2008
2008
Volume 2, Number 4, 2008 October
-
- Intelligent Techniques for Effective Network Protocol Security Monitoring, Measurement and Prediction, Emmanuel Hooper (pp. 1-10).
- Some limits of Common Criteria certification, Dusart Pierre, Sauveron Damien, Tai-Hoon Kim (pp. 11-20).
- Investigation of Secure Framework for Multipath MANET, Binod Vaidya,Dong-You Choi, JongAn Park, SeungJo Han (pp. 21-28).
- Liveness Detection for Biometric Systems Based on Papillary Lines, Martin Drahansky, Dana Lodrova (pp. 29-38).
- Implicit Detection of Hidden Processes with a Local-Booted Virtual Machine, Yan Wen, Jinjing Zhao, Huaimin Wang (pp. 39-48).
- A Web Metering Scheme for Fair Advertisement Transactions, Ren-Chiun Wang, Wen-Shenq Juang and Chin-Laung Lei (pp. 49-56).
- Secure and Efficient Tag Searching in RFID Systems using Serverless Search Protocol, Sheikh I. Ahamed, Farzana Rahman, Endadul Hoque, Fahim Kawsar, Tatsuo Nakajima (pp. 57-66).
- Incorporating Security Requirements Engineering into Standard Lifecycle Processes, Nancy R. Mead, Venkatesh Viswanathan, Justin Zhan (pp. 67-80).
- Why MSN Lost to QQ in China Market?-Different Privacy Protection Design, Zhaoli Meng, Meiyun Zuo (pp. 81-88).
- Anomaly Detection Using LibSVM Training Tools, Jung-Chun Liu, Chu-Hsing Lin, Jui-Ling Yu, Wei-Shen Lai, Chia-Han Ho (pp. 89-98).
- Analysis of some Famous Cryptographic Protocols Using the Interpretation-Function-based Method, Hanane Houmani Mohamed Mejr (pp. 99-116).
- Performance Analysis of an Authentication Scheme for Personalized Mobile Multimedia applications: A Cognitive Agents based Approach, B. Sathish Babu and Pallapa Venkataram (pp. 117-140).