


default search action
Computers & Security, Volume 66
Volume 66, May 2017
- Seung-Hyun Kim
, In-Young Ko, Soo-Hyung Kim:
Quality of Private Information (QoPI) model for effective representation and prediction of privacy controls in mobile computing. 1-19 - Adeel Anjum, Guillaume Raschia, Marc Gelgon, Abid Khan
, Saif Ur Rehman Malik
, Naveed Ahmad, Mansoor Ahmed
, Sabah Suhail, Masoom Alam:
τ-safety: A privacy model for sequential publication with arbitrary updates. 20-39 - Kathryn Parsons, Dragana Calic, Malcolm Robert Pattinson, Marcus A. Butavicius, Agata McCormac, Tara Zwaans:
The Human Aspects of Information Security Questionnaire (HAIS-Q): Two further validation studies. 40-51 - Jinyoung Han
, Yoo Jung Kim, Hyungjin Lukas Kim
:
An integrative model of information security policy compliance with psychological contract: Examining a bilateral perspective. 52-65 - Firas Saidi, Zouheir Trabelsi, Khaled Salah, Henda Ben Ghézala
:
Approaches to analyze cyber terrorist communities: Survey and challenges. 66-80 - Inez Miyamoto, Thomas H. Holzer, Shahryar Sarkani:
Why a counterfeit risk avoidance strategy fails. 81-96 - Abdelhak Mesbah, Jean-Louis Lanet, Mohamed Mezghiche:
Reverse engineering a Java Card memory management algorithm. 97-114 - Toan Van Nguyen, Napa Sae-Bae, Nasir D. Memon
:
DRAW-A-PIN: Authentication using finger-drawn PIN on touch devices. 115-128 - Debora Jeske
, Paul van Schaik:
Familiarity with Internet threats: Beyond awareness. 129-141 - Bhupendra Singh
, Upasna Singh
:
A forensic insight into Windows 10 Cortana search. 142-154 - Nilesh Chakraborty, Samrat Mondal
:
On designing a modified-UI based honeyword generation approach for overcoming the existing limitations. 155-168 - Abdul Razaque
, Syed S. Rizvi, Meer J. Khan, Qassim B. Hani, Julius P. Dichter, Reza M. Parizi:
Secure and quality-of-service-supported service-oriented architecture for mobile cloud handoff process. 169-184 - Fatih Turkmen
, Jerry den Hartog, Silvio Ranise
, Nicola Zannone
:
Formal analysis of XACML policies using SMT. 185-203 - Junqing Le, Xiaofeng Liao, Bo Yang:
Full autonomy: A novel individualized anonymity model for privacy preserving. 204-217 - Salvatore Aurigemma, Thomas Mattson:
Privilege or procedure: Evaluating the effect of employee status on intent to comply with socially interactive information security threats and controls. 218-234

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.