Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2648)
Editorial
(401)
by Journal
by Funding Agency
Clear filters
Powered by
81 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: K.6.5 - Security and Protection
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
3
4
5
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Interoperability Framework for Multimodal Biometry: Open Source in Action
Miloš Milovanović
,
Miroslav Minović
,
Starčević Dušan
Part of: Some Reflections about Service Oriented Architectures, Cloud Computing Applications, Services and Interoperability
10.3217/jucs-018-11-1558
01-06-2012
Unique: 536 | Total: 708
| Access Period:
1558-1575
HTML
XML
PDF
Research Article
Directed Path Based Authentication Scheme for the Internet of Things
Huansheng Ning
,
Hong Liu
,
Qing Liu
,
Genlin Ji
Part of: Internet of Things
10.3217/jucs-018-09-1112
01-05-2012
Unique: 512 | Total: 652
| Access Period:
1112-1131
HTML
XML
PDF
Research Article
A Framework for the Comparison of Best Practice Recommendations and Legal Requirements for South African Banks
Carla-Lee Botha
,
Elmarie Kritzinger
,
Marianne Loock
Part of: Security in Information Systems: New Challenges and Opportunities
10.3217/jucs-018-06-0845
28-03-2012
Unique: 490 | Total: 641
| Access Period:
845-856
HTML
XML
PDF
Research Article
A Systematic Review of Information Security Governance Frameworks in the Cloud Computing Environment
Oscar Rebollo
,
Daniel Mellado
,
Eduardo Fernández-Medina
Part of: Security in Information Systems: New Challenges and Opportunities
10.3217/jucs-018-06-0798
28-03-2012
Unique: 657 | Total: 883
| Access Period:
798-815
HTML
XML
PDF
Research Article
Success Rate of Remote Code Execution Attacks - Expert Assessments and Observations
Hannes Holm
,
Teodor Sommestad
,
Ulrik Franke
,
Mathias Ekstedt
Part of: Security in Information Systems: New Challenges and Opportunities
10.3217/jucs-018-06-0732
28-03-2012
Unique: 614 | Total: 846
| Access Period:
732-749
HTML
XML
PDF
Research Article
Cost-Sensitive Spam Detection Using Parameters Optimization and Feature Selection
Sang Lee
,
Dong Kim
,
Jong Park
10.3217/jucs-017-06-0944
28-03-2011
Unique: 308 | Total: 364
| Access Period:
944-960
HTML
XML
PDF
Research Article
Improving Security Levels of IEEE802.16e Authentication by Involving Diffie-Hellman PKDS
Yi-Li Huang
,
Fang-Yie Leu
,
Chao-Hong Chiu
,
I-Long Lin
10.3217/jucs-017-06-0891
28-03-2011
Unique: 403 | Total: 484
| Access Period:
891-911
HTML
XML
PDF
Research Article
Security and Privacy Preservation for Mobile E-Learning via Digital Identity Attributes
Jianming Yong
10.3217/jucs-017-02-0296
28-01-2011
Unique: 372 | Total: 435
| Access Period:
296-310
HTML
XML
PDF
Research Article
Developing a Secure Mobile Grid System through a UML Extension
David G. Rosado
,
Eduardo Fernández-Medina
,
Javier López
,
Mario Piattini
10.3217/jucs-016-17-2333
01-09-2010
Unique: 399 | Total: 494
| Access Period:
2333-2352
HTML
XML
PDF
Research Article
VIMM: Runtime Integrity Measurement of a Virtualized Operating System
Chun Suen
10.3217/jucs-016-04-0554
28-02-2010
Unique: 366 | Total: 455
| Access Period:
554-576
HTML
XML
PDF
Research Article
Performance Optimizations for DAA Signatures on Java enabled Platforms
Kurt Dietrich
,
Franz Röck
10.3217/jucs-016-04-0519
28-02-2010
Unique: 349 | Total: 394
| Access Period:
519-530
HTML
XML
PDF
Research Article
On Reliable Platform Configuration Change Reporting Mechanisms for Trusted Computing Enabled Platforms
Kurt Dietrich
10.3217/jucs-016-04-0507
28-02-2010
Unique: 329 | Total: 369
| Access Period:
507-518
HTML
XML
PDF
1
2
3
4
5
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK