley}, title = {Characterization of defense mechanisms against distributed denial of service attacks}, journal = {Comput. Secur.}, volume = {23}, number = {8}, pages = {665--678}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.06.008}, doi = {10.1016/J.COSE.2004.06.008}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ChenLC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChoC04, author = {Sanghyun Cho and Sung Deok Cha}, title = {{SAD:} web session anomaly detection based on parameter estimation}, journal = {Comput. Secur.}, volume = {23}, number = {4}, pages = {312--319}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.01.006}, doi = {10.1016/J.COSE.2004.01.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChoC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CoetzeeE04, author = {Marijke Coetzee and Jan H. P. Eloff}, title = {Towards Web Service access control}, journal = {Comput. Secur.}, volume = {23}, number = {7}, pages = {559--570}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.05.006}, doi = {10.1016/J.COSE.2004.05.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/CoetzeeE04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CournaneH04, author = {Allister Cournane and Ray Hunt}, title = {An analysis of the tools used for the generation and prevention of spam}, journal = {Comput. Secur.}, volume = {23}, number = {2}, pages = {154--166}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2003.10.001}, doi = {10.1016/J.COSE.2003.10.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/CournaneH04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DeMaraR04, author = {Ronald F. DeMara and Adam J. Rocke}, title = {Mitigation of network tampering using dynamic dispatch of mobile agents}, journal = {Comput. Secur.}, volume = {23}, number = {1}, pages = {31--42}, year = {2004}, url = {https://doi.org/10.1016/S0167-4048(04)00068-9}, doi = {10.1016/S0167-4048(04)00068-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DeMaraR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FengGGGL04, author = {Li Feng and Xiaohong Guan and Sangang Guo and Yan Gao and Peini Liu}, title = {Predicting the intrusion intentions by observing system call sequences}, journal = {Comput. Secur.}, volume = {23}, number = {3}, pages = {241--252}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.01.016}, doi = {10.1016/J.COSE.2004.01.016}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/FengGGGL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hofmeyr04, author = {Steven A. Hofmeyr}, title = {The implications of immunology for secure systems design}, journal = {Comput. Secur.}, volume = {23}, number = {6}, pages = {453--455}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.06.006}, doi = {10.1016/J.COSE.2004.06.006}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Hofmeyr04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HuM04, author = {Ji Hu and Christoph Meinel}, title = {Tele-Lab "IT-Security" on {CD:} portable, reliable and safe {IT} security training}, journal = {Comput. Secur.}, volume = {23}, number = {4}, pages = {282--289}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.02.005}, doi = {10.1016/J.COSE.2004.02.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HuM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HwangC04, author = {Gwan{-}Hwan Hwang and Tao{-}Ku Chang}, title = {An operational model and language support for securing {XML} documents}, journal = {Comput. Secur.}, volume = {23}, number = {6}, pages = {498--529}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.03.003}, doi = {10.1016/J.COSE.2004.03.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HwangC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HwangC04a, author = {Shin{-}Jia Hwang and Ching{-}Chung Chan}, title = {Improvement on Li et al.'s generalization of proxy signature schemes}, journal = {Comput. Secur.}, volume = {23}, number = {7}, pages = {615--619}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.06.003}, doi = {10.1016/J.COSE.2004.06.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HwangC04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Iheagwara04, author = {Charles Iheagwara}, title = {The effect of intrusion detection management methods on the return on investment}, journal = {Comput. Secur.}, volume = {23}, number = {3}, pages = {213--228}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2003.09.006}, doi = {10.1016/J.COSE.2003.09.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Iheagwara04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JeonCKL04, author = {Jae{-}Myeong Jeon and Yon Dohn Chung and Myoung{-}Ho Kim and Yoon{-}Joon Lee}, title = {Filtering XPath expressions for {XML} access control}, journal = {Comput. Secur.}, volume = {23}, number = {7}, pages = {591--605}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.06.009}, doi = {10.1016/J.COSE.2004.06.009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JeonCKL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JiangPL04, author = {Rui Jiang and Li Pan and Jianhua Li}, title = {Further analysis of password authentication schemes based on authentication tests}, journal = {Comput. Secur.}, volume = {23}, number = {6}, pages = {469--477}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.04.002}, doi = {10.1016/J.COSE.2004.04.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JiangPL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JinLG04, author = {Andrew Teoh Beng Jin and David Ngo Chek Ling and Alwyn Goh}, title = {Personalised cryptographic key generation based on FaceHashing}, journal = {Comput. Secur.}, volume = {23}, number = {7}, pages = {606--614}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.06.002}, doi = {10.1016/J.COSE.2004.06.002}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/JinLG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Juang04, author = {Wen{-}Shenq Juang}, title = {Efficient password authenticated key agreement using smart cards}, journal = {Comput. Secur.}, volume = {23}, number = {2}, pages = {167--173}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2003.11.005}, doi = {10.1016/J.COSE.2003.11.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Juang04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/King04, author = {Stuart King}, title = {Applying application security standards - a case study}, journal = {Comput. Secur.}, volume = {23}, number = {1}, pages = {17--21}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.01.005}, doi = {10.1016/J.COSE.2004.01.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/King04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Leach04, author = {John Leach}, title = {{TBSE} - an engineering approach to the design of accurate and reliable security systems}, journal = {Comput. Secur.}, volume = {23}, number = {1}, pages = {22--28}, year = {2004}, url = {https://doi.org/10.1016/S0167-4048(04)00069-0}, doi = {10.1016/S0167-4048(04)00069-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Leach04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LeeHL04, author = {Tian{-}Fu Lee and Tzonelih Hwang and Chun{-}Li Lin}, title = {Enhanced three-party encrypted key exchange without server public keys}, journal = {Comput. Secur.}, volume = {23}, number = {7}, pages = {571--577}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.06.007}, doi = {10.1016/J.COSE.2004.06.007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LeeHL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LekkasG04, author = {Dimitrios Lekkas and Dimitris Gritzalis}, title = {Cumulative notarization for long-term preservation of digital signatures}, journal = {Comput. Secur.}, volume = {23}, number = {5}, pages = {413--424}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.03.002}, doi = {10.1016/J.COSE.2004.03.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LekkasG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Li04, author = {Ming Li}, title = {An approach to reliably identifying signs of {DDOS} flood attacks based on {LRD} traffic pattern recognition}, journal = {Comput. Secur.}, volume = {23}, number = {7}, pages = {549--558}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.04.005}, doi = {10.1016/J.COSE.2004.04.005}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Li04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Liaw04, author = {Horng{-}Twu Liaw}, title = {A secure electronic voting protocol for general elections}, journal = {Comput. Secur.}, volume = {23}, number = {2}, pages = {107--119}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.01.007}, doi = {10.1016/J.COSE.2004.01.007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Liaw04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LinCC04, author = {Min{-}Hui Lin and Chin{-}Chen Chang and Yan{-}Ren Chen}, title = {A fair and secure mobile agent environment based on blind signature and proxy host}, journal = {Comput. Secur.}, volume = {23}, number = {3}, pages = {199--212}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.01.008}, doi = {10.1016/J.COSE.2004.01.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LinCC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LopezOP04, author = {Javier L{\'{o}}pez and Rolf Oppliger and G{\"{u}}nther Pernul}, title = {Authentication and authorization infrastructures (AAIs): a comparative survey}, journal = {Comput. Secur.}, volume = {23}, number = {7}, pages = {578--590}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.06.013}, doi = {10.1016/J.COSE.2004.06.013}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LopezOP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/McKenna04, author = {Brian McKenna}, title = {Erratum to "Attacks on the (enhanced) Yang-Shieh authentication" [Comput Secur 22(8) {(2003)} 725-727]}, journal = {Comput. Secur.}, volume = {23}, number = {1}, pages = {85}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.01.001}, doi = {10.1016/J.COSE.2004.01.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/McKenna04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MoitraK04, author = {Soumyo D. Moitra and Suresh L. Konda}, title = {An empirical investigation of network attacks on computer systems}, journal = {Comput. Secur.}, volume = {23}, number = {1}, pages = {43--51}, year = {2004}, url = {https://doi.org/10.1016/S0167-4048(04)00067-7}, doi = {10.1016/S0167-4048(04)00067-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MoitraK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MoonPPB04, author = {Chang{-}Joo Moon and Dae{-}Ha Park and Soung{-}Jin Park and Doo{-}Kwon Baik}, title = {Symmetric {RBAC} model that takes the separation of duty and role hierarchies into consideration}, journal = {Comput. Secur.}, volume = {23}, number = {2}, pages = {126--136}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2003.09.004}, doi = {10.1016/J.COSE.2003.09.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MoonPPB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NooreTH04, author = {Afzel Noore and Nikhil Tungala and Max M. Houck}, title = {Embedding biometric identifiers in 2D barcodes for improved security}, journal = {Comput. Secur.}, volume = {23}, number = {8}, pages = {679--686}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.09.007}, doi = {10.1016/J.COSE.2004.09.007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/NooreTH04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PeyravianRZ04, author = {Mohammad Peyravian and Allen Roginsky and Nevenko Zunic}, title = {Non-PKI methods for public key distribution}, journal = {Comput. Secur.}, volume = {23}, number = {2}, pages = {97--103}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.01.011}, doi = {10.1016/J.COSE.2004.01.011}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/PeyravianRZ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PosthumusS04, author = {Shaun Posthumus and Rossouw von Solms}, title = {A framework for the governance of information security}, journal = {Comput. Secur.}, volume = {23}, number = {8}, pages = {638--646}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.10.006}, doi = {10.1016/J.COSE.2004.10.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/PosthumusS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Purser04, author = {Steve Purser}, title = {Improving the {ROI} of the security management process}, journal = {Comput. Secur.}, volume = {23}, number = {7}, pages = {542--546}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.09.004}, doi = {10.1016/J.COSE.2004.09.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Purser04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RogersS04, author = {Marcus K. Rogers and Kate Seigfried}, title = {The future of computer forensics: a needs analysis survey}, journal = {Comput. Secur.}, volume = {23}, number = {1}, pages = {12--16}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.01.003}, doi = {10.1016/J.COSE.2004.01.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RogersS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Schultz04, author = {E. Eugene Schultz}, title = {Security training and awareness - fitting a square peg in a round hole}, journal = {Comput. Secur.}, volume = {23}, number = {1}, pages = {1--2}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.01.002}, doi = {10.1016/J.COSE.2004.01.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Schultz04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Schultz04a, author = {E. Eugene Schultz}, title = {Incident response teams need to change}, journal = {Comput. Secur.}, volume = {23}, number = {2}, pages = {87--88}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.01.009}, doi = {10.1016/J.COSE.2004.01.009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Schultz04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Schultz04b, author = {E. Eugene Schultz}, title = {Worms and viruses: are we losing control?}, journal = {Comput. Secur.}, volume = {23}, number = {3}, pages = {179--180}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.04.001}, doi = {10.1016/J.COSE.2004.04.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Schultz04b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Schultz04c, author = {E. Eugene Schultz}, title = {Security views}, journal = {Comput. Secur.}, volume = {23}, number = {3}, pages = {181--190}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.03.001}, doi = {10.1016/J.COSE.2004.03.001}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Schultz04c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Schultz04d, author = {E. Eugene Schultz}, title = {Intrusion prevention}, journal = {Comput. Secur.}, volume = {23}, number = {4}, pages = {265--266}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.04.004}, doi = {10.1016/J.COSE.2004.04.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Schultz04d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Schultz04e, author = {E. Eugene Schultz}, title = {Security views}, journal = {Comput. Secur.}, volume = {23}, number = {4}, pages = {267--274}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.05.001}, doi = {10.1016/J.COSE.2004.05.001}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Schultz04e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Schultz04f, author = {E. Eugene Schultz}, title = {Sarbanes-Oxley - a huge boon to information security in the {US}}, journal = {Comput. Secur.}, volume = {23}, number = {5}, pages = {353--354}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.05.004}, doi = {10.1016/J.COSE.2004.05.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Schultz04f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Schultz04g, author = {E. Eugene Schultz}, title = {Security views}, journal = {Comput. Secur.}, volume = {23}, number = {5}, pages = {355--361}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.06.001}, doi = {10.1016/J.COSE.2004.06.001}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Schultz04g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Schultz04h, author = {E. Eugene Schultz}, title = {The case for one-time credentials}, journal = {Comput. Secur.}, volume = {23}, number = {6}, pages = {441--442}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.08.001}, doi = {10.1016/J.COSE.2004.08.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Schultz04h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Schultz04i, author = {E. Eugene Schultz}, title = {The gap between cryptography and information security: has it narrowed?}, journal = {Comput. Secur.}, volume = {23}, number = {7}, pages = {531--532}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.09.001}, doi = {10.1016/J.COSE.2004.09.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Schultz04i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Schultz04j, author = {E. Eugene Schultz}, title = {Security views}, journal = {Comput. Secur.}, volume = {23}, number = {7}, pages = {533--541}, year = {2004}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Schultz04j.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Schultz04k, author = {E. Eugene Schultz}, title = {Is the {U.S.} government really getting serious about information security?}, journal = {Comput. Secur.}, volume = {23}, number = {8}, pages = {621--622}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.10.009}, doi = {10.1016/J.COSE.2004.10.009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Schultz04k.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SerafimW04, author = {Vin{\'{\i}}cius da Silveira Serafim and Raul Fernando Weber}, title = {Restraining and repairing file system damage through file integrity control}, journal = {Comput. Secur.}, volume = {23}, number = {1}, pages = {52--62}, year = {2004}, url = {https://doi.org/10.1016/S0167-4048(04)00066-5}, doi = {10.1016/S0167-4048(04)00066-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SerafimW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SolmsM04, author = {Sebastiaan H. von Solms and Emil Marais}, title = {From secure wired networks to secure wireless networks - what are the extra risks?}, journal = {Comput. Secur.}, volume = {23}, number = {8}, pages = {633--637}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.09.005}, doi = {10.1016/J.COSE.2004.09.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SolmsM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SolmsS04, author = {Rossouw von Solms and Sebastiaan H. von Solms}, title = {From policies to culture}, journal = {Comput. Secur.}, volume = {23}, number = {4}, pages = {275--279}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.01.013}, doi = {10.1016/J.COSE.2004.01.013}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SolmsS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SolmsS04a, author = {Sebastiaan H. von Solms and Rossouw von Solms}, title = {The 10 deadly sins of information security management}, journal = {Comput. Secur.}, volume = {23}, number = {5}, pages = {371--376}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.05.002}, doi = {10.1016/J.COSE.2004.05.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SolmsS04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SongF04, author = {Yougang Song and Brett D. Fleisch}, title = {Rico: a security proxy for mobile code}, journal = {Comput. Secur.}, volume = {23}, number = {4}, pages = {338--351}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2003.09.003}, doi = {10.1016/J.COSE.2003.09.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SongF04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/StergiouLG04, author = {Theodore Stergiou and Mark S. Leeson and Roger J. Green}, title = {An alternative architectural framework to the {OSI} security model}, journal = {Comput. Secur.}, volume = {23}, number = {2}, pages = {137--153}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2003.09.001}, doi = {10.1016/J.COSE.2003.09.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/StergiouLG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Stewart04, author = {Andrew Stewart}, title = {On risk: perception and direction}, journal = {Comput. Secur.}, volume = {23}, number = {5}, pages = {362--370}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.05.003}, doi = {10.1016/J.COSE.2004.05.003}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Stewart04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SzczepanskiWASS04, author = {Janusz Szczepanski and Elek Wajnryb and Jos{\'{e}} M. Amig{\'{o}} and Maria V. Sanchez{-}Vives and Mel Slater}, title = {Biometric random number generators}, journal = {Comput. Secur.}, volume = {23}, number = {1}, pages = {77--84}, year = {2004}, url = {https://doi.org/10.1016/S0167-4048(04)00064-1}, doi = {10.1016/S0167-4048(04)00064-1}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SzczepanskiWASS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TzengHY04, author = {Shiang{-}Feng Tzeng and Min{-}Shiang Hwang and Cheng{-}Ying Yang}, title = {An improvement of nonrepudiable threshold proxy signature scheme with known signers}, journal = {Comput. Secur.}, volume = {23}, number = {2}, pages = {174--178}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2003.12.001}, doi = {10.1016/J.COSE.2003.12.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/TzengHY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Ungureanu04, author = {Victoria Ungureanu}, title = {Formal support for certificate management policies}, journal = {Comput. Secur.}, volume = {23}, number = {4}, pages = {300--311}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.02.001}, doi = {10.1016/J.COSE.2004.02.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Ungureanu04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/VenterE04, author = {H. S. Venter and Jan H. P. Eloff}, title = {Vulnerability forecasting - a conceptual model}, journal = {Comput. Secur.}, volume = {23}, number = {6}, pages = {489--497}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.06.005}, doi = {10.1016/J.COSE.2004.06.005}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/VenterE04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/VroomS04, author = {Cheryl Vroom and Rossouw von Solms}, title = {Towards information security behavioural compliance}, journal = {Comput. Secur.}, volume = {23}, number = {3}, pages = {191--198}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.01.012}, doi = {10.1016/J.COSE.2004.01.012}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/VroomS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Wool04, author = {Avishai Wool}, title = {The use and usability of direction-based filtering in firewalls}, journal = {Comput. Secur.}, volume = {23}, number = {6}, pages = {459--468}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.02.003}, doi = {10.1016/J.COSE.2004.02.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Wool04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WuH04, author = {Tzong{-}Sun Wu and Chien{-}Lung Hsu}, title = {Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks}, journal = {Comput. Secur.}, volume = {23}, number = {2}, pages = {120--125}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2003.09.005}, doi = {10.1016/J.COSE.2003.09.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WuH04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YangL04, author = {Cungang Yang and Celia Li}, title = {Access control in a hierarchy using one-way hash functions}, journal = {Comput. Secur.}, volume = {23}, number = {8}, pages = {659--664}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.08.004}, doi = {10.1016/J.COSE.2004.08.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/YangL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YangW04, author = {Chou Chen Yang and Ren{-}Chiun Wang}, title = {Cryptanalysis of a user friendly remote authentication scheme with smart cards}, journal = {Comput. Secur.}, volume = {23}, number = {5}, pages = {425--427}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.02.006}, doi = {10.1016/J.COSE.2004.02.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/YangW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YangWBWD04, author = {Yanjiang Yang and Shuhong Wang and Feng Bao and Jie Wang and Robert H. Deng}, title = {New efficient user identification and key distribution scheme providing enhanced security}, journal = {Comput. Secur.}, volume = {23}, number = {8}, pages = {697--704}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.08.005}, doi = {10.1016/J.COSE.2004.08.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/YangWBWD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YuC04, author = {Enzhe Yu and Sungzoon Cho}, title = {Keystroke dynamics identity verification - its problems and practical solutions}, journal = {Comput. Secur.}, volume = {23}, number = {5}, pages = {428--440}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.02.004}, doi = {10.1016/J.COSE.2004.02.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/YuC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhuCW04, author = {Liehuang Zhu and Yuanda Cao and Dong Wang}, title = {Digital signature of multicast streams secure against adaptive chosen message attack}, journal = {Comput. Secur.}, volume = {23}, number = {3}, pages = {229--240}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.01.014}, doi = {10.1016/J.COSE.2004.01.014}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZhuCW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Zuccato04, author = {Albin Zuccato}, title = {Holistic security requirement engineering for electronic commerce}, journal = {Comput. Secur.}, volume = {23}, number = {1}, pages = {63--76}, year = {2004}, url = {https://doi.org/10.1016/S0167-4048(04)00065-3}, doi = {10.1016/S0167-4048(04)00065-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Zuccato04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.