no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
A comment on the Chen-Chung scheme for hierarchical access control
|
Zhong, Sheng |
|
2003 |
22 |
5 |
p. 450-452 3 p. |
article |
2 |
A new taxonomy of Web attacks suitable for efficient encoding
|
Álvarez, Gonzalo |
|
2003 |
22 |
5 |
p. 435-449 15 p. |
article |
3 |
Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy
|
Hsu, Chien-Lung |
|
2003 |
22 |
5 |
p. 453-456 4 p. |
article |
4 |
Encountering encryption
|
Wolfe, Hank |
|
2003 |
22 |
5 |
p. 388-391 4 p. |
article |
5 |
Events
|
|
|
2003 |
22 |
5 |
p. 421- 1 p. |
article |
6 |
IFIP technical committee 11
|
|
|
2003 |
22 |
5 |
p. 457-459 3 p. |
article |
7 |
International Board of Referees
|
|
|
2003 |
22 |
5 |
p. 422- 1 p. |
article |
8 |
Leading attackers through attack graphs with deceptions
|
Cohen, Fred |
|
2003 |
22 |
5 |
p. 402-411 10 p. |
article |
9 |
Next generation security for wireless: elliptic curve cryptography
|
Vanstone, S.A |
|
2003 |
22 |
5 |
p. 412-415 4 p. |
article |
10 |
Pandora’s Box: spyware, adware, autoexecution, and NGSCB
|
Schultz, E.Eugene |
|
2003 |
22 |
5 |
p. 366-367 2 p. |
article |
11 |
Privacy legislation: a comparison of the US and European approaches
|
Hinde, Stephen |
|
2003 |
22 |
5 |
p. 378-387 10 p. |
article |
12 |
Refereed papers — Guide for Authors
|
|
|
2003 |
22 |
5 |
p. 459- 1 p. |
article |
13 |
Security Views
|
Schultz, Eugene |
|
2003 |
22 |
5 |
p. 368-377 10 p. |
article |
14 |
SSL Virtual Private Networks
|
Harding, Andrew |
|
2003 |
22 |
5 |
p. 416-420 5 p. |
article |
15 |
The 419 scam: information warfare on the spam front and a proposal for local filtering
|
Edelson, Eve |
|
2003 |
22 |
5 |
p. 392-401 10 p. |
article |
16 |
Utilising fuzzy logic and trend analysis for effective intrusion detection
|
Botha, Martin |
|
2003 |
22 |
5 |
p. 423-434 12 p. |
article |