default search action
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Volume 3
Volume 3, Numbers 1/2, March 2012
- Yoshiaki Hori, William R. Claycomb, Kangbin Yim:
Frontiers in Insider Threats and Data Leakage Prevention. 1-3 - Dieter Gollmann:
From Insider Threats to Business Processes that are Secure-by-Design. 4-12 - Malek Ben Salem, Salvatore J. Stolfo:
Combining Baiting and User Search Profiling Techniques for Masquerade Detection. 13-29 - Naoto Yanai, Raylin Tso, Masahiro Mambo, Eiji Okamoto:
A Certificateless Ordered Sequential Aggregate Signature Scheme Secure against Super Adverssaries. 30-54 - Takashi Nishide, Shingo Miyazaki, Kouichi Sakurai:
Security Analysis of Offline E-cash Systems with Malicious Insider. 55-71 - Yuanjie Zhao, Xiaofeng Chen, Hua Ma, Qiang Tang, Hui Zhu:
A New Trapdoor-indistinguishable Public Key Encryption with Keyword Search. 72-81 - Shuyuan Mary Ho, Hwajung Lee:
A Thief among Us: The Use of Finite-State Machines to Dissect Insider Threat in Cloud Communications. 82-98 - Takayuki Sasaki:
A Framework for Detecting Insider Threats using Psychological Triggers. 99-119 - Ruo Ando, Kazushi Takahashi, Kuniyasu Suzaki:
Inter-domain Communication Protocol for Real-time File Access Monitor of Virtual Machine. 120-137
Volume 3, Number 3, September 2012
- Fatos Xhafa:
Advances in Mobility Services and Protocols for Cognitive and Ubiquitous Applications. 1-3 - Chyi-Ren Dow, Yu-Hong Lee, Pa Hsuan, Yi-Tung Lee, Shiow-Fen Hwang:
Omnibone: An Efficient Service Data Circulation and Discovery Scheme in VANETs. 4-20 - Muhammad Awais Azam, Jonathan Loo, Sardar Kashif Ashraf Khan, Usman Naeem, Muhammad Adeel, Waleed Ejaz:
Behavioural Patterns Analysis of Low Entropy People Using Proximity Data. 21-40 - Karl Andersson, Muslim Elkotob:
Rethinking IP Mobility Management. 41-49 - Clara Maria Colombini, Antonio Colella:
Digital scene of crime: technique of profiling users. 50-73 - Noriki Uchida, Kazuo Takahata, Yoshitaka Shibata, Norio Shiratori:
Never Die Network Based on Cognitive Wireless Network and Satellite System for Large Scale Disaster. 74-93 - Amy Poh Ai Ling, Kokichi Sugihara, Masao Mukaidono:
Enhancing Smart Grid System Processes via Philosophy of Security - Case Study based on Information Security Systems -. 94-112
Volume 3, Number 4, December 2012
- Kouichi Sakurai, Dieter Gollmann:
Managing Insider Security Threats (MIST 2012 Volume 1). 1-3 - William R. Claycomb, Carly L. Huth, Lori Flynn, David M. McIntire, Todd B. Lewellen:
Chronological Examination of Insider Threat Sabotage: Preliminary Observations. 4-20 - Shinsaku Kiyomoto, Kazuhide Fukushima, Yutaka Miyake:
Design of Categorization Mechanism for Disaster-Information-Gathering System. 21-34 - Byungha Choi, Kyungsan Cho:
Detection of Insider Attacks to the Web Server. 35-45 - S. Sree Vivek, S. Sharmila Deva Selvi, Ramarathnam Venkatesan, C. Pandu Rangan:
A Special Purpose Signature Scheme for Secure Computation of Traffic in a Distributed Network. 46-60 - Jianfeng Wang, Hua Ma, Qiang Tang, Jin Li, Hui Zhu, Siqi Ma, Xiaofeng Chen:
A New Efficient Verifiable Fuzzy Keyword Search Scheme. 61-71 - S. Sree Vivek, S. Sharmila Deva Selvi, Salini Selvaraj Kowsalya, C. Pandu Rangan:
PKI Based Signcryption without Pairing: an Efficient Scheme with Tight Security Reduction. 72-84 - Kangwon Lee, Kyungroul Lee, Jaecheon Byun, Sunghoon Lee, Hyobeom Ahn, Kangbin Yim:
Extraction of Platform-unique Information as an Identifier. 85-99
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.