Go home now Header Background Image
Search
Submission Procedure
share: |
 
Follow us
 
 
 
 
Articles by Topics
Topic D. - Software
Topic D.4 - OPERATING SYSTEMS
Topic D.4.6 - Security and Protection

F. Adelstein, P. Alla, R. Joyce, G. G. Richard III:
Physically Locating Wireless Intruders
/jucs_11_1/physically_locating_wireless_intruders
page 4 - 19
Vol.11 / Issue 1
A.A. Al-Saggaf:
Secure Method for Combining Cryptography with Iris Biometrics
/jucs_24_4/secure_method_for_combining
page 341 - 356
Vol.24 / Issue 4
M.I. Al-Saleh, H.M. Hamdan:
Precise Performance Characterization of Antivirus on the File System Operations
/jucs_25_9/precise_performance_characterization_of
page 1089 - 1108
Vol.25 / Issue 9
M.I. Al-Saleh, E. Qawasmeh, Z.A. Al-Sharif:
Utilizing Debugging Information of Applications in Memory Forensics
/jucs_26_7/utilizing_debugging_information_of
page 805 - 826
Vol.26 / Issue 7
O.A. Alzubi, T.M. Chen, J.A. Alzubi, H. Rashaideh, N. Al-Najdawi:
Secure Channel Coding Schemes based on Algebraic-Geometric Codes over Hermitian Curves
/jucs_22_4/secure_channel_coding_schemes
page 552 - 566
Vol.22 / Issue 4
Ł. Apiecionek, M. Großmann, U.R. Krieger:
Harmonizing IoT-Architectures with Advanced Security Features - A Survey and Case Study
/jucs_25_6/harmonizing_iot_architectures_with
page 571 - 590
Vol.25 / Issue 6
Ł. Apiecionek, M. Biedziak:
Fuzzy Adaptive Data Packets Control Algorithm for IoT System Protection
/jucs_26_11/fuzzy_adaptive_data_packets
page 1435 - 20
Vol.26 / Issue 11
H.B. Attia, L. Kahloul, S. Benharzallah:
A New Hybrid Access Control Model for Security Policies in Multimodal Applications Environments
/jucs_24_4/a_new_hybrid_access
page 392 - 416
Vol.24 / Issue 4
T. Bajtoš, P. Sokol, A. Gajdoš, K. Lučivjanská, T. Mézešová:
Analysis of the Infection and the Injection Phases of the Telnet Botnets
/jucs_25_11/analysis_of_the_infection
page 1417 - 1436
Vol.25 / Issue 11
A. Baraani-Dastjerdi, J. Pieprzyk, R. Safavi-Naini, J.R. Getta:
Using Cryptographic Hash Functions for Discretionary Access Control in Object-Oriented Databases
/jucs_3_6/using_cryptographic_functions_for
page 730 - 753
Vol.3 / Issue 6
J. Bieniasz, K. Szczypiorski:
Methods for Information Hiding in Open Social Networks
/jucs_25_2/methods_for_information_hiding
page 74 - 97
Vol.25 / Issue 2
J. Choi, C. Choi, I. You, P. Kim:
Polymorphic Malicious JavaScript Code Detection for APT Attack Defence
/jucs_21_3/polymorphic_malicious_javascript_code
page 369 - 383
Vol.21 / Issue 3
C.-K. Chu, W.-G. Tzeng:
Efficient k-out-of-n Oblivious Transfer Schemes
/jucs_14_3/efficient_k_out_of
page 397 - 415
Vol.14 / Issue 3
T. Cui, C. Jin, G. Zhang:
Observations of Skipjack-like Structure with SP/SPS Round Function
/jucs_19_16/observations_of_skipjack_like
page 2453 - 2471
Vol.19 / Issue 16
N. Cvejic, T. Seppänen:
Increasing Robustness of LSB Audio Steganography by Reduced Distortion LSB Coding
/jucs_11_1/increasing_robustness_of_lsb
page 56 - 65
Vol.11 / Issue 1
P. Danner, D. Hein:
A Trusted Computing Identity Collation Protocol to Simplify Deployment of New Disaster Response Devices
/jucs_16_9/a_trusted_computing_identity
page 1139 - 1151
Vol.16 / Issue 9
L. Ding, J. Guan, W.-l. Sun:
New Results of Related-key Attacks on All Py-Family of Stream Ciphers
/jucs_18_12/new_results_of_related
page 1741 - 756
Vol.18 / Issue 12
H.M. Fardoun, A. Mashat, S.R. López:
Applying Professional Solutions within the Educational Environments by Means of Cloud Computing: Coaching for Teachers
/jucs_19_12/applying_professional_solutions_within
page 1703 - 1717
Vol.19 / Issue 12
H.M. Fardoun, B. Zafar, A.H. Altalhi, A. Paules:
Interactive Design System for Schools using Cloud Computing
/jucs_19_7/interactive_design_system_for
page 950 - 964
Vol.19 / Issue 7
B. Flinn, H. Maurer:
Levels of Anonymity
/jucs_1_1/levels_of_anonymity
page 35 - 47
Vol.1 / Issue 1
W. Graniszewski, J. Krupski, K. Szczypiorski:
SOMSteg - Framework for Covert Channel, and its Detection, within HTTP
/jucs_24_7/somsteg_framework_for_covert
page 864 - 891
Vol.24 / Issue 7
L. Hanzlik, M. Kutyłowski:
Restricted Identification Secure in the Extended Canetti-Krawczyk Model
/jucs_21_3/restricted_identification_secure_in
page 419 - 439
Vol.21 / Issue 3
M. Huang, B. Yang, Y. Zhao, K. Liang, L. Xue, X. Yang:
CCA-Secure Deterministic Identity-Based Encryption Scheme
/jucs_25_3/cca_secure_deterministic_identity
page 245 - 269
Vol.25 / Issue 3
M. Huang, M. Xu, T. Qiao, T. Wu, N. Zheng:
Designing Statistical Model-based Discriminator for Identifying Computer-generated Graphics from Natural Images
/jucs_25_9/designing_statistical_model_based
page 1151 - 0
Vol.25 / Issue 9
A. Imran, S.A. Aljawarneh, K. Sakib:
Web Data Amalgamation for Security Engineering: Digital Forensic Investigation of Open Source Cloud
/jucs_22_4/web_data_amalgamation_for
page 494 - 520
Vol.22 / Issue 4
A.K. Jha, W.J. Lee:
Analysis of Permission-based Security in Android through Policy Expert, Developer, and End User Perspectives
/jucs_22_4/analysis_of_permission_based
page 459 - 474
Vol.22 / Issue 4
S. P. Joglekar, S. R. Tate:
ProtoMon: Embedded Monitors for Cryptographic Protocol Intrusion Detection and Prevention
/jucs_11_1/protomon_embedded_monitors_for
page 83 - 103
Vol.11 / Issue 1
A. Karim, R. Salleh, M.K. Khan, A. Siddiqa, K.-K.R. Choo:
On the Analysis and Detection of Mobile Botnet Applications
/jucs_22_4/on_the_analysis_and
page 567 - 588
Vol.22 / Issue 4
R. Keidel, S. Wendzel, S. Zillien, E.S. Conner, G. Haas:
WoDiCoF - A Testbed for the Evaluation of (Parallel) Covert Channel Detection Algorithms
/jucs_24_5/wodicof_a_testbed_for
page 556 - 576
Vol.24 / Issue 5
I. Joe Khor, J. Thomas, I. Jonyer:
Sliding Window Protocol for Secure Group Communication in Ad-Hoc Networks
/jucs_11_1/sliding_window_protocol_for
page 37 - 55
Vol.11 / Issue 1
D. Koukopoulos:
Stability in Heterogeneous Multimedia Networks under Adversarial Attacks
/jucs_15_2/stability_in_heterogeneous_multimedia
page 444 - 464
Vol.15 / Issue 2
J.O. Kwon, I.R. Jeong, D.H. Lee:
Light-Weight Key Exchange with Different Passwords in the Standard Model
/jucs_15_5/light_weight_key_exchange
page 1042 - 1064
Vol.15 / Issue 5
A. Lamei, M.S. Fallah:
Rewriting-Based Enforcement of Noninterference in Programs with Observable Intermediate Values
/jucs_22_7/rewriting_based_enforcement_of
page 956 - 991
Vol.22 / Issue 7
S. Lian, Y. Zhang:
Protecting Mobile TV Multimedia Content in DVB/GPRS Heterogeneous Wireless Networks
/jucs_15_5/protecting_mobile_tv_multimedia
page 1023 - 1041
Vol.15 / Issue 5
J.R. Mühlbacher, C. Praher:
DS RBAC - Dynamic Sessions in Role Based Access Control
/jucs_15_3/ds_rbac_dynamic
page 538 - 554
Vol.15 / Issue 3
A. Nenadic, N. Zhang, B. Cheetham, C. Goble:
RSA-based Certified Delivery of E-Goods Using Verifiable and Recoverable Signature Encryption
/jucs_11_1/rsa_based_certified_delivery
page 175 - 192
Vol.11 / Issue 1
C.-M. Ou, C.-R. Ou:
Non-repudiation Mechanism of Agent-based Mobile Payment Systems: Perspectives on Wireless PKI
/jucs_14_14/non_repudiation_mechanism_of
page 2309 - 2328
Vol.14 / Issue 14
M. Pirker, R. Toegl:
Towards a Virtual Trusted Platform
/jucs_16_4/towards_a_virtual_trusted
page 531 - 542
Vol.16 / Issue 4
F. Praus, W. Kastner, P. Palensky:
Secure Control Applications in Smart Homes and Buildings
/jucs_22_9/secure_control_applications_in
page 1249 - 1273
Vol.22 / Issue 9
V. Radhakrishna, P.V. Kumar, V. Janaki:
A Novel Similar Temporal System Call Pattern Mining for Efficient Intrusion Detection
/jucs_22_4/a_novel_similar_temporal
page 475 - 493
Vol.22 / Issue 4
C. Rechberger, V. Rijmen:
New Results on NMAC/HMAC when Instantiated with Popular Hash Functions
/jucs_14_3/new_results_on_nmac
page 347 - 376
Vol.14 / Issue 3
K. Salah, M.-A.-R. Al-Khiaty, R. Ahmed, A. Mahdi:
Performance Evaluation of Snort under Windows 7 and Windows Server 2008
/jucs_17_11/performance_evaluation_of_snort
page 1605 - 1622
Vol.17 / Issue 11
B. Santoso, C. Su:
A New Identification Scheme based on Syndrome Decoding Problem with Provable Security against Quantum Adversaries
/jucs_25_3/a_new_identification_scheme
page 294 - 308
Vol.25 / Issue 3
G. Schellhorn:
ASM Refinement Preserving Invariants
/jucs_14_12/asm_refinement_preserving_invariants
page 1929 - 1948
Vol.14 / Issue 12
K. Shankar, M. Elhoseny:
Trust Based Cluster Head Election of Secure Message Transmission in MANET Using Multi Secure Protocol with TDES
/jucs_25_10/trust_based_cluster_head
page 1221 - 1239
Vol.25 / Issue 10
K.-A. Shim:
Security Analysis of Three Password Authentication Schemes
/jucs_17_11/security_analysis_of_three
page 1623 - 1633
Vol.17 / Issue 11
K. Simon, C. Moucha, J. Keller:
Contactless Vulnerability Analysis using Google and Shodan
/jucs_23_4/contactless_vulnerability_analysis_using
page 404 - 430
Vol.23 / Issue 4
S. Sitaraman, S. Venkatesan:
Low-Intrusive Consistent Disk Checkpointing: A Tool for Digital Forensics
/jucs_11_1/low_intrusive_consistent_disk
page 20 - 36
Vol.11 / Issue 1
C.H. Suen:
VIMM: Runtime Integrity Measurement of a Virtualized Operating System
/jucs_16_4/vimm_runtime_integrity_measurement
page 554 - 576
Vol.16 / Issue 4
Y.-F. Tseng, C.-I. Fan, C.-W. Lin:
Provably Secure Ciphertext-Policy Attribute-Based Encryption from Identity-Based Encryption
/jucs_25_3/provably_secure_ciphertext_policy
page 182 - 202
Vol.25 / Issue 3
A.V. Uzunov, E.B. Fernandez, K. Falkner:
Engineering Security into Distributed Systems: A Survey of Methodologies
/jucs_18_20/engineering_security_into_distributed
page 2920 - 3006
Vol.18 / Issue 20
X. Wang, W. Wang, B. Xu, P. Du, L. Li, M. Liu:
A Fine-Grained Hardware Security Approach for Runtime Code Integrity in Embedded Systems
/jucs_24_4/a_fine_grained_hardware
page 515 - 536
Vol.24 / Issue 4
S. Wendzel, W. Mazurczyk, S. Zander:
Unified Description for Network Information Hiding Methods
/jucs_22_11/unified_description_for_network
page 1456 - 1486
Vol.22 / Issue 11
S. Wendzel, F. Link, D. Eller, W. Mazurczyk:
Detection of Size Modulation Covert Channels Using Countermeasure Variation
/jucs_25_11/detection_of_size_modulation
page 1396 - 1416
Vol.25 / Issue 11
S. Wendzel, C. Palmer:
Creativity in Mind: Evaluating and Maintaining Advances in Network Steganographic Research
/jucs_21_12/creativity_in_mind_evaluating
page 1684 - 1705
Vol.21 / Issue 12
Z. Đurić, O. Marić, D. Gašević:
Internet Payment System: A New Payment System for Internet Transactions
/jucs_13_4/internet_payment_system_a
page 479 - 503
Vol.13 / Issue 4