Volume 2,
Number 1,
January-March 2005
Editorial
Papers
- Elisa Bertino, Ravi S. Sandhu:
Database Security-Concepts, Approaches, and Challenges.
2-19
- Wenbing Zhao, Louise E. Moser, P. M. Melliar-Smith:
Unification of Transactions and Replication in Three-Tier Architectures Based on CORBA.
20-33
- Yingjiu Li, Vipin Swarup, Sushil Jajodia:
Fingerprinting Relational Databases: Schemes and Specialties.
34-45
- Roy Friedman, Achour Mostéfaoui, Michel Raynal:
Simple and Efficient Oracle-Based Consensus Protocols for Asynchronous Byzantine Systems.
46-56
- Cung Nguyen, G. Robert Redinbo:
Fault Tolerance Design in JPEG 2000 Image Compression System.
57-75
Volume 2,
Number 2,
April-June 2005
Special Section on the 2005 IEEE Symposium on Security and Privacy
Regular Papers
Volume 2,
Number 3,
July-September 2005
Regular Papers
- Kun Sun, Peng Ning, Cliff Wang:
Fault-Tolerant Cluster-Wise Clock Synchronization for Wireless Sensor Networks.
177-189
- Irith Pomeranz, Sudhakar M. Reddy:
Concurrent Online Testing of Identical Circuits Using Nonidentical Input Vectors.
190-200
- Sandeep S. Kulkarni, Ali Ebnenasir:
Complexity Issues in Automated Synthesis of Failsafe Fault-Tolerance.
201-215
- Jelena Mirkovic, Peter L. Reiher:
D-WARD: A Source-End Defense against Flooding Denial-of-Service Attacks.
216-232
- Haowen Chan, Virgil D. Gligor, Adrian Perrig, Gautam Muralidharan:
On the Distribution and Revocation of Cryptographic Keys in Sensor Networks.
233-247
- Yair Amir, Cristina Nita-Rotaru, Jonathan Robert Stanton, Gene Tsudik:
Secure Spread: An Integrated Architecture for Secure Group Communication.
248-261
Short Papers
Volume 2,
Number 4,
October-December 2005
Regular Papers
Short Papers
Copyright © Fri Mar 12 17:33:05 2010
by Michael Ley (ley@uni-trier.de)