Journal Navigation
Special Issue on CRiSIS’11
Volume 4
Guest Editorial Preface
For Volume 4, Issue 4
View Full Issue
Frédéric Cuppens, Simon N. Foley
Published: Oct 1, 2013
DOI: 10.4018/ijsse.2013100101
Volume 4
Pal-Stefan Murvay, Bogdan Groza
Embedded devices are ubiquitously involved in a large variety of security applications which heavily rely on the computation of hash functions. Roughly, two alternatives for speeding up computations... Show More
Download Sample (PDF): Article
Cite Article

MLA

Murvay, Pal-Stefan, and Bogdan Groza. "Performance Evaluation of SHA-2 Standard vs. SHA-3 Finalists on Two Freescale Platforms." IJSSE vol.4, no.4 2013: pp.1-24. http://doi.org/10.4018/ijsse.2013100101

APA

Murvay, P. & Groza, B. (2013). Performance Evaluation of SHA-2 Standard vs. SHA-3 Finalists on Two Freescale Platforms. International Journal of Secure Software Engineering (IJSSE), 4(4), 1-24. http://doi.org/10.4018/ijsse.2013100101

Chicago

Murvay, Pal-Stefan, and Bogdan Groza. "Performance Evaluation of SHA-2 Standard vs. SHA-3 Finalists on Two Freescale Platforms," International Journal of Secure Software Engineering (IJSSE) 4, no.4: 1-24. http://doi.org/10.4018/ijsse.2013100101

Export Reference

Mendeley
Published: Oct 1, 2013
DOI: 10.4018/ijsse.2013100102
Volume 4
Li Wang, Zheng Li, Shangping Ren, Kevin Kwiat
Replication and value selection through voting are commonly used approaches to tolerating naturally caused failures. Without considering intentionally introduced failures, such as failures caused by... Show More
Download Sample (PDF): Article
Cite Article

MLA

Wang, Li, et al. "Optimal Voting Strategy against Random and Targeted Attacks." IJSSE vol.4, no.4 2013: pp.25-46. http://doi.org/10.4018/ijsse.2013100102

APA

Wang, L., Li, Z., Ren, S., & Kwiat, K. (2013). Optimal Voting Strategy against Random and Targeted Attacks. International Journal of Secure Software Engineering (IJSSE), 4(4), 25-46. http://doi.org/10.4018/ijsse.2013100102

Chicago

Wang, Li, et al. "Optimal Voting Strategy against Random and Targeted Attacks," International Journal of Secure Software Engineering (IJSSE) 4, no.4: 25-46. http://doi.org/10.4018/ijsse.2013100102

Export Reference

Mendeley
Published: Oct 1, 2013
DOI: 10.4018/ijsse.2013100103
Volume 4
Filipe Caldeira, Thomas Schaberreiter, Sébastien Varrette, Edmundo Monteiro, Paulo Simões, Pascal Bouvry, Djamel Khadraoui
Critical infrastructure (CI) services are constantly consumed by the society and are not expected to fail. A common definition states that CIs are so vital to our society that a disruption would... Show More
Download Sample (PDF): Article
Cite Article

MLA

Caldeira, Filipe, et al. "Trust Based Interdependency Weighting for On-Line Risk Monitoring in Interdependent Critical Infrastructures." IJSSE vol.4, no.4 2013: pp.47-69. http://doi.org/10.4018/ijsse.2013100103

APA

Caldeira, F., Schaberreiter, T., Varrette, S., Monteiro, E., Simões, P., Bouvry, P., & Khadraoui, D. (2013). Trust Based Interdependency Weighting for On-Line Risk Monitoring in Interdependent Critical Infrastructures. International Journal of Secure Software Engineering (IJSSE), 4(4), 47-69. http://doi.org/10.4018/ijsse.2013100103

Chicago

Caldeira, Filipe, et al. "Trust Based Interdependency Weighting for On-Line Risk Monitoring in Interdependent Critical Infrastructures," International Journal of Secure Software Engineering (IJSSE) 4, no.4: 47-69. http://doi.org/10.4018/ijsse.2013100103

Export Reference

Mendeley
IGI Global Open Access Collection

IGI Global Open Access Collection provides all of IGI Global’s open access content in one convenient location and user-friendly interface that can easily searched or integrated into library discovery systems. Browse IGI Global Open
Access Collection

Contact
Author Services Inquiries
For inquiries involving pre-submission concerns, please contact the Journal Development Division:
journaleditor@igi-global.com

Open Access Inquiries
For inquiries involving publishing costs, APCs, etc., please contact the Open Access Division:
openaccessadmin@igi-global.com

Production-Related Inquiries
For inquiries involving accepted manuscripts currently in production or post-production, please contact the Journal Production Division:
journalproofing@igi-global.com

Rights and Permissions Inquiries
For inquiries involving permissions, rights, and reuse, please contact the Intellectual Property & Contracts Division:
contracts@igi-global.com

Publication-Related Inquiries
For inquiries involving journal publishing, please contact the Acquisitions Division:
acquisition@igi-global.com

Discoverability Inquiries
For inquiries involving sharing, promoting, and indexing of manuscripts, please contact the Citation Metrics & Indexing Division:
indexing@igi-global.com

Editorial Office
701 E. Chocolate Ave.
Hershey, PA 17033, USA
717-533-8845 x100