Home // Sec

International Journal On Advances in Security, volume 2, number 1, 2009

Type: journal

Notes: A free access journal featuring works submitted on an invitation basis only.

ISSN: 1942-2636

Articles: there are 9 articles

A Novel Countermeasure to Resist Side Channel Attacks on FPGA Implementations
Y. Zafar and D. Har
keywords: Side Channel Attacks; countermeasures; FPGAs; frequency hopping

Meta-Design with Safe and Secure Embedded System Networking
Miroslav Sveda and Radimir Vrba
keywords: embedded system application; networking; security; safety; meta-design

Security and Authentication Architecture Using MPEG-21 for Wireless Patient Monitoring Systems
Wolfgang Leister, Truls Fretland, and Ilangko Balasingham
keywords: MPEG-21, security, biomedical sensor networks, medical digital item

A Distributed Reputation System for Super-Peer Desktop Grids
Peter Merz, Florian Kolter, and Matthias Priebe
keywords: Peer-to-Peer; Distributed Computing; Desktop Grids; Free-Riding; Reputation Systems

A Secure P2P Incentive Mechanism for Mobile Devices
Jani Suomalainen, Anssi Pehrsson, and Jukka K. Nurminen
keywords: P2P; security analysis; incentive; mobile devices; BitTorrent

Peer-to-peer Networks: Security Analysis
Jirí Schäfer, Kamil Malinka, and Petr Hanáček
keywords: P2P, malware, behavior analysis, botnets, DoS.

User Preferences to Support Privacy Policy Handling in Pervasive/Ubiquitous Systems
Elizabeth Papadopoulou, Sarah McBurney, Nick Taylor, M. Howard Williams, and Yussuf Abu Shaaban
keywords: User preferences; privacy; pervasive systems; policies

Software Vulnerability vs. Critical Infrastructure - a Case Study of Antivirus Software
Juhani Eronen, Kati Karjalainen, Rauli Puuperä, Erno Kuusela, Kimmo Halunen, Marko Laakso, and Juha Röning
keywords: Vulnerabilities, critical infrastructure, dependency analysis, antivirus software

DATA FORMAT DESCRIPTION AND ITS APPLICATIONS IN IT SECURITY
Michael Hartle, Andreas Fuchs, Marcus Ständer, Daniel Schumann, and Max Mühlhäuser
keywords: Data format description, finite bit sequences, documentation of exploits, formal security validation