Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2642)
Editorial
(400)
by Journal
by Funding Agency
Clear filters
Powered by
81 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: K.6.5 - Security and Protection
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
6
7
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Enabling Personal Privacy for Pervasive Computing Environments
Susana Bagüés
,
Andreas Zeidler
,
Cornel Klein
,
Carlos Valdivielso
,
Ignacio Matias
10.3217/jucs-016-03-0341
01-02-2010
Unique: 424 | Total: 495
| Access Period:
341-371
HTML
XML
PDF
Research Article
Managing Security and its Maturity in Small and Medium-sized Enterprises
Luis Sánchez
,
Antonio Parra
,
David G. Rosado
,
Mario Piattini
10.3217/jucs-015-15-3038
01-09-2009
Unique: 446 | Total: 551
| Access Period:
3038-3058
HTML
XML
PDF
Research Article
A User Controlled Approach for Securing Sensitive Information in Directory Services
William Claycomb
,
Dongwan Shin
10.3217/jucs-015-15-2999
01-09-2009
Unique: 381 | Total: 450
| Access Period:
2999-3018
HTML
XML
PDF
Research Article
Graph-Based Approach to the Edit Distance Cryptanalysis of Irregularly Clocked Linear Feedback Shift Registers
Pino Caballero-Gil
,
Amparo Fúster-Sabater
,
Candelaria Hernández-Goya
10.3217/jucs-015-15-2981
01-09-2009
Unique: 337 | Total: 389
| Access Period:
2981-2998
HTML
XML
PDF
Research Article
Certificate-based Signatures Revisited
Wei Wu
,
Yi Mu
,
Willy Susilo
,
Xinyi Huang
10.3217/jucs-015-08-1659
28-04-2009
Unique: 358 | Total: 416
| Access Period:
1659-1684
HTML
XML
PDF
Research Article
Security Mechanisms and Access Control Infrastructure for e-Passports and General Purpose e-Documents
Pablo Najera
,
Francisc Moyano
,
Javier López
10.3217/jucs-015-05-0970
01-03-2009
Unique: 362 | Total: 445
| Access Period:
970-991
HTML
XML
PDF
Research Article
A New Fair Non-repudiation Protocol for Secure Negotiation and Contract Signing
Antonio Ruiz-Martínez
,
C. Marín-López
,
Laura Baño-López
,
Antonio Skarmeta
10.3217/jucs-015-03-0555
01-02-2009
Unique: 468 | Total: 536
| Access Period:
555-583
HTML
XML
PDF
Research Article
DS RBAC - Dynamic Sessions in Role Based Access Control
Joerg Muehlbacher
,
Christian Praher
10.3217/jucs-015-03-0538
01-02-2009
Unique: 405 | Total: 465
| Access Period:
538-554
HTML
XML
PDF
Research Article
Stability in Heterogeneous Multimedia Networks under Adversarial Attacks
Dimitrios Koukopoulos
10.3217/jucs-015-02-0444
28-01-2009
Unique: 353 | Total: 420
| Access Period:
444-464
HTML
XML
PDF
Research Article
Non-repudiation Mechanism of Agent-based Mobile Payment Systems: Perspectives on Wireless PKI
Chung-Ming Ou
,
Chung-Ren Ou
10.3217/jucs-014-14-2309
28-07-2008
Unique: 356 | Total: 426
| Access Period:
2309-2328
HTML
XML
PDF
Research Article
Enhancing ZRTP by using Computational Puzzles
Helmut Hlavacs
,
Wilfried Gansterer
,
Hannes Schabauer
,
Joachim Zottl
,
Martin Petraschek
,
Thomas Hoeher
,
Oliver Jung
10.3217/jucs-014-05-0693
01-03-2008
Unique: 406 | Total: 473
| Access Period:
693-716
HTML
XML
PDF
Research Article
Security and Usability Aspects of Man-in-the-Middle Attacks on ZRTP
Martin Petraschek
,
Thomas Hoeher
,
Oliver Jung
,
Helmut Hlavacs
,
Wilfried Gansterer
10.3217/jucs-014-05-0673
01-03-2008
Unique: 302 | Total: 364
| Access Period:
673-692
HTML
XML
PDF
6
7
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK