Search
Submission Procedure
share:
|
Special Issues
Submission Procedure
Aims and Scope
Board of Editors
What's New
Follow us
Articles by Topics
Articles by Author
Geographical Mashup
List of Topics
Printed Publications
Volume 26 (2020)
Volume 25 (2019)
Volume 24 (2018)
Volume 23 (2017)
Volume 22 (2016)
Volume 21 (2015)
Volume 20 (2014)
Volume 19 (2013)
Volume 18 (2012)
Volume 17 (2011)
Volume 16 (2010)
Volume 15 (2009)
Issue 1
Issue 2
Issue 3
Issue 4
Issue 5
Issue 6
Issue 7
Issue 8
Issue 9
Issue 10
Issue 11
Issue 12
Issue 13
Issue 14
Issue 15
Issue 16
Issue 17
Issue 18
Volume 14 (2008)
Volume 13 (2007)
Volume 12 (2006)
Volume 11 (2005)
Volume 10 (2004)
Volume 9 (2003)
Volume 8 (2002)
Volume 7 (2001)
Volume 6 (2000)
Volume 5 (1999)
Volume 4 (1998)
Volume 3 (1997)
Volume 2 (1996)
Volume 1 (1995)
Volume 0 (1994)
Collection of other papers
Volume 15
Content of Issue 2
DOI:
10.3217/jucs-015-02
Multimedia Security in Communication (MUSIC)
S. Lian, Y. Zhang, S. Gritzalis, Y. Chen
398
On the Superdistribution of Digital Goods
A.U. Schmidt
401
On the Design of Secure Multimedia Authentication
J. Wang, J. Lü, S. Lian, G. Liu
426
Stability in Heterogeneous Multimedia Networks under Adversarial Attacks
D. Koukopoulos
444
The Topology Change Attack: Threat and Impact
M.A. Abdelouahab, A. Bouabdallah, M. Achemlal, S. Laniepce
465
A New Detection Method for Distributed Denial-of-Service Attack Traffic based on Statistical Test
C.-L. Chen
488