nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks
|
Tan, Hailun |
|
2013 |
32 |
C |
p. 36-55 20 p. |
artikel |
2 |
A middleware approach for outsourcing data securely
|
Jammalamadaka, Ravi Chandra |
|
2013 |
32 |
C |
p. 252-266 15 p. |
artikel |
3 |
A universal system for fair non-repudiable certified e-mail without a trusted third party
|
Paulin, Alois |
|
2013 |
32 |
C |
p. 207-218 12 p. |
artikel |
4 |
Contents
|
|
|
2013 |
32 |
C |
p. iii-iv nvt p. |
artikel |
5 |
Design and formal security evaluation of NeMHIP: A new secure and efficient network mobility management protocol based on the Host Identity Protocol
|
Toledo, Nerea |
|
2013 |
32 |
C |
p. 1-18 18 p. |
artikel |
6 |
Digital media triage with bulk data analysis and bulk_extractor
|
Garfinkel, Simson L. |
|
2013 |
32 |
C |
p. 56-72 17 p. |
artikel |
7 |
Editorial
|
Spafford, Eugene H. |
|
2013 |
32 |
C |
p. v- 1 p. |
artikel |
8 |
Editorial Board
|
|
|
2013 |
32 |
C |
p. IFC- 1 p. |
artikel |
9 |
EVIV: An end-to-end verifiable Internet voting system
|
Joaquim, Rui |
|
2013 |
32 |
C |
p. 170-191 22 p. |
artikel |
10 |
Exploring attack graph for cost-benefit security hardening: A probabilistic approach
|
Wang, Shuzhen |
|
2013 |
32 |
C |
p. 158-169 12 p. |
artikel |
11 |
From keyloggers to touchloggers: Take the rough with the smooth
|
Damopoulos, D. |
|
2013 |
32 |
C |
p. 102-114 13 p. |
artikel |
12 |
Future directions for behavioral information security research
|
Crossler, Robert E. |
|
2013 |
32 |
C |
p. 90-101 12 p. |
artikel |
13 |
Hacking VoIP
|
Soupionis, Yannis |
|
2013 |
32 |
C |
p. 267- 1 p. |
artikel |
14 |
LSB matching steganalysis based on patterns of pixel differences and random embedding
|
Lerch-Hostalot, Daniel |
|
2013 |
32 |
C |
p. 192-206 15 p. |
artikel |
15 |
Metasploit the Penetration Tester's Guide
|
Kandias, Miltiadis |
|
2013 |
32 |
C |
p. 268-269 2 p. |
artikel |
16 |
On the detection of desynchronisation attacks against security protocols that use dynamic shared secrets
|
Lasc, Ioana |
|
2013 |
32 |
C |
p. 115-129 15 p. |
artikel |
17 |
Security-related behavior in using information systems in the workplace: A review and synthesis
|
Guo, Ken H. |
|
2013 |
32 |
C |
p. 242-251 10 p. |
artikel |
18 |
Systematic bug finding and fault localization enhanced with input data tracking
|
DeMott, Jared D. |
|
2013 |
32 |
C |
p. 130-157 28 p. |
artikel |
19 |
The architecture of a digital forensic readiness management system
|
Reddy, K. |
|
2013 |
32 |
C |
p. 73-89 17 p. |
artikel |
20 |
The state of the art of application restrictions and sandboxes: A survey of application-oriented access controls and their shortfalls
|
Schreuders, Z. Cliffe |
|
2013 |
32 |
C |
p. 219-241 23 p. |
artikel |
21 |
Tree-formed verification data for trusted platforms
|
Schmidt, Andreas U. |
|
2013 |
32 |
C |
p. 19-35 17 p. |
artikel |