Go home now Header Background Image
Search
Submission Procedure
share: |
 
Follow us
 
 
 
 
Articles by Topics
Topic D. - Software
Topic D.4 - OPERATING SYSTEMS
Topic D.4.6 - Security and Protection

F. Adelstein, P. Alla, R. Joyce, G. G. Richard III:
Physically Locating Wireless Intruders
/jucs_11_1/physically_locating_wireless_intruders
page 4 - 19
Vol.11 / Issue 1
O.A. Alzubi, T.M. Chen, J.A. Alzubi, H. Rashaideh, N. Al-Najdawi:
Secure Channel Coding Schemes based on Algebraic-Geometric Codes over Hermitian Curves
/jucs_22_4/secure_channel_coding_schemes
page 552 - 566
Vol.22 / Issue 4
A. Baraani-Dastjerdi, J. Pieprzyk, R. Safavi-Naini, J.R. Getta:
Using Cryptographic Hash Functions for Discretionary Access Control in Object-Oriented Databases
/jucs_3_6/using_cryptographic_functions_for
page 730 - 753
Vol.3 / Issue 6
J. Choi, C. Choi, I. You, P. Kim:
Polymorphic Malicious JavaScript Code Detection for APT Attack Defence
/jucs_21_3/polymorphic_malicious_javascript_code
page 369 - 383
Vol.21 / Issue 3
C.-K. Chu, W.-G. Tzeng:
Efficient k-out-of-n Oblivious Transfer Schemes
/jucs_14_3/efficient_k_out_of
page 397 - 415
Vol.14 / Issue 3
T. Cui, C. Jin, G. Zhang:
Observations of Skipjack-like Structure with SP/SPS Round Function
/jucs_19_16/observations_of_skipjack_like
page 2453 - 2471
Vol.19 / Issue 16
N. Cvejic, T. Seppänen:
Increasing Robustness of LSB Audio Steganography by Reduced Distortion LSB Coding
/jucs_11_1/increasing_robustness_of_lsb
page 56 - 65
Vol.11 / Issue 1
P. Danner, D. Hein:
A Trusted Computing Identity Collation Protocol to Simplify Deployment of New Disaster Response Devices
/jucs_16_9/a_trusted_computing_identity
page 1139 - 1151
Vol.16 / Issue 9
L. Ding, J. Guan, W.-l. Sun:
New Results of Related-key Attacks on All Py-Family of Stream Ciphers
/jucs_18_12/new_results_of_related
page 1741 - 756
Vol.18 / Issue 12
H.M. Fardoun, B. Zafar, A.H. Altalhi, A. Paules:
Interactive Design System for Schools using Cloud Computing
/jucs_19_7/interactive_design_system_for
page 950 - 964
Vol.19 / Issue 7
H.M. Fardoun, A. Mashat, S.R. López:
Applying Professional Solutions within the Educational Environments by Means of Cloud Computing: Coaching for Teachers
/jucs_19_12/applying_professional_solutions_within
page 1703 - 1717
Vol.19 / Issue 12
B. Flinn, H. Maurer:
Levels of Anonymity
/jucs_1_1/levels_of_anonymity
page 35 - 47
Vol.1 / Issue 1
L. Hanzlik, M. Kutyłowski:
Restricted Identification Secure in the Extended Canetti-Krawczyk Model
/jucs_21_3/restricted_identification_secure_in
page 419 - 439
Vol.21 / Issue 3
A. Imran, S.A. Aljawarneh, K. Sakib:
Web Data Amalgamation for Security Engineering: Digital Forensic Investigation of Open Source Cloud
/jucs_22_4/web_data_amalgamation_for
page 494 - 520
Vol.22 / Issue 4
A.K. Jha, W.J. Lee:
Analysis of Permission-based Security in Android through Policy Expert, Developer, and End User Perspectives
/jucs_22_4/analysis_of_permission_based
page 459 - 474
Vol.22 / Issue 4
S. P. Joglekar, S. R. Tate:
ProtoMon: Embedded Monitors for Cryptographic Protocol Intrusion Detection and Prevention
/jucs_11_1/protomon_embedded_monitors_for
page 83 - 103
Vol.11 / Issue 1
A. Karim, R. Salleh, M.K. Khan, A. Siddiqa, K.-K.R. Choo:
On the Analysis and Detection of Mobile Botnet Applications
/jucs_22_4/on_the_analysis_and
page 567 - 588
Vol.22 / Issue 4
I. Joe Khor, J. Thomas, I. Jonyer:
Sliding Window Protocol for Secure Group Communication in Ad-Hoc Networks
/jucs_11_1/sliding_window_protocol_for
page 37 - 55
Vol.11 / Issue 1
D. Koukopoulos:
Stability in Heterogeneous Multimedia Networks under Adversarial Attacks
/jucs_15_2/stability_in_heterogeneous_multimedia
page 444 - 464
Vol.15 / Issue 2
J.O. Kwon, I.R. Jeong, D.H. Lee:
Light-Weight Key Exchange with Different Passwords in the Standard Model
/jucs_15_5/light_weight_key_exchange
page 1042 - 1064
Vol.15 / Issue 5
A. Lamei, M.S. Fallah:
Rewriting-Based Enforcement of Noninterference in Programs with Observable Intermediate Values
/jucs_22_7/rewriting_based_enforcement_of
page 956 - 991
Vol.22 / Issue 7
S. Lian, Y. Zhang:
Protecting Mobile TV Multimedia Content in DVB/GPRS Heterogeneous Wireless Networks
/jucs_15_5/protecting_mobile_tv_multimedia
page 1023 - 1041
Vol.15 / Issue 5
J.R. Mühlbacher, C. Praher:
DS RBAC - Dynamic Sessions in Role Based Access Control
/jucs_15_3/ds_rbac_dynamic
page 538 - 554
Vol.15 / Issue 3
A. Nenadic, N. Zhang, B. Cheetham, C. Goble:
RSA-based Certified Delivery of E-Goods Using Verifiable and Recoverable Signature Encryption
/jucs_11_1/rsa_based_certified_delivery
page 175 - 192
Vol.11 / Issue 1
C.-M. Ou, C.-R. Ou:
Non-repudiation Mechanism of Agent-based Mobile Payment Systems: Perspectives on Wireless PKI
/jucs_14_14/non_repudiation_mechanism_of
page 2309 - 2328
Vol.14 / Issue 14
M. Pirker, R. Toegl:
Towards a Virtual Trusted Platform
/jucs_16_4/towards_a_virtual_trusted
page 531 - 542
Vol.16 / Issue 4
F. Praus, W. Kastner, P. Palensky:
Secure Control Applications in Smart Homes and Buildings
/jucs_22_9/secure_control_applications_in
page 1249 - 1273
Vol.22 / Issue 9
V. Radhakrishna, P.V. Kumar, V. Janaki:
A Novel Similar Temporal System Call Pattern Mining for Efficient Intrusion Detection
/jucs_22_4/a_novel_similar_temporal
page 475 - 493
Vol.22 / Issue 4
C. Rechberger, V. Rijmen:
New Results on NMAC/HMAC when Instantiated with Popular Hash Functions
/jucs_14_3/new_results_on_nmac
page 347 - 376
Vol.14 / Issue 3
K. Salah, M.-A.-R. Al-Khiaty, R. Ahmed, A. Mahdi:
Performance Evaluation of Snort under Windows 7 and Windows Server 2008
/jucs_17_11/performance_evaluation_of_snort
page 1605 - 1622
Vol.17 / Issue 11
G. Schellhorn:
ASM Refinement Preserving Invariants
/jucs_14_12/asm_refinement_preserving_invariants
page 1929 - 1948
Vol.14 / Issue 12
K.-A. Shim:
Security Analysis of Three Password Authentication Schemes
/jucs_17_11/security_analysis_of_three
page 1623 - 1633
Vol.17 / Issue 11
K. Simon, C. Moucha, J. Keller:
Contactless Vulnerability Analysis using Google and Shodan
/jucs_23_4/contactless_vulnerability_analysis_using
page 404 - 430
Vol.23 / Issue 4
S. Sitaraman, S. Venkatesan:
Low-Intrusive Consistent Disk Checkpointing: A Tool for Digital Forensics
/jucs_11_1/low_intrusive_consistent_disk
page 20 - 36
Vol.11 / Issue 1
C.H. Suen:
VIMM: Runtime Integrity Measurement of a Virtualized Operating System
/jucs_16_4/vimm_runtime_integrity_measurement
page 554 - 576
Vol.16 / Issue 4
A.V. Uzunov, E.B. Fernandez, K. Falkner:
Engineering Security into Distributed Systems: A Survey of Methodologies
/jucs_18_20/engineering_security_into_distributed
page 2920 - 3006
Vol.18 / Issue 20
S. Wendzel, W. Mazurczyk, S. Zander:
Unified Description for Network Information Hiding Methods
/jucs_22_11/unified_description_for_network
page 1456 - 1486
Vol.22 / Issue 11
S. Wendzel, C. Palmer:
Creativity in Mind: Evaluating and Maintaining Advances in Network Steganographic Research
/jucs_21_12/creativity_in_mind_evaluating
page 1684 - 1705
Vol.21 / Issue 12
Z. Đurić, O. Marić, D. Gašević:
Internet Payment System: A New Payment System for Internet Transactions
/jucs_13_4/internet_payment_system_a
page 479 - 503
Vol.13 / Issue 4