Volume 25; Issue 2

Computers & Security

Volume 25; Issue 2
1

Layered security design for mobile ad hoc networks

Year:
2006
Language:
english
File:
PDF, 298 KB
english, 2006
3

Security considerations for incremental hash functions based on pair block chaining

Year:
2006
Language:
english
File:
PDF, 159 KB
english, 2006
4

About “Unofficial patches”

Year:
2006
Language:
english
File:
PDF, 78 KB
english, 2006
5

The metamorphosis of malware writers

Year:
2006
Language:
english
File:
PDF, 83 KB
english, 2006
6

Security Views - Malware Update

Year:
2006
Language:
english
File:
PDF, 132 KB
english, 2006
7

Calendar of Events

Year:
2006
Language:
english
File:
PDF, 42 KB
english, 2006
8

A new protocol to counter online dictionary attacks

Year:
2006
Language:
english
File:
PDF, 174 KB
english, 2006
9

A framework and taxonomy for comparison of electronic voting schemes

Year:
2006
Language:
english
File:
PDF, 569 KB
english, 2006
10

Uncovering identities: A study into VPN tunnel fingerprinting

Year:
2006
Language:
english
File:
PDF, 255 KB
english, 2006
11

Computer forensics and electronic discovery: The new management challenge

Year:
2006
Language:
english
File:
PDF, 122 KB
english, 2006