Skip to main content
padlock icon - secure page this page is secure

Publisher: Elsevier

Volume 66, Number 9, 2006

Cover 2 - Editorial Board
pp. CO2-CO2(1)

Favourites:
ADD

Special issue: Security in grid and distributed systems
pp. 1113-1115(3)
Authors: Shi, W.; Xu, C. Z.; Zhou, X.

Favourites:
ADD

M-TREE: A high efficiency security architecture for protecting integrity and privacy of software
pp. 1116-1128(13)
Authors: Lu, C.; Zhang, T.; Shi, W.; Lee, H. H.

Favourites:
ADD

Hardware/software optimization for array & pointer boundary checking against buffer overflow attacks
pp. 1129-1136(8)
Authors: Shao, Z.; Cao, J.; Chan, K. C.; Xue, C.; Sha, E. H.

Favourites:
ADD
Favourites:
ADD

Honeypot back-propagation for mitigating spoofing distributed Denial-of-Service attacks
pp. 1152-1164(13)
Authors: Khattab, S.; Melhem, R.; Mosse, D.; Znati, T.

Favourites:
ADD
Favourites:
ADD

The Trellis security infrastructure for overlay metacomputers and bridged distributed file systems
pp. 1181-1188(8)
Authors: Lu, P.; Closson, M.; Macdonell, C.; Nalos, P.; Ngo, D.; Kan, M.; Lee, M.

Favourites:
ADD
Favourites:
ADD

Mutual anonymous overlay multicast
pp. 1205-1216(12)
Authors: Xiao, L.; Liu, Y.; Gu, W.; Xuan, D.; Liu, X.

Favourites:
ADD

Securing decentralized reputation management using TrustGuard
pp. 1217-1232(16)
Authors: Srivatsa, M.; Liu, L.

Favourites:
ADD

Virtual Leashing: Creating a computational foundation for software protection
pp. 1233-1240(8)
Authors: Dvir, O.; Herlihy, M.; Shavit, N. N.

Favourites:
ADD

  • Access Key
  • Free content
  • Partial Free content
  • New content
  • Open access content
  • Partial Open access content
  • Subscribed content
  • Partial Subscribed content
  • Free trial content
Cookie Policy
X
Cookie Policy
Ingenta Connect website makes use of cookies so as to keep track of data that you have filled in. I am Happy with this Find out more