Go home now Header Background Image
Search
Submission Procedure
share: |
 
Follow us
 
 
 
 
Articles by Topics
Topic K. - Computing Milieux
Topic K.6 - MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS
Topic K.6.5 - Security and Protection

I. Abunadi, M. Alenezi:
An Empirical Investigation of Security Vulnerabilities within Web Applications
/jucs_22_4/an_empirical_investigation_of
page 537 - 551
Vol.22 / Issue 4
S. Alcalde Bagüés, A. Zeidler, I. R. Matias, C. Klein, C. Fernandez Valdivielso:
Enabling Personal Privacy for Pervasive Computing Environments
/jucs_16_3/enabling_personal_privacy_for
page 341 - 371
Vol.16 / Issue 3
A. Baraani-Dastjerdi, J. Pieprzyk, R. Safavi-Naini, J.R. Getta:
Using Cryptographic Hash Functions for Discretionary Access Control in Object-Oriented Databases
/jucs_3_6/using_cryptographic_functions_for
page 730 - 753
Vol.3 / Issue 6
C. Blanco, I. García-Rodríguez de Guzmán, E. Fernández-Medina, J. Trujillo:
Showing the Benefits of Applying a Model Driven Architecture for Developing Secure OLAP Applications
/jucs_20_2/showing_the_benefits_of
page 79 - 106
Vol.20 / Issue 2
C.-L. Botha, E. Kritzinger, M. Loock:
A Framework for the Comparison of Best Practice Recommendations and Legal Requirements for South African Banks
/jucs_18_6/a_framework_for_the
page 845 - 856
Vol.18 / Issue 6
I. Caballero, L.E. Sánchez, A. Freitas, E. Fernández-Medina:
HC+: Towards a Framework for Improving Processes in Health Organizations by Means of Security and Data Quality Management
/jucs_18_12/hc%2B_towards_a_framework
page 1703 - 720
Vol.18 / Issue 12
P. Caballero-Gil, A. Fúster-Sabater, C. Hernández-Goya:
Graph-Based Approach to the Edit Distance Cryptanalysis of Irregularly Clocked Linear Feedback Shift Registers
/jucs_15_15/graph_based_approach_to
page 2981 - 2998
Vol.15 / Issue 15
V. Casola, R. Preziosi, M. Rak, L. Troiano:
A Reference Model for Security Level Evaluation: Policy and Fuzzy Techniques
/jucs_11_1/a_reference_model_for
page 150 - 174
Vol.11 / Issue 1
J. Choi, C. Choi, I. You, P. Kim:
Polymorphic Malicious JavaScript Code Detection for APT Attack Defence
/jucs_21_3/polymorphic_malicious_javascript_code
page 369 - 383
Vol.21 / Issue 3
C.-K. Chu, W.-G. Tzeng:
Efficient k-out-of-n Oblivious Transfer Schemes
/jucs_14_3/efficient_k_out_of
page 397 - 415
Vol.14 / Issue 3
W. Claycomb, D. Shin:
A User Controlled Approach for Securing Sensitive Information in Directory Services
/jucs_15_15/a_user_controlled_approach
page 2999 - 3018
Vol.15 / Issue 15
K. Dietrich, F. Röck:
Performance Optimizations for DAA Signatures on Java enabled Platforms
/jucs_16_4/performance_optimizations_for_daa
page 519 - 529
Vol.16 / Issue 4
K. Dietrich:
On Reliable Platform Configuration Change Reporting Mechanisms for Trusted Computing Enabled Platforms
/jucs_16_4/on_reliable_platform_configuration
page 507 - 518
Vol.16 / Issue 4
L. Ding, J. Guan, W.-l. Sun:
New Results of Related-key Attacks on All Py-Family of Stream Ciphers
/jucs_18_12/new_results_of_related
page 1741 - 756
Vol.18 / Issue 12
B. Flinn, H. Maurer:
Levels of Anonymity
/jucs_1_1/levels_of_anonymity
page 35 - 47
Vol.1 / Issue 1
L. Hanzlik, M. Kutyłowski:
Restricted Identification Secure in the Extended Canetti-Krawczyk Model
/jucs_21_3/restricted_identification_secure_in
page 419 - 439
Vol.21 / Issue 3
H. Hlavacs, W. Gansterer, H. Schabauer, J. Zottl, M. Petraschek, T. Hoeher, O. Jung:
Enhancing ZRTP by using Computational Puzzles
/jucs_14_5/enhancing_zrtp_by_using
page 693 - 716
Vol.14 / Issue 5
H. Holm, T. Sommestad, U. Franke, M. Ekstedt:
Success Rate of Remote Code Execution Attacks - Expert Assessments and Observations
/jucs_18_6/success_rate_of_remote
page 732 - 749
Vol.18 / Issue 6
Y.-L. Huang, F.-Y. Leu, C.-H. Chiu, I.-L. Lin:
Improving Security Levels of IEEE802.16e Authentication by Involving Diffie-Hellman PKDS
/jucs_17_6/improving_security_levels_of
page 891 - 911
Vol.17 / Issue 6
S. P. Joglekar, S. R. Tate:
ProtoMon: Embedded Monitors for Cryptographic Protocol Intrusion Detection and Prevention
/jucs_11_1/protomon_embedded_monitors_for
page 83 - 103
Vol.11 / Issue 1
A. Karim, R. Salleh, M.K. Khan, A. Siddiqa, K.-K.R. Choo:
On the Analysis and Detection of Mobile Botnet Applications
/jucs_22_4/on_the_analysis_and
page 567 - 588
Vol.22 / Issue 4
D. Koukopoulos:
Stability in Heterogeneous Multimedia Networks under Adversarial Attacks
/jucs_15_2/stability_in_heterogeneous_multimedia
page 444 - 464
Vol.15 / Issue 2
L. Krammer, W. Kastner, T. Sauter:
A Comprehensive Dependability Approach for Building Automation Networks
/jucs_22_9/a_comprehensive_dependability_approach
page 1225 - 1248
Vol.22 / Issue 9
G.R. Kumar, N. Mangathayaru, G. Narsimha:
An Approach for Intrusion Detection Using Novel Gaussian Based Kernel Function
/jucs_22_4/an_approach_for_intrusion
page 589 - 604
Vol.22 / Issue 4
S.M. Lee, D.S. Kim, J.S. Park:
Cost-Sensitive Spam Detection Using Parameters Optimization and Feature Selection
/jucs_17_6/cost_sensitive_spam_detection
page 944 - 960
Vol.17 / Issue 6
K. Ma, R. Sun, A. Abraham:
Toward a Module-centralized and Aspect-oriented Monitoring Framework in Clouds
/jucs_19_15/toward_a_module_centralized
page 2241 - 2265
Vol.19 / Issue 15
P. Martinez-Julia, A.F. Gómez-Skarmeta:
A Novel Identity-based Network Architecture for Next Generation Internet
/jucs_18_12/a_novel_identity_based
page 1643 - 1661
Vol.18 / Issue 12
H. Mouratidis, C. Kalloniatis, S. Islam, M.-P. Huget, S. Gritzalis:
Aligning Security and Privacy to Support the Development of Secure Information Systems
/jucs_18_12/aligning_security_and_privacy
page 1608 - 1627
Vol.18 / Issue 12
J.R. Mühlbacher, C. Praher:
DS RBAC - Dynamic Sessions in Role Based Access Control
/jucs_15_3/ds_rbac_dynamic
page 538 - 554
Vol.15 / Issue 3
P. Najera, F. Moyano, J. Lopez:
Security Mechanisms and Access Control Infrastructure for e-Passports and General Purpose e-Documents
/jucs_15_5/security_mechanisms_and_access
page 970 - 991
Vol.15 / Issue 5
A. Nenadic, N. Zhang, B. Cheetham, C. Goble:
RSA-based Certified Delivery of E-Goods Using Verifiable and Recoverable Signature Encryption
/jucs_11_1/rsa_based_certified_delivery
page 175 - 192
Vol.11 / Issue 1
H. Ning, H. Liu, Q. Liu, G. Ji:
Directed Path Based Authentication Scheme for the Internet of Things
/jucs_18_9/directed_path_based_authentication
page 1112 - 1131
Vol.18 / Issue 9
C.-M. Ou, C.-R. Ou:
Non-repudiation Mechanism of Agent-based Mobile Payment Systems: Perspectives on Wireless PKI
/jucs_14_14/non_repudiation_mechanism_of
page 2309 - 2328
Vol.14 / Issue 14
M. Petraschek, T. Hoeher, O. Jung, H. Hlavacs, W. Gansterer:
Security and Usability Aspects of Man-in-the-Middle Attacks on ZRTP
/jucs_14_5/security_and_usability_aspects
page 673 - 692
Vol.14 / Issue 5
F. Praus, W. Kastner, P. Palensky:
Secure Control Applications in Smart Homes and Buildings
/jucs_22_9/secure_control_applications_in
page 1249 - 1273
Vol.22 / Issue 9
M. Rajaei, M.S. Haghjoo, E.K. Miyaneh:
An Anonymization Algorithm for (α, β, γ, δ)-Social Network Privacy Considering Data Utility
/jucs_21_2/an_anonymization_algorithm_for
page 268 - 305
Vol.21 / Issue 2
O. Rebollo, D. Mellado, E. Fernández-Medina:
A Systematic Review of Information Security Governance Frameworks in the Cloud Computing Environment
/jucs_18_6/a_systematic_review_of
page 798 - 815
Vol.18 / Issue 6
C. Rechberger, V. Rijmen:
New Results on NMAC/HMAC when Instantiated with Popular Hash Functions
/jucs_14_3/new_results_on_nmac
page 347 - 376
Vol.14 / Issue 3
D.G. Rosado, E. Fernández-Medina, J. López, M. Piattini:
Developing a Secure Mobile Grid System through a UML Extension
/jucs_16_17/developing_a_secure_mobile
page 2333 - 2352
Vol.16 / Issue 17
A. Ruiz-Martínez, C.I. Marín-López, L. Baño-López, A.F. Gómez-Skarmeta:
A New Fair Non-repudiation Protocol for Secure Negotiation and Contract Signing
/jucs_15_3/a_new_fair_nonrepudiation
page 555 - 584
Vol.15 / Issue 3
K. Simon, C. Moucha, J. Keller:
Contactless Vulnerability Analysis using Google and Shodan
/jucs_23_4/contactless_vulnerability_analysis_using
page 404 - 430
Vol.23 / Issue 4
C.H. Suen:
VIMM: Runtime Integrity Measurement of a Virtualized Operating System
/jucs_16_4/vimm_runtime_integrity_measurement
page 554 - 576
Vol.16 / Issue 4
L.E. Sánchez, A. Santos-Olmo Parra, D.G. Rosado, M. Piattini:
Managing Security and its Maturity in Small and Medium-sized Enterprises
/jucs_15_15/managing_security_and_its
page 3038 - 3058
Vol.15 / Issue 15
A. Taweel, A. Rector, J. Rogers:
A Collaborative Biomedical Research System
/jucs_12_1/a_collaborative_biomedical_research
page 80 - 98
Vol.12 / Issue 1
A.V. Uzunov, E.B. Fernandez, K. Falkner:
Engineering Security into Distributed Systems: A Survey of Methodologies
/jucs_18_20/engineering_security_into_distributed
page 2920 - 3006
Vol.18 / Issue 20
M.B. Vleju:
Automatic Authentication to Cloud-Based Services
/jucs_20_3/automatic_authentication_to_cloud
page 385 - 405
Vol.20 / Issue 3
S. Wendzel, W. Mazurczyk, S. Zander:
Unified Description for Network Information Hiding Methods
/jucs_22_11/unified_description_for_network
page 1456 - 1486
Vol.22 / Issue 11
S. Wendzel, C. Palmer:
Creativity in Mind: Evaluating and Maintaining Advances in Network Steganographic Research
/jucs_21_12/creativity_in_mind_evaluating
page 1684 - 1705
Vol.21 / Issue 12
W. Wu, Y. Mu, W. Susilo, X. Huang:
Certificate-based Signatures Revisited
/jucs_15_8/certificate_based_signatures_revisited
page 1659 - 1684
Vol.15 / Issue 8
J. Yong:
Security and Privacy Preservation for Mobile E-Learning via Digital Identity Attributes
/jucs_17_2/security_and_privacy_preservation
page 296 - 310
Vol.17 / Issue 2
A. Zambrano, C. Toro, M. Nieto, R. Sotaquira, C. Sanín, E. Szczerbicki:
Video Semantic Analysis Framework based on Run-time Production Rules - Towards Cognitive Vision
/jucs_21_6/video_semantic_analysis_framework
page 856 - 870
Vol.21 / Issue 6
Z. Đurić, O. Marić, D. Gašević:
Internet Payment System: A New Payment System for Internet Transactions
/jucs_13_4/internet_payment_system_a
page 479 - 503
Vol.13 / Issue 4