no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
Advanced smart card based password authentication protocol
|
Song, Ronggong |
|
2010 |
32 |
5-6 |
p. 321-325 5 p. |
article |
2 |
A dynamic privacy model for web services
|
Meziane, Hassina |
|
2010 |
32 |
5-6 |
p. 288-304 17 p. |
article |
3 |
A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations
|
Hu, Jiankun |
|
2010 |
32 |
5-6 |
p. 274-280 7 p. |
article |
4 |
Analysis of Handover Key Management schemes under IETF perspective
|
Marin-Lopez, R. |
|
2010 |
32 |
5-6 |
p. 266-273 8 p. |
article |
5 |
A proposal for automating investigations in live forensics
|
Lee, Seokhee |
|
2010 |
32 |
5-6 |
p. 246-255 10 p. |
article |
6 |
A security framework for a workflow-based grid development platform
|
Vivas, José L. |
|
2010 |
32 |
5-6 |
p. 230-245 16 p. |
article |
7 |
Editorial Board
|
|
|
2010 |
32 |
5-6 |
p. iii- 1 p. |
article |
8 |
Information and communications security, privacy and trust: Standards and regulations
|
Thuraisingham, Bhavani |
|
2010 |
32 |
5-6 |
p. 229- 1 p. |
article |
9 |
Proposed corrections to the IEC 61131-3 standard
|
de Sousa, Mário |
|
2010 |
32 |
5-6 |
p. 312-320 9 p. |
article |
10 |
Removal notice to “The Software Engineering Model's categories of compliance” [CSI 31/1 (2009) 14–18]
|
Kaushik, Sharat |
|
2010 |
32 |
5-6 |
p. 326- 1 p. |
article |
11 |
Revising centralized certificate validation standards for mobile and wireless communications
|
Papapanagiotou, K. |
|
2010 |
32 |
5-6 |
p. 281-287 7 p. |
article |
12 |
Security approaches in e-cognocracy
|
Salazar, José Luis |
|
2010 |
32 |
5-6 |
p. 256-265 10 p. |
article |
13 |
Towards trustworthy e-voting using paper receipts
|
Lee, Yunho |
|
2010 |
32 |
5-6 |
p. 305-311 7 p. |
article |