The SCEAS System
Navigation Menu

Conferences in DBLP

Asian Computing Science Conference (ASIAN) (asian)
2007 (conf/asian/2007)

  1. Andrei Sabelfeld
    Dimensions of Declassification in Theory and Practice. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2007, pp:1- [Conf]
  2. SeokWoo Choi, Heewan Park, Hyun-il Lim, Taisook Han
    A Static Birthmark of Binary Executables Based on API Call Structure. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2007, pp:2-16 [Conf]
  3. Takahiro Kosakai, Toshiyuki Maeda, Akinori Yonezawa
    Compiling C Programs into a Strongly Typed Assembly Language. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2007, pp:17-32 [Conf]
  4. Gurvan Le Guernic
    Information Flow Testing. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2007, pp:33-47 [Conf]
  5. Gavin O'Gorman, Stephen Blott
    Large Scale Simulation of Tor: . [Citation Graph (0, 0)][DBLP]
    ASIAN, 2007, pp:48-54 [Conf]
  6. Junji Nakazato, Lihua Wang, Akihiro Yamamura
    Privacy Enhancing Credentials. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2007, pp:55-61 [Conf]
  7. Sriperumbuduru Kandala Simhalu, Keiji Takeda
    Browser Based Agile E-Voting System. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2007, pp:62-69 [Conf]
  8. Mohammad Torabi Dashti, Yanjing Wang
    Risk Balance in Exchange Protocols. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2007, pp:70-77 [Conf]
  9. Hyoungshick Kim
    Scalable DRM System for Media Portability. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2007, pp:78-85 [Conf]
  10. Gergei Bana, Koji Hasebe, Mitsuhiro Okada
    Computational Semantics for Basic Protocol Logic - A Stochastic Approach. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2007, pp:86-94 [Conf]
  11. Mohammad Jafari, Mohammad Fathian
    Management Advantages of Object Classification in Role-Based Access Control (RBAC). [Citation Graph (0, 0)][DBLP]
    ASIAN, 2007, pp:95-110 [Conf]
  12. Samiha Ayed, Nora Cuppens-Boulahia, Frédéric Cuppens
    An Integrated Model for Access Control and Information Flow Requirements. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2007, pp:111-125 [Conf]
  13. Imad M. Abbadi
    Digital Rights Management Using a Master Control Device. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2007, pp:126-141 [Conf]
  14. Joshua D. Guttman
    How to do Things with Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2007, pp:142-149 [Conf]
  15. Han Gao, Chiara Bodei, Pierpaolo Degano, Hanne Riis Nielson
    A Formal Analysis for Capturing Replay Attacks in Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2007, pp:150-165 [Conf]
  16. Mengjun Li, Ti Zhou, Zhoujun Li, Huowang Chen
    An Abstraction and Refinement Framework for Verifying Security Protocols Based on Logic Programming. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2007, pp:166-180 [Conf]
  17. Vitaly Shmatikov, Ming-Hsiu Wang
    Secure Verification of Location Claims with Simultaneous Distance Modification. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2007, pp:181-195 [Conf]
  18. Kazuhiko Kato
    Modeling and Virtualization for Secure Computing Environments. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2007, pp:196-197 [Conf]
  19. E. Ramirez-Silva, Marc Dacier
    Empirical Study of the Impact of Metasploit-Related Attacks in 4 Years of Attack Traces. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2007, pp:198-211 [Conf]
  20. Elie Bursztein, Jean Goubault-Larrecq
    A Logical Framework for Evaluating Network Resilience Against Faults and Attacks. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2007, pp:212-227 [Conf]
  21. Wilson Naik Bhukya, Suneel Kumar Kommuru, Atul Negi
    Masquerade Detection Based Upon GUI User Profiling in Linux Systems. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2007, pp:228-239 [Conf]
  22. Atsushi Sakurai, Takashi Minohara, Ryota Sato, Keisuke Mizutani
    One-Time Receiver Address in IPv6 for Protecting Unlinkability. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2007, pp:240-246 [Conf]
  23. Jungsuk Song, Hayato Ohba, Hiroki Takakura, Yasuo Okabe, Kenji Ohira, Yongjin Kwon
    A Comprehensive Approach to Detect Unknown Attacks Via Intrusion Detection Alerts. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2007, pp:247-253 [Conf]
  24. Ali Borji
    Combining Heterogeneous Classifiers for Network Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2007, pp:254-260 [Conf]
  25. Petros Belsis, Stefanos Gritzalis, Christos Skourlas, Vassilis Tsoukalas
    Managing Uncertainty in Access Control Decisions in Distributed Autonomous Collaborative Environments. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2007, pp:261-267 [Conf]
  26. Harshit Shah, R. K. Shyamasundar
    On Run-Time Enforcement of Policies. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2007, pp:268-281 [Conf]
  27. Michele Bugliesi, Damiano Macedonio, Sabina Rossi
    Static vs Dynamic Typing for Access Control in Pi-Calculus. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2007, pp:282-296 [Conf]
  28. Tomohiro Shioya, Yoshihiro Oyama, Hideya Iwasaki
    A Sandbox with a Dynamic Policy Based on Execution Contexts of Applications. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2007, pp:297-311 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002