The SCEAS System
Navigation Menu

Conferences in DBLP

IASTED International Conference on Communication, Network, and Information Security (cnis)
2006 (conf/cnis/2006)

  1. Vishav Vir Singh
    PROTEMP-Z: An XML based authorization system with provisional authorization and temporal certification support. [Citation Graph (0, 0)][DBLP]
    Communication, Network, and Information Security, 2006, pp:1-6 [Conf]
  2. Kosuke Okada, Shigeo Wada
    A robust image watermarking method to geometric attacks. [Citation Graph (0, 0)][DBLP]
    Communication, Network, and Information Security, 2006, pp:7-12 [Conf]
  3. Joon Son, Jim Alves-Foss
    Covert timing channel capacity of rate monotonic real-time scheduling algorithm in MLS systems. [Citation Graph (0, 0)][DBLP]
    Communication, Network, and Information Security, 2006, pp:13-18 [Conf]
  4. Sigurd Eskeland
    Security analysis of a large-scale voting scheme. [Citation Graph (0, 0)][DBLP]
    Communication, Network, and Information Security, 2006, pp:19-21 [Conf]
  5. Charlie Obimbo, JingBo Ni
    A grey-level image watermarking method based on block DCT and statistic correlation adjustment. [Citation Graph (0, 0)][DBLP]
    Communication, Network, and Information Security, 2006, pp:22-27 [Conf]
  6. Diomedes D. Kastanis, Ioannis G. Askoxylakis, Apostolos Traganitis
    An efficient authentication scheme for contactless smartcards using elliptic curve cryptography. [Citation Graph (0, 0)][DBLP]
    Communication, Network, and Information Security, 2006, pp:28-33 [Conf]
  7. Yuan Zhang, Richard J. Enbody, John R. Lloyd
    Proactive, content-aware, sensitive data protection framework for enterprises. [Citation Graph (0, 0)][DBLP]
    Communication, Network, and Information Security, 2006, pp:34-40 [Conf]
  8. Longjiang Yu, Sheng-He Sun
    Slantlet transform-based image fingerprints. [Citation Graph (0, 0)][DBLP]
    Communication, Network, and Information Security, 2006, pp:41-43 [Conf]
  9. Behzad Salami, Charlie Obimbo
    A multi-bitwatermark generation algorithm with properties of error correction. [Citation Graph (0, 0)][DBLP]
    Communication, Network, and Information Security, 2006, pp:44-49 [Conf]
  10. Ioannis G. Askoxylakis, Diomedes D. Kastanis, Apostolos Traganitis
    Elliptic curve and password based dynamic key agreement in wireless ad-hoc networks. [Citation Graph (0, 0)][DBLP]
    Communication, Network, and Information Security, 2006, pp:50-60 [Conf]
  11. Mihir M. Ayachit, Haiping Xu
    A petri net based XML firewall security model for web services invocation. [Citation Graph (0, 0)][DBLP]
    Communication, Network, and Information Security, 2006, pp:61-67 [Conf]
  12. Paul Tipper, Christopher Edwards
    A method for deriving paths across a distributedweb of trust. [Citation Graph (0, 0)][DBLP]
    Communication, Network, and Information Security, 2006, pp:68-73 [Conf]
  13. Asad M. Ali
    Designing SSL/TLS protocol for resource constrained devices. [Citation Graph (0, 0)][DBLP]
    Communication, Network, and Information Security, 2006, pp:74-80 [Conf]
  14. Charlie Obombo, Fardeen Haji, Larry Lindsay, Darshana Patel
    Security framework for supervisory control and data acquisition, automation systems, and networks. [Citation Graph (0, 0)][DBLP]
    Communication, Network, and Information Security, 2006, pp:81-86 [Conf]
  15. Sylwester Sobolewski, R. Michael Buehrer
    Object authentication in closed containers by ultra-wideband multipath profile examination: An application to national security. [Citation Graph (0, 0)][DBLP]
    Communication, Network, and Information Security, 2006, pp:87-92 [Conf]
  16. Gareth Owen, Mo Adda
    Self-organising quorum systems for ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Communication, Network, and Information Security, 2006, pp:93-98 [Conf]
  17. Sigurd Eskeland
    Access control by secure multi-party EPR decryption in the medical scenario. [Citation Graph (0, 0)][DBLP]
    Communication, Network, and Information Security, 2006, pp:99-103 [Conf]
  18. Jonathan T. Trostle
    The lightweight key management protocol (LKMP). [Citation Graph (0, 0)][DBLP]
    Communication, Network, and Information Security, 2006, pp:104-112 [Conf]
  19. Aliaa A. A. Youssif, Atef Z. Ghalwash, Samir Mohamed
    Artificial immune using multi-level negative selection approach to anomaly detection. [Citation Graph (0, 0)][DBLP]
    Communication, Network, and Information Security, 2006, pp:113-118 [Conf]
  20. R. Bhakthavathsalam
    Reinforcement of privacy in 802.16 MAC common part sublayer using the principle of circularity. [Citation Graph (0, 0)][DBLP]
    Communication, Network, and Information Security, 2006, pp:119-125 [Conf]
  21. Bei Wang, Jim Alves-Foss
    An MSLS-EMM for enforcing confidentiality in malicious environments. [Citation Graph (0, 0)][DBLP]
    Communication, Network, and Information Security, 2006, pp:126-131 [Conf]
  22. Jaime Muñoz Arteaga, Ricardo Mendoza González, Francisco J. Álvarez, Miguel Vargas Martin
    A classification of security patterns for the transactions between a requester, an intermediary, and a web-service. [Citation Graph (0, 0)][DBLP]
    Communication, Network, and Information Security, 2006, pp:132-137 [Conf]
  23. Omar H. Alhazmi, Sung-Whan Woo, Yashwant K. Malaiya
    Security vulnerability categories in major software systems. [Citation Graph (0, 0)][DBLP]
    Communication, Network, and Information Security, 2006, pp:138-143 [Conf]
  24. Ashish Anand, Rahul Rishi, Mukesh Kumar
    ARP and ICMP weaknesses: Impact and network performance analysis of a novel attack strategy. [Citation Graph (0, 0)][DBLP]
    Communication, Network, and Information Security, 2006, pp:144-149 [Conf]
  25. Mahendra Kumar, Richard E. Newman
    STRBAC - An approach towards spatio-temporal role-based access control. [Citation Graph (0, 0)][DBLP]
    Communication, Network, and Information Security, 2006, pp:150-155 [Conf]
  26. F. El-Hassan, Ashraf Matrawy, Nabil Seddigh, Biswajit Nandy
    Experimental evaluation of network security through a hierarchical quantitative metrics model. [Citation Graph (0, 0)][DBLP]
    Communication, Network, and Information Security, 2006, pp:156-164 [Conf]
  27. Marco Prandini
    Securing a Linux-based multi-user web server. [Citation Graph (0, 0)][DBLP]
    Communication, Network, and Information Security, 2006, pp:165-171 [Conf]
  28. Hiroshi Fujinoki, Ravi Kumar Boyapati
    Performance studies of the server-side access control for syn-flooding distributed denial of service attacks using real systems. [Citation Graph (0, 0)][DBLP]
    Communication, Network, and Information Security, 2006, pp:172-178 [Conf]
  29. Abhinav Pathak, Dheeraj Sanghi
    A scalable approach to IP anycast security. [Citation Graph (0, 0)][DBLP]
    Communication, Network, and Information Security, 2006, pp:179-184 [Conf]
  30. Yaxuan Qi, Jun Li
    An efficient hybrid algorithm for multidimensional packet classification. [Citation Graph (0, 0)][DBLP]
    Communication, Network, and Information Security, 2006, pp:185-190 [Conf]
  31. Pascal Urien, Mesmin Dandjinou, Mohamad Badra
    Introducing trusted EAP module for security enhancement in WLANs and VPNs. [Citation Graph (0, 0)][DBLP]
    Communication, Network, and Information Security, 2006, pp:191-198 [Conf]
  32. Jianming Yu, Quan Huang, Yibo Xue
    Optimizing multi-thread string matching for network processor based intrusion management system. [Citation Graph (0, 0)][DBLP]
    Communication, Network, and Information Security, 2006, pp:199-204 [Conf]
  33. Tobias Eggendorfer, Jörg Keller
    Dynamically blocking access to web pages for spammers' harvesters. [Citation Graph (0, 0)][DBLP]
    Communication, Network, and Information Security, 2006, pp:205-210 [Conf]
  34. Jörg Keller, Ralf Naues
    Design of a virtual computer security lab. [Citation Graph (0, 0)][DBLP]
    Communication, Network, and Information Security, 2006, pp:211-215 [Conf]
  35. Yaxuan Qi, Jun Li
    Towards effective packet classification. [Citation Graph (0, 0)][DBLP]
    Communication, Network, and Information Security, 2006, pp:216-223 [Conf]
  36. Leonardo Mattes, João Antonio Zuffo
    Access control platform for submitted jobs in computational grid environment. [Citation Graph (0, 0)][DBLP]
    Communication, Network, and Information Security, 2006, pp:224-229 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002