|
Conferences in DBLP
- Andrei Sabelfeld
Dimensions of Declassification in Theory and Practice. [Citation Graph (0, 0)][DBLP] ASIAN, 2007, pp:1- [Conf]
- SeokWoo Choi, Heewan Park, Hyun-il Lim, Taisook Han
A Static Birthmark of Binary Executables Based on API Call Structure. [Citation Graph (0, 0)][DBLP] ASIAN, 2007, pp:2-16 [Conf]
- Takahiro Kosakai, Toshiyuki Maeda, Akinori Yonezawa
Compiling C Programs into a Strongly Typed Assembly Language. [Citation Graph (0, 0)][DBLP] ASIAN, 2007, pp:17-32 [Conf]
- Gurvan Le Guernic
Information Flow Testing. [Citation Graph (0, 0)][DBLP] ASIAN, 2007, pp:33-47 [Conf]
- Gavin O'Gorman, Stephen Blott
Large Scale Simulation of Tor: . [Citation Graph (0, 0)][DBLP] ASIAN, 2007, pp:48-54 [Conf]
- Junji Nakazato, Lihua Wang, Akihiro Yamamura
Privacy Enhancing Credentials. [Citation Graph (0, 0)][DBLP] ASIAN, 2007, pp:55-61 [Conf]
- Sriperumbuduru Kandala Simhalu, Keiji Takeda
Browser Based Agile E-Voting System. [Citation Graph (0, 0)][DBLP] ASIAN, 2007, pp:62-69 [Conf]
- Mohammad Torabi Dashti, Yanjing Wang
Risk Balance in Exchange Protocols. [Citation Graph (0, 0)][DBLP] ASIAN, 2007, pp:70-77 [Conf]
- Hyoungshick Kim
Scalable DRM System for Media Portability. [Citation Graph (0, 0)][DBLP] ASIAN, 2007, pp:78-85 [Conf]
- Gergei Bana, Koji Hasebe, Mitsuhiro Okada
Computational Semantics for Basic Protocol Logic - A Stochastic Approach. [Citation Graph (0, 0)][DBLP] ASIAN, 2007, pp:86-94 [Conf]
- Mohammad Jafari, Mohammad Fathian
Management Advantages of Object Classification in Role-Based Access Control (RBAC). [Citation Graph (0, 0)][DBLP] ASIAN, 2007, pp:95-110 [Conf]
- Samiha Ayed, Nora Cuppens-Boulahia, Frédéric Cuppens
An Integrated Model for Access Control and Information Flow Requirements. [Citation Graph (0, 0)][DBLP] ASIAN, 2007, pp:111-125 [Conf]
- Imad M. Abbadi
Digital Rights Management Using a Master Control Device. [Citation Graph (0, 0)][DBLP] ASIAN, 2007, pp:126-141 [Conf]
- Joshua D. Guttman
How to do Things with Cryptographic Protocols. [Citation Graph (0, 0)][DBLP] ASIAN, 2007, pp:142-149 [Conf]
- Han Gao, Chiara Bodei, Pierpaolo Degano, Hanne Riis Nielson
A Formal Analysis for Capturing Replay Attacks in Cryptographic Protocols. [Citation Graph (0, 0)][DBLP] ASIAN, 2007, pp:150-165 [Conf]
- Mengjun Li, Ti Zhou, Zhoujun Li, Huowang Chen
An Abstraction and Refinement Framework for Verifying Security Protocols Based on Logic Programming. [Citation Graph (0, 0)][DBLP] ASIAN, 2007, pp:166-180 [Conf]
- Vitaly Shmatikov, Ming-Hsiu Wang
Secure Verification of Location Claims with Simultaneous Distance Modification. [Citation Graph (0, 0)][DBLP] ASIAN, 2007, pp:181-195 [Conf]
- Kazuhiko Kato
Modeling and Virtualization for Secure Computing Environments. [Citation Graph (0, 0)][DBLP] ASIAN, 2007, pp:196-197 [Conf]
- E. Ramirez-Silva, Marc Dacier
Empirical Study of the Impact of Metasploit-Related Attacks in 4 Years of Attack Traces. [Citation Graph (0, 0)][DBLP] ASIAN, 2007, pp:198-211 [Conf]
- Elie Bursztein, Jean Goubault-Larrecq
A Logical Framework for Evaluating Network Resilience Against Faults and Attacks. [Citation Graph (0, 0)][DBLP] ASIAN, 2007, pp:212-227 [Conf]
- Wilson Naik Bhukya, Suneel Kumar Kommuru, Atul Negi
Masquerade Detection Based Upon GUI User Profiling in Linux Systems. [Citation Graph (0, 0)][DBLP] ASIAN, 2007, pp:228-239 [Conf]
- Atsushi Sakurai, Takashi Minohara, Ryota Sato, Keisuke Mizutani
One-Time Receiver Address in IPv6 for Protecting Unlinkability. [Citation Graph (0, 0)][DBLP] ASIAN, 2007, pp:240-246 [Conf]
- Jungsuk Song, Hayato Ohba, Hiroki Takakura, Yasuo Okabe, Kenji Ohira, Yongjin Kwon
A Comprehensive Approach to Detect Unknown Attacks Via Intrusion Detection Alerts. [Citation Graph (0, 0)][DBLP] ASIAN, 2007, pp:247-253 [Conf]
- Ali Borji
Combining Heterogeneous Classifiers for Network Intrusion Detection. [Citation Graph (0, 0)][DBLP] ASIAN, 2007, pp:254-260 [Conf]
- Petros Belsis, Stefanos Gritzalis, Christos Skourlas, Vassilis Tsoukalas
Managing Uncertainty in Access Control Decisions in Distributed Autonomous Collaborative Environments. [Citation Graph (0, 0)][DBLP] ASIAN, 2007, pp:261-267 [Conf]
- Harshit Shah, R. K. Shyamasundar
On Run-Time Enforcement of Policies. [Citation Graph (0, 0)][DBLP] ASIAN, 2007, pp:268-281 [Conf]
- Michele Bugliesi, Damiano Macedonio, Sabina Rossi
Static vs Dynamic Typing for Access Control in Pi-Calculus. [Citation Graph (0, 0)][DBLP] ASIAN, 2007, pp:282-296 [Conf]
- Tomohiro Shioya, Yoshihiro Oyama, Hideya Iwasaki
A Sandbox with a Dynamic Policy Based on Execution Contexts of Applications. [Citation Graph (0, 0)][DBLP] ASIAN, 2007, pp:297-311 [Conf]
|