International Journal of Internet Technology and Secured Transactions
2012 Vol.4 No.4
Pages | Title and author(s) |
253-271 | Secure inspection of web transactionsMika Rautila; Jani Suomalainen DOI: 10.1504/IJITST.2012.054058 |
272-289 | Estimating risk levels for vulnerability categories using CVSSAnshu Tripathi; Umesh Kumar Singh DOI: 10.1504/IJITST.2012.054059 |
290-311 | An investigative analysis of the security weaknesses in the evolution of RFID enabled passportEyad Abdullah Bogari; Pavol Zavarsky; Dale Lindskog; Ron Ruhl DOI: 10.1504/IJITST.2012.054060 |
312-326 | Geotracking of webpage sources: a defence against drive-by-download attacksA. Naumov; N. Vlajic; H. Roumani DOI: 10.1504/IJITST.2012.054061 |
327-343 | Convergence, security and quality in the NGNAurelio La Corte; Marialisa Scatá DOI: 10.1504/IJITST.2012.054062 |