{"title":"Security for Wireless Sensor Networks","authors":"Donggang Liu, P. Ning","doi":"10.1007/978-0-387-46781-8","DOIUrl":"https://doi.org/10.1007/978-0-387-46781-8","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123201014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Preserving Privacy in On-Line Analytical Processing (OLAP)","authors":"Lingyu Wang, S. Jajodia, D. Wijesekera","doi":"10.1007/978-0-387-46274-5","DOIUrl":"https://doi.org/10.1007/978-0-387-46274-5","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114186033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks","authors":"R. Poovendran, Cliff X. Wang, Sumit Roy","doi":"10.1007/978-0-387-46276-9","DOIUrl":"https://doi.org/10.1007/978-0-387-46276-9","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131447899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computer Viruses and Malware","authors":"John Aycock","doi":"10.1007/0-387-34188-9","DOIUrl":"https://doi.org/10.1007/0-387-34188-9","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122295062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Understanding Intrusion Detection Through Visualization","authors":"Stefan Axelsson, David Sands","doi":"10.1007/0-387-27636-X","DOIUrl":"https://doi.org/10.1007/0-387-27636-X","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116321843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hop Integrity in the Internet","authors":"Chin-Tser Huang, M. Gouda","doi":"10.1007/0-387-29444-9","DOIUrl":"https://doi.org/10.1007/0-387-29444-9","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122256686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Biometric User Authentication for it Security - From Fundamentals to Handwriting","authors":"C. Vielhauer","doi":"10.1007/0-387-28094-4","DOIUrl":"https://doi.org/10.1007/0-387-28094-4","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127684554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Impacts and Risk Assessment of Technology for Internet Security - Enabled Information Small-Medium Enterprises (TEISMES)","authors":"C. Shoniregun","doi":"10.1007/b137376","DOIUrl":"https://doi.org/10.1007/b137376","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129802960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Austin Protocol Compiler","authors":"Tommy M. McGuire, M. Gouda","doi":"10.1007/b101038","DOIUrl":"https://doi.org/10.1007/b101038","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115775804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Primality Testing and Integer Factorization in Public-Key Cryptography","authors":"S. Yan","doi":"10.1007/978-1-4757-3816-2","DOIUrl":"https://doi.org/10.1007/978-1-4757-3816-2","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133811510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}