books search
books
articles search
articles
Donate
Log In
Log In
to access more features
personal recommendations
Telegram Bot
download history
send to Email or Kindle
manage booklists
save to favorites
Explore
Journals
Contribution
Donate
Litera Library
Donate paper books
Add paper books
Open LITERA Point
Volume 28; Issue 8
Main
Computers & Security
Volume 28; Issue 8
Computers & Security
Volume 28; Issue 8
1
Proposal, design and evaluation of a mechanism to limit the length of anonymous overlay network paths
Juan Pedro Muñoz-Gea
,
Josemaria Malgosa-Sanahuja
,
Pilar Manzanares-Lopez
,
Juan Carlos Sanchez-Aarnoutse
,
Joan Garcia-Haro
Journal:
Computers & Security
Year:
2009
Language:
english
File:
PDF, 388 KB
Your tags:
english, 2009
2
DNS-based email sender authentication mechanisms: A critical review
Amir Herzberg
Journal:
Computers & Security
Year:
2009
Language:
english
File:
PDF, 329 KB
Your tags:
english, 2009
3
Issues and challenges in securing VoIP
Ram Dantu
,
Sonia Fahmy
,
Henning Schulzrinne
,
João Cangussu
Journal:
Computers & Security
Year:
2009
Language:
english
File:
PDF, 669 KB
Your tags:
english, 2009
4
A study of on/off timing channel based on packet delay distribution
Lihong Yao
,
Xiaochao Zi
,
Li Pan
,
Jianhua Li
Journal:
Computers & Security
Year:
2009
Language:
english
File:
PDF, 364 KB
Your tags:
english, 2009
5
OSNP: Secure wireless authentication protocol using one-time key
Y.L. Huang
,
P.H. Lu
,
J.D. Tygar
,
A.D. Joseph
Journal:
Computers & Security
Year:
2009
Language:
english
File:
PDF, 573 KB
Your tags:
english, 2009
6
Reverse OAuth: A solution to achieve delegated authorizations in single sign-on e-learning systems
Jorge Fontenla González
,
Manuel Caeiro Rodríguez
,
Martín Llamas Nistal
,
Luis Anido Rifón
Journal:
Computers & Security
Year:
2009
Language:
english
File:
PDF, 1.68 MB
Your tags:
english, 2009
7
Using a bioinformatics approach to generate accurate exploit-based signatures for polymorphic worms
Yong Tang
,
Bin Xiao
,
Xicheng Lu
Journal:
Computers & Security
Year:
2009
Language:
english
File:
PDF, 989 KB
Your tags:
english, 2009
8
Editorial
Dimitris Gritzalis
,
Tom Karygiannis
Journal:
Computers & Security
Year:
2009
Language:
english
File:
PDF, 99 KB
Your tags:
english, 2009
9
IFC - Editorial Board
Journal:
Computers & Security
Year:
2009
Language:
english
File:
PDF, 44 KB
Your tags:
english, 2009
10
Contents
Journal:
Computers & Security
Year:
2009
Language:
english
File:
PDF, 59 KB
Your tags:
english, 2009
11
IFIP Technical Committee
Journal:
Computers & Security
Year:
2009
Language:
english
File:
PDF, 44 KB
Your tags:
english, 2009
12
IFIP TCII - Aims and Scope
Journal:
Computers & Security
Year:
2009
File:
PDF, 581 KB
Your tags:
2009
13
Call for Papers
Journal:
Computers & Security
Year:
2009
File:
PDF, 1.65 MB
Your tags:
2009
14
Classification of web robots: An empirical study based on over one billion requests
Junsup Lee
,
Sungdeok Cha
,
Dongkun Lee
,
Hyungkyu Lee
Journal:
Computers & Security
Year:
2009
Language:
english
File:
PDF, 1.54 MB
Your tags:
english, 2009
15
PENET: A practical method and tool for integrated modeling of security attacks and countermeasures
Srdjan Pudar
,
G. Manimaran
,
Chen-Ching Liu
Journal:
Computers & Security
Year:
2009
Language:
english
File:
PDF, 1.75 MB
Your tags:
english, 2009
16
Self-efficacy in information security: Its influence on end users' information security practice behavior
Hyeun-Suk Rhee
,
Cheongtag Kim
,
Young U. Ryu
Journal:
Computers & Security
Year:
2009
Language:
english
File:
PDF, 349 KB
Your tags:
english, 2009
1
Follow
this link
or find "@BotFather" bot on Telegram
2
Send /newbot command
3
Specify a name for your chatbot
4
Choose a username for the bot
5
Copy an entire last message from BotFather and paste it here
×
×