O.A. Alzubi, T.M. Chen, J.A. Alzubi, H. Rashaideh, N. Al-Najdawi: Secure Channel Coding Schemes based on Algebraic-Geometric Codes over Hermitian Curves /jucs_22_4/secure_channel_coding_schemes
H.B. Attia, L. Kahloul, S. Benharzallah: A New Hybrid Access Control Model for Security Policies in Multimodal Applications Environments /jucs_24_4/a_new_hybrid_access
T. Bajtoš, P. Sokol, A. Gajdoš, K. Lučivjanská, T. Mézešová: Analysis of the Infection and the Injection Phases of the Telnet Botnets /jucs_25_11/analysis_of_the_infection
A. Baraani-Dastjerdi, J. Pieprzyk, R. Safavi-Naini, J.R. Getta: Using Cryptographic Hash Functions for Discretionary Access Control in Object-Oriented Databases /jucs_3_6/using_cryptographic_functions_for
P. Danner, D. Hein: A Trusted Computing Identity Collation Protocol to Simplify Deployment of New Disaster Response Devices /jucs_16_9/a_trusted_computing_identity
H.M. Fardoun, A. Mashat, S.R. López: Applying Professional Solutions within the Educational Environments by Means of Cloud Computing: Coaching for Teachers /jucs_19_12/applying_professional_solutions_within
W. Graniszewski, J. Krupski, K. Szczypiorski: SOMSteg - Framework for Covert Channel, and its Detection, within HTTP /jucs_24_7/somsteg_framework_for_covert
M. Huang, M. Xu, T. Qiao, T. Wu, N. Zheng: Designing Statistical Model-based Discriminator for Identifying Computer-generated Graphics from Natural Images /jucs_25_9/designing_statistical_model_based
A. Imran, S.A. Aljawarneh, K. Sakib: Web Data Amalgamation for Security Engineering: Digital Forensic Investigation of Open Source Cloud /jucs_22_4/web_data_amalgamation_for
A.K. Jha, W.J. Lee: Analysis of Permission-based Security in Android through Policy Expert, Developer, and End User Perspectives /jucs_22_4/analysis_of_permission_based
R. Keidel, S. Wendzel, S. Zillien, E.S. Conner, G. Haas: WoDiCoF - A Testbed for the Evaluation of (Parallel) Covert Channel Detection Algorithms /jucs_24_5/wodicof_a_testbed_for
A. Nenadic, N. Zhang, B. Cheetham, C. Goble: RSA-based Certified Delivery of E-Goods Using Verifiable and Recoverable Signature Encryption /jucs_11_1/rsa_based_certified_delivery
V. Radhakrishna, P.V. Kumar, V. Janaki: A Novel Similar Temporal System Call Pattern Mining for Efficient Intrusion Detection /jucs_22_4/a_novel_similar_temporal
B. Santoso, C. Su: A New Identification Scheme based on Syndrome Decoding Problem with Provable Security against Quantum Adversaries /jucs_25_3/a_new_identification_scheme
K. Shankar, M. Elhoseny: Trust Based Cluster Head Election of Secure Message Transmission in MANET Using Multi Secure Protocol with TDES /jucs_25_10/trust_based_cluster_head
X. Wang, W. Wang, B. Xu, P. Du, L. Li, M. Liu: A Fine-Grained Hardware Security Approach for Runtime Code Integrity in Embedded Systems /jucs_24_4/a_fine_grained_hardware
S. Wendzel, F. Link, D. Eller, W. Mazurczyk: Detection of Size Modulation Covert Channels Using Countermeasure Variation /jucs_25_11/detection_of_size_modulation