


default search action
EAI Endorsed Transactions on Security and Safety, Volume 2
Volume 2, Number 3, January 2015
- Raoul Strackx, Pieter Agten, Niels Avonds, Frank Piessens:
Salus: Kernel Support for Secure Process Compartments. e1 - Ibrahim F. Elashry, Yi Mu, Willy Susilo
:
Mediated Encryption: Analysis and Design. e2 - Daouda Ahmat, Damien Magoni
, Tegawendé F. Bissyandé:
End-to-End Key Exchange through Disjoint Paths in P2P Networks. e3 - Xinxin Fan, Kalikinkar Mandal, Guang Gong:
WG-8: A Lightweight Stream Cipher for Resource-Constrained Smart Devices. e4 - Leandros A. Maglaras
, Jianmin Jiang:
A novel intrusion detection method based on OCSVM and K-means recursive clustering. e5
Volume 2, Number 4, October 2015
- Kai Chen, Jun Shao:
Preface to special issue on miscellaneous emerging security problems. e1 - Pieter Burghouwt, Marcel E. M. Spruit, Henk J. Sips:
Detection of Botnet Command and Control Traffic by the Multistage Trust Evaluation of Destination Identifiers. e2 - Christopher Kugler, Tilo Müller:
Separated Control and Data Stacks to Mitigate Buffer Overflow Exploits. e3 - Fahad Alarifi, Maribel Fernández:
Towards Privacy-Preserving Web Metering Via User-Centric Hardware. e4 - Yazhe Wang, Mingming Hu, Chen Li:
UAuth: A Strong Authentication Method from Personal Devices to Multi-accounts. e5 - Minghui Zhu, Peng Liu:
Reviewing the book "Principles of Cyber-physical Systems" from a security perspective. e6
Volume 2, Number 5, October 2015
- Marshall Brinn, Nicholas Bastin, Andy C. Bavier, Mark Berman, Jeffrey S. Chase, Robert Ricci
:
Trust as the Foundation of Resource Exchange in GENI. e1 - Jing Zhang, Meili Zhi, Yuting Su, Qingzhong Liu
:
Mobile Watermarking against Geometrical Distortions. e2 - Zhaoyuan Wang, Huanlai Xing
, Tianrui Li
, Yan Yang, Rong Qu
:
An Improved MOEA/D for QoS Oriented Multimedia Multicasting with Network Coding. e3 - Fangwei Li, Xinyu Zhang, Jiang Zhu, Wang Yan:
A improved Network Security Situation Awareness Model. e4 - Fangwei Li, Qing Huang, Jiang Zhu, Zhuxun Peng:
Network Security Risk Assessment Based on Item Response Theory. e5
Volume 2, Number 6, November 2015
- Qingzhong Liu
, Andrew H. Sung
, Lei Chen, Ming Yang, Zhongxue Chen
, Yanxin Liu, Jing Zhang:
A Method to Detect AAC Audio Forgery. e1 - Fangwei Li, Wang Yan, Jiang Zhu, Zhang Xinyue:
A Hierarchical of Security Situation Element Acquisition Mechanism in Wireless Sensor Network. e2 - Xiqing Zhang, Yuan Feng, Feng Hong, Zhongwen Guo:
Redundancy Elimination in DTN via ACK Mechanism. e3 - Chung-Yen Su, Jeng-Ji Huang, Che-Yang Shih, Yu-Tang Chen:
Reversible and Embedded Watermarking of Medical Images for Telemedicine. e4 - Christian T. Zenger
, Jan Zimmer, Christof Paar:
Security Analysis of Quantization Schemes for Channel-based Key Extraction. e5

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.