A distributed and secure architecture for signature and decryption delegation through remote smart cards
|
2012 |
Cattaneo, Giuseppe |
Information security management : awareness of threats in e-commerce
|
2012 |
Rahman, Mohammad Mahfuzur |
Analyzing information security goals
|
2012 |
Kolkowska, Ella |
Towards a framework for collaborative enterprise security
|
2012 |
Misra, Janardan |
Can formal methods really help : analyzing the security of electronic voting systems
|
2012 |
Weldemariam, Komminist |
Countering spam robots : scrambled CAPTCHA and Hindi CAPTCHA
|
2012 |
Raj, Aditya |
Security in wireless sensor networks with mobile codes
|
2012 |
|
A pragmatic approach to intrusion response metrics
|
2012 |
Strasburg, Chris |
Assessing the security of software configurations
|
2012 |
Neto, Afonso Araújo |
Information security management based on linguistic sharing techniques
|
2012 |
Ogiela, Marek R. |
SQL injection attacks countermeasures
|
2012 |
Amiratahmasebi, Kasra |
Security and authentication issues of an embedded system designed and implemented for interactive Internet users
|
2012 |
Baruah, Siddhartha |
Feature extraction methods for intrusion detection systems
|
2012 |
Hai Thanh Nguyen |
Distributed key management scheme based on CL-PKC in P2P networks
|
2012 |
Li, Zhongwen |
Security enhancement of peer-to-peer session initiation
|
2012 |
Zheng, Xianghan |
Effective malware analysis using stealth breakpoints
|
2012 |
Vasudevan, Amit |
Graphical passwords
|
2012 |
Catuogno, Luigi |
A decision support system for privacy compliance
|
2012 |
Pearson, Siani |
A privacy service for comparison of privacy and trust policies within SOA
|
2012 |
Allison, David S. |
Creating and applying security goal indicator trees in an industrial environment
|
2012 |
|