The SCEAS System
Navigation Menu

Conferences in DBLP

(atc)
2007 (conf/atc/2007)

  1. Keith C. C. Chan
    An Intelligent Home System as a Development and Test Platform for Ubiquitous Computing. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:1- [Conf]
  2. Hartmut Schmeck
    Remarks on Self-organization and Trust in Organic Computing Systems. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:2- [Conf]
  3. Son Thanh Nguyen, Chunming Rong
    ZigBee Security Using Identity-Based Cryptography. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:3-12 [Conf]
  4. Yong Yu, Bo Yang, Xinyi Huang, Mingwu Zhang
    Efficient Identity-Based Signcryption Scheme for Multiple Receivers. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:13-21 [Conf]
  5. Wei Wu, Yi Mu, Willy Susilo, Jennifer Seberry, Xinyi Huang
    Identity-Based Proxy Signature from Pairings. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:22-31 [Conf]
  6. Qianhong Wu, Willy Susilo, Yi Mu, Bo Qin
    Cryptanalysis of BGW Broadcast Encryption Schemes for DVD Content Protection. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:32-41 [Conf]
  7. Yunfa Li, Hai Jin, Deqing Zou, Jieyun Chen, Zongfen Han
    A Digital Signature Mechanism and Authentication Scheme for Group Communication in Grid. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:42-51 [Conf]
  8. Fanyu Kong, Jia Yu, Baodong Qin, Daxing Li
    Cryptanalysis of Server-Aided RSA Key Generation Protocols at MADNES 2005. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:52-60 [Conf]
  9. Marcel Cremene, Michel Riveill
    Service-Context Knowledge-Based Solution for Autonomic Adaptation. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:61-70 [Conf]
  10. Di Zheng, Jun Wang, Yan Jia, Weihong Han, Peng Zou
    Middleware Based Context Management for the Component-Based Pervasive Computing. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:71-81 [Conf]
  11. Valentina Casola, Emilio Pasquale Mancini, Nicola Mazzocca, Massimiliano Rak, Umberto Villano
    Building Autonomic and Secure Service Oriented Architectures with MAWeS. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:82-93 [Conf]
  12. David Linner, Heiko Pfeffer, Ilja Radusch, Stephan Steglich
    Biology as Inspiration Towards a Novel Service Life-Cycle. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:94-102 [Conf]
  13. Stephen S. Yau, Min Yan, Dazhi Huang
    Design of Service-Based Systems with Adaptive Tradeoff Between Security and Service Delay. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:103-113 [Conf]
  14. Bo Yang, Yong Yu, Fagen Li, Ying Sun
    Provably Secure Identity-Based Threshold Unsigncryption Scheme. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:114-122 [Conf]
  15. Shane Balfe, Anish Mohammed
    Final Fantasy - Securing On-Line Gaming with Trusted Computing. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:123-134 [Conf]
  16. Donghyun Choi, Yunho Lee, Hogab Kang, Seungjoo Kim, Dongho Won
    An Efficient and Secure Rights Sharing Method for DRM System Against Replay Attack. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:135-145 [Conf]
  17. Jimmy McGibney, Dmitri Botvich
    Establishing Trust Between Mail Servers to Improve Spam Filtering. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:146-155 [Conf]
  18. Hein Meling
    An Architecture for Self-healing Autonomous Object Groups. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:156-168 [Conf]
  19. George Brancovici, Christian Müller-Schloer
    A Generic and Modular System Architecture for Trustworthy, Autonomous Applications. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:169-178 [Conf]
  20. Gaeil An, Joon S. Park
    Cooperative Component Testing Architecture in Collaborating Network Environment. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:179-190 [Conf]
  21. Frederic Stumpf, Michael Benz, Martin Hermanowski, Claudia Eckert
    An Approach to a Trustworthy System Architecture Using Virtualization. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:191-202 [Conf]
  22. Ruichuan Chen, Xuan Zhao, Liyong Tang, Jian-bin Hu, Zhong Chen
    CuboidTrust: A Global Reputation-Based Trust Model in Peer-to-Peer Networks. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:203-215 [Conf]
  23. Yuan Wang, Ye Tao, Ping Yu, Feng Xu, Jian Lü
    A Trust Evolution Model for P2P Networks. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:216-225 [Conf]
  24. Zheng Yan, Christian Prehofer
    An Adaptive Trust Control Model for a Trustworthy Component Software Platform. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:226-238 [Conf]
  25. Chunmei Gui, Quanyuan Wu, Huaimin Wang
    Towards Trustworthy Resource Selection: A Fuzzy Reputation Aggregation Approach. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:239-248 [Conf]
  26. Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai
    An Adaptive Spreading Activation Approach to Combating the Front-Peer Attack in Trust and Reputation System. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:249-258 [Conf]
  27. Jun Luo, Li Ding, ZhiSong Pan, GuiQiang Ni, GuYu Hu
    Research on Cost-Sensitive Learning in One-Class Anomaly Detection Algorithms. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:259-268 [Conf]
  28. So-Young Yeo, Myung-Sun Baek, Hyoung-Kyu Song
    Improved and Trustworthy Detection Scheme with Low Complexity in VBLAST System. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:269-275 [Conf]
  29. Shou-Hsuan Stephen Huang, Robert Lychev, Jianhua Yang
    Stepping-Stone Detection Via Request-Response Traffic Analysis. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:276-285 [Conf]
  30. Sung-Kyoung Kim, Dong-Guk Han, Howon Kim, Kyoil Chung, Jongin Lim
    SPA Countermeasure Based on Unsigned Left-to-Right Recodings. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:286-295 [Conf]
  31. Wenyuan Kuang, Yaoxue Zhang, Li Wei, Nan Xia, Guangbin Xu, Yue-Zhi Zhou
    A New One-Way Isolation File-Access Method at the Granularity of a Disk-Block. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:296-305 [Conf]
  32. Chen Yang, Wenping Ma, Xinmei Wang
    Novel Remote User Authentication Scheme Using Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:306-312 [Conf]
  33. Kai Ouyang, Xiaowen Chu, Yixin Jiang, Hsiao-Hwa Chen, Jiangchuan Liu
    On the Homonymous Role in Role-Based Discretionary Access Control. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:313-322 [Conf]
  34. Yuqing Sun, Peng Pan, Ho-fung Leung, Bin Shi
    Ontology Based Hybrid Access Control for Automatic Interoperation. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:323-332 [Conf]
  35. Kuo-Lung Hung, Chin-Chen Chang
    Recoverable Tamper Proofing Technique for Image Authentication Using Irregular Sampling Coding. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:333-343 [Conf]
  36. Shieh-Shing Lin
    A Decomposition Strategy Based Trusted Computing Method for Cooperative Control Problem Faced with Communication Constraints. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:344-351 [Conf]
  37. Shuyi Chen, Yingyou Wen, Hong Zhao
    Formal Analysis of Secure Bootstrap in Trusted Computing. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:352-360 [Conf]
  38. Sanguk Noh
    Calculating Trust Using Aggregation Rules in Social Networks. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:361-371 [Conf]
  39. Hans Löhr, HariGovind V. Ramasamy, Ahmad-Reza Sadeghi, Stefan Schulz, Matthias Schunter, Christian Stüble
    Enhancing Grid Security Using Trusted Virtualization. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:372-384 [Conf]
  40. Katsuhiro Takata, Masataka Tanaka, Jianhua Ma, Runhe Huang, Bernady O. Apduhan, Norio Shiratori
    A Wearable System for Outdoor Running Workout State Recognition and Course Provision. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:385-394 [Conf]
  41. Emmanuel Bresson, Mark Manulis
    Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:395-409 [Conf]
  42. Mooseop Kim, Youngse Kim, Jaecheol Ryou, Sungik Jun
    Efficient Implementation of the Keyed-Hash Message Authentication Code Based on SHA-1 Algorithm for Mobile Trusted Computing. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:410-419 [Conf]
  43. Jinheung Lee, Sanggon Lee, Sanguk Shin
    A Secure DRM Framework for User's Domain and Key Management. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:420-429 [Conf]
  44. Eun-Jun Yoon, Kee-Young Yoo
    A Secret-Key Exponential Key Agreement Protocol with Smart Cards. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:430-440 [Conf]
  45. Yong Ho Kim, Hwaseong Lee, Jong Hyuk Park, Laurence Tianruo Yang, Dong Hoon Lee
    Key Establishment Scheme for Sensor Networks with Low Communication Cost. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:441-448 [Conf]
  46. Jianming Fu, Binglan Chen, Huanguo Zhang
    A Worm Containment Model Based on Neighbor-Alarm. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:449-457 [Conf]
  47. Wolfgang Trumler, Jörg Ehrig, Andreas Pietzowski, Benjamin Satzger, Theo Ungerer
    A Distributed Self-healing Data Store. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:458-467 [Conf]
  48. Boyun Zhang, Jianping Yin, Jingbo Hao, Dingxing Zhang, Shulin Wang
    Malicious Codes Detection Based on Ensemble Learning. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:468-477 [Conf]
  49. Yong Tang, Xicheng Lu, Bin Xiao
    Generating Simplified Regular Expression Signatures for Polymorphic Worms. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:478-488 [Conf]
  50. Zhi (Judy) Fu, Minho Shin, John C. Strassner, Nitin Jain, Vishnu Ram, William A. Arbaugh
    AAA for Spontaneous Roaming Agreements in Heterogeneous Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:489-498 [Conf]
  51. Xianshu Zhu, Dafang Zhang, Wenjia Li, Kun Huang
    A Prediction-Based Fair Replication Algorithm in Structured P2P Systems. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:499-508 [Conf]
  52. Li Wei, Yaoxue Zhang, Yue-Zhi Zhou
    TransCom: A Virtual Disk Based Self-management System. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:509-518 [Conf]
  53. Wei Chen, Danwei Chen, Guozi Sun, Yingzhou Zhang
    Defending Against Jamming Attacks in Wireless Local Area Networks. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:519-528 [Conf]
  54. Jun Li, Fumin Yang, Gang Tu, Wan-hua Cao, Yansheng Lu
    Schedulability Analysis of the Fault-Tolerant Hard Real-Time Tasks with Limited Priority Levels. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:529-538 [Conf]
  55. Yoon-Hwa Choi, Myeong-Hyeon Lee
    A Property-Based Technique for Tolerating Faults in Bloom Filters for Deep Packet Inspection. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:539-548 [Conf]
  56. Congfeng Jiang, Cheng Wang, Xiaohu Liu, Yinghui Zhao
    A Fuzzy Logic Approach for Secure and Fault Tolerant Grid Job Scheduling. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:549-558 [Conf]
  57. Fang-Yie Leu, Fuu-Cheng Jiang, Ming-Chang Li, Jia-Chun Lin
    An Enhanced DGIDE Platform for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:559-568 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002