Select All | Select None
Login failed. Please try again.
Forgot your password?
Log in with Facebook
Log in with Google
You can now keep track of new articles from Computers and Security on your personalized homepage!
Andrew Harding, technical director of clientless VPN provider Neoteris, argues the case for SSL VPNs.
The infamous ‘419’ advance fee fraud scam is a major source of spam which takes its victims for hundreds of millions of dollars yearly. Email headers confirm that much of this traffic currently comes out of Lagos and Amsterdam. 419ers also create phony bank websites. Ad hoc information...
We are living in an increasingly connected world, not only in the office, but at home; a world in which more and more personal data is being stored in huge databases. With the increasing demands for personal data, often far in excess of the data required for the transaction in hand, so too does...
This paper describes a series of experiments in which specific deceptions were created in order to induce red teams attacking computer networks to attack network elements in sequence. It demonstrates the ability to control the path of an attacker through the use of deceptions and allows us to...
Recently, Wu and Chang and Shen and Chen separately proposed a cryptographic key assignment scheme for solving access control problem in a partially ordered user hierarchy. However, this paper will show the security leaks inherent in both schemes based on polynomial interpolations. That is, the...
In our last column we took a look at analysing evidence. There are lots of other issues to consider in the analysis process that, by the nature and brevity of this column were not addressed. However, no one expects that after reading a few narrowly focused columns on electronic forensics to have...
Computer security, and intrusion detection in particular, has become increasingly important in today’s business environment, to ensure safe and trusted commerce between business partners as well as effective organizational functioning. Various approaches to intrusion detection are currently...
results per page
Save this article to read later. You can see your Read Later on your DeepDyve homepage.
To save an article, log in first, or sign up for a DeepDyve account if you don't already have one.
Sign Up Log In
To subscribe to email alerts, please log in first, or sign up for a DeepDyve account if you don't already have one.
Read and print from thousands of top scholarly journals.
Sign up with Facebook
Sign up with Google
Already have an account? Log in
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don't already have one.