Computers & Security free articles

-Improvement of keystroke data quality through artificial rhythms and cues
-Efficient identity-based RSA multisignatures
-Cryptanalysis of simple three-party key exchange protocol
-Enterprise information security strategies
-A global security architecture for intrusion detection on computer networks
-Containing large-scale worm spreading in the Internet by cooperative distribution of traffic filtering policies

Origine de l’article :
http://www.sciencedirect.com/science?_ob=PublicationURL&_tockey=%23TOC%235870%232008%23999729998%23692183%23FLA%23&_cdi=5870&_pubType=J&_auth=y&_version=1&_urlVersion=0&_userid=10&md5=ae4f7e0cc5a74811c588e11fc178102b