Home // Sec
International Journal On Advances in Security, volume 2, number 1, 2009
Type: journal
Notes: A free access journal featuring works submitted on an invitation basis only.
ISSN: 1942-2636
Articles: there are 9 articles
A Novel Countermeasure to Resist Side Channel Attacks on FPGA Implementations
Y. Zafar and D. Har
keywords: Side Channel Attacks; countermeasures; FPGAs; frequency hopping
Meta-Design with Safe and Secure Embedded System Networking
Miroslav Sveda and Radimir Vrba
keywords: embedded system application; networking; security; safety; meta-design
Security and Authentication Architecture Using MPEG-21 for Wireless Patient Monitoring Systems
Wolfgang Leister, Truls Fretland, and Ilangko Balasingham
keywords: MPEG-21, security, biomedical sensor networks, medical digital item
A Distributed Reputation System for Super-Peer Desktop Grids
Peter Merz, Florian Kolter, and Matthias Priebe
keywords: Peer-to-Peer; Distributed Computing; Desktop Grids; Free-Riding; Reputation Systems
A Secure P2P Incentive Mechanism for Mobile Devices
Jani Suomalainen, Anssi Pehrsson, and Jukka K. Nurminen
keywords: P2P; security analysis; incentive; mobile devices; BitTorrent
Peer-to-peer Networks: Security Analysis
Jirí Schäfer, Kamil Malinka, and Petr Hanáček
keywords: P2P, malware, behavior analysis, botnets, DoS.
User Preferences to Support Privacy Policy Handling in Pervasive/Ubiquitous Systems
Elizabeth Papadopoulou, Sarah McBurney, Nick Taylor, M. Howard Williams, and Yussuf Abu Shaaban
keywords: User preferences; privacy; pervasive systems; policies
Software Vulnerability vs. Critical Infrastructure - a Case Study of Antivirus Software
Juhani Eronen, Kati Karjalainen, Rauli Puuperä, Erno Kuusela, Kimmo Halunen, Marko Laakso, and Juha Röning
keywords: Vulnerabilities, critical infrastructure, dependency analysis, antivirus software
DATA FORMAT DESCRIPTION AND ITS APPLICATIONS IN IT SECURITY
Michael Hartle, Andreas Fuchs, Marcus Ständer, Daniel Schumann, and Max Mühlhäuser
keywords: Data format description, finite bit sequences, documentation of exploits, formal security validation