Volume 28, Numbers 1-2, February - March 2009
: Why Johnny can't surf (safely)? Attacks and defenses for web users.
K. Vimal Kumar
: Securing communication using function extraction technology for malicious code behavior analysis.
Volume 28, Numbers 3-4, May - June 2009
, Can Berk Güder
: Understanding the limitations of S/MIME digital signatures for e-mails: A GUI based approach.
, Chin-Chen Chang
: An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem.
P. P. Deepthi
, P. S. Sathidevi
: Design, implementation and analysis of hardware efficient stream ciphers using LFSR based hash functions.
Volume 28, Number 5, July 2009
Volume 28, Number 6, September 2009
Volume 28, Number 7, October 2009
: A schema for protecting the integrity of databases.
: Design and implementation of highly reliable dual-computer systems.
Volume 28, Number 8, November 2009
: DNS-based email sender authentication mechanisms: A critical review.
, Bin Xiao
, Xicheng Lu
: Using a bioinformatics approach to generate accurate exploit-based signatures for polymorphic worms.