Guest Editorial: Managing Insider Security Threats (MIST 2012 Volume 1)
Chronological Examination of Insider Threat Sabotage: Preliminary Observations
Design of Categorization Mechanism for Disaster-Information-Gathering System
Detection of Insider Attacks to the Web Server
A Special Purpose Signature Scheme for Secure Computation of Traffic in a Distributed Network
A New Efficient Verifiable Fuzzy Keyword Search Scheme
PKI Based Signcryption without Pairing: an Efficient Scheme with Tight Security Reduction
Extraction of Platform-unique Information as an Identifier