2008
2008
Volume 2, Number 3, 2008 July
-
- An Intrusion Detection System in Mobile ADHOC Networks, S.Madhavi, Tai Hoon Kim (pp. 1-16).
- IDEA: A New Intrusion Detection Data Source, William Mahoney, William Sousan (pp. 17-24).
- A Unified Threat Model for Assessing Threat in Web Applications, Xiaohong Li and Ke He (pp. 25-30).
- Cryptographic Key Management for SCADA Systems, Issues and Perspectives, Ludovic Piètre-Cambacédès, Pascal Sitbon (pp. 31-40).
- Incident-driven memory snapshot for full-virtualized OS using interruptive debugging techniques, Ruo Ando, Youki Kadobayashi, Youichi Shinoda (pp. 41-48).
- A Rapid and Efficient Pre-deployment Key Scheme for Secure Data Transmissions in Sensor Networks Using Lagrange Interpolation Polynomial, Hua-Yi Lin, De-Jun Pan, Xin-Xiang Zhao, Zhi-Ren Qiu (pp. 49-56).
- A New Kind of Secure Electronic Communication Technology — VT Position Code Communication Technology and Its Implementation, Shi-Ying Zhou, Gui-He Qin, Yang Xun, Yu-Bo Jin (pp. 57-72).
- Improvement of a Fingerprint-Based Remote User Authentication Scheme, Jing Xu, Wen-Tao Zhu, Deng-Guo Feng (pp. 73-80).
- Fine Granularity Access Rights for Information Flow Control in Object Oriented Systems, Allaoua Maamir, Abdelaziz Fellah, Lina A. Salem (pp. 81-92).
- Implementation and Automatic Testing for Security Enhancement of Linux Based on Least Privilege, Gaoshou Zhai, Jie Zeng, Miaoxia Ma, Liang Zhang (pp. 93-100).
- The Economics of Privacy: People, Policy and Technology, Justin Zhan and Vaidyanathan Rajamani (pp. 101-108).