Conferences in DBLP
(atc) 2007 (conf/atc/2007)
Keith C. C. Chan An Intelligent Home System as a Development and Test Platform for Ubiquitous Computing. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:1- [Conf ] Hartmut Schmeck Remarks on Self-organization and Trust in Organic Computing Systems. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:2- [Conf ] Son Thanh Nguyen , Chunming Rong ZigBee Security Using Identity-Based Cryptography. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:3-12 [Conf ] Yong Yu , Bo Yang , Xinyi Huang , Mingwu Zhang Efficient Identity-Based Signcryption Scheme for Multiple Receivers. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:13-21 [Conf ] Wei Wu , Yi Mu , Willy Susilo , Jennifer Seberry , Xinyi Huang Identity-Based Proxy Signature from Pairings. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:22-31 [Conf ] Qianhong Wu , Willy Susilo , Yi Mu , Bo Qin Cryptanalysis of BGW Broadcast Encryption Schemes for DVD Content Protection. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:32-41 [Conf ] Yunfa Li , Hai Jin , Deqing Zou , Jieyun Chen , Zongfen Han A Digital Signature Mechanism and Authentication Scheme for Group Communication in Grid. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:42-51 [Conf ] Fanyu Kong , Jia Yu , Baodong Qin , Daxing Li Cryptanalysis of Server-Aided RSA Key Generation Protocols at MADNES 2005. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:52-60 [Conf ] Marcel Cremene , Michel Riveill Service-Context Knowledge-Based Solution for Autonomic Adaptation. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:61-70 [Conf ] Di Zheng , Jun Wang , Yan Jia , Weihong Han , Peng Zou Middleware Based Context Management for the Component-Based Pervasive Computing. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:71-81 [Conf ] Valentina Casola , Emilio Pasquale Mancini , Nicola Mazzocca , Massimiliano Rak , Umberto Villano Building Autonomic and Secure Service Oriented Architectures with MAWeS. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:82-93 [Conf ] David Linner , Heiko Pfeffer , Ilja Radusch , Stephan Steglich Biology as Inspiration Towards a Novel Service Life-Cycle. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:94-102 [Conf ] Stephen S. Yau , Min Yan , Dazhi Huang Design of Service-Based Systems with Adaptive Tradeoff Between Security and Service Delay. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:103-113 [Conf ] Bo Yang , Yong Yu , Fagen Li , Ying Sun Provably Secure Identity-Based Threshold Unsigncryption Scheme. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:114-122 [Conf ] Shane Balfe , Anish Mohammed Final Fantasy - Securing On-Line Gaming with Trusted Computing. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:123-134 [Conf ] Donghyun Choi , Yunho Lee , Hogab Kang , Seungjoo Kim , Dongho Won An Efficient and Secure Rights Sharing Method for DRM System Against Replay Attack. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:135-145 [Conf ] Jimmy McGibney , Dmitri Botvich Establishing Trust Between Mail Servers to Improve Spam Filtering. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:146-155 [Conf ] Hein Meling An Architecture for Self-healing Autonomous Object Groups. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:156-168 [Conf ] George Brancovici , Christian Müller-Schloer A Generic and Modular System Architecture for Trustworthy, Autonomous Applications. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:169-178 [Conf ] Gaeil An , Joon S. Park Cooperative Component Testing Architecture in Collaborating Network Environment. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:179-190 [Conf ] Frederic Stumpf , Michael Benz , Martin Hermanowski , Claudia Eckert An Approach to a Trustworthy System Architecture Using Virtualization. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:191-202 [Conf ] Ruichuan Chen , Xuan Zhao , Liyong Tang , Jian-bin Hu , Zhong Chen CuboidTrust: A Global Reputation-Based Trust Model in Peer-to-Peer Networks. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:203-215 [Conf ] Yuan Wang , Ye Tao , Ping Yu , Feng Xu , Jian Lü A Trust Evolution Model for P2P Networks. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:216-225 [Conf ] Zheng Yan , Christian Prehofer An Adaptive Trust Control Model for a Trustworthy Component Software Platform. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:226-238 [Conf ] Chunmei Gui , Quanyuan Wu , Huaimin Wang Towards Trustworthy Resource Selection: A Fuzzy Reputation Aggregation Approach. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:239-248 [Conf ] Yufeng Wang , Yoshiaki Hori , Kouichi Sakurai An Adaptive Spreading Activation Approach to Combating the Front-Peer Attack in Trust and Reputation System. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:249-258 [Conf ] Jun Luo , Li Ding , ZhiSong Pan , GuiQiang Ni , GuYu Hu Research on Cost-Sensitive Learning in One-Class Anomaly Detection Algorithms. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:259-268 [Conf ] So-Young Yeo , Myung-Sun Baek , Hyoung-Kyu Song Improved and Trustworthy Detection Scheme with Low Complexity in VBLAST System. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:269-275 [Conf ] Shou-Hsuan Stephen Huang , Robert Lychev , Jianhua Yang Stepping-Stone Detection Via Request-Response Traffic Analysis. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:276-285 [Conf ] Sung-Kyoung Kim , Dong-Guk Han , Howon Kim , Kyoil Chung , Jongin Lim SPA Countermeasure Based on Unsigned Left-to-Right Recodings. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:286-295 [Conf ] Wenyuan Kuang , Yaoxue Zhang , Li Wei , Nan Xia , Guangbin Xu , Yue-Zhi Zhou A New One-Way Isolation File-Access Method at the Granularity of a Disk-Block. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:296-305 [Conf ] Chen Yang , Wenping Ma , Xinmei Wang Novel Remote User Authentication Scheme Using Bilinear Pairings. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:306-312 [Conf ] Kai Ouyang , Xiaowen Chu , Yixin Jiang , Hsiao-Hwa Chen , Jiangchuan Liu On the Homonymous Role in Role-Based Discretionary Access Control. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:313-322 [Conf ] Yuqing Sun , Peng Pan , Ho-fung Leung , Bin Shi Ontology Based Hybrid Access Control for Automatic Interoperation. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:323-332 [Conf ] Kuo-Lung Hung , Chin-Chen Chang Recoverable Tamper Proofing Technique for Image Authentication Using Irregular Sampling Coding. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:333-343 [Conf ] Shieh-Shing Lin A Decomposition Strategy Based Trusted Computing Method for Cooperative Control Problem Faced with Communication Constraints. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:344-351 [Conf ] Shuyi Chen , Yingyou Wen , Hong Zhao Formal Analysis of Secure Bootstrap in Trusted Computing. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:352-360 [Conf ] Sanguk Noh Calculating Trust Using Aggregation Rules in Social Networks. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:361-371 [Conf ] Hans Löhr , HariGovind V. Ramasamy , Ahmad-Reza Sadeghi , Stefan Schulz , Matthias Schunter , Christian Stüble Enhancing Grid Security Using Trusted Virtualization. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:372-384 [Conf ] Katsuhiro Takata , Masataka Tanaka , Jianhua Ma , Runhe Huang , Bernady O. Apduhan , Norio Shiratori A Wearable System for Outdoor Running Workout State Recognition and Course Provision. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:385-394 [Conf ] Emmanuel Bresson , Mark Manulis Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:395-409 [Conf ] Mooseop Kim , Youngse Kim , Jaecheol Ryou , Sungik Jun Efficient Implementation of the Keyed-Hash Message Authentication Code Based on SHA-1 Algorithm for Mobile Trusted Computing. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:410-419 [Conf ] Jinheung Lee , Sanggon Lee , Sanguk Shin A Secure DRM Framework for User's Domain and Key Management. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:420-429 [Conf ] Eun-Jun Yoon , Kee-Young Yoo A Secret-Key Exponential Key Agreement Protocol with Smart Cards. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:430-440 [Conf ] Yong Ho Kim , Hwaseong Lee , Jong Hyuk Park , Laurence Tianruo Yang , Dong Hoon Lee Key Establishment Scheme for Sensor Networks with Low Communication Cost. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:441-448 [Conf ] Jianming Fu , Binglan Chen , Huanguo Zhang A Worm Containment Model Based on Neighbor-Alarm. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:449-457 [Conf ] Wolfgang Trumler , Jörg Ehrig , Andreas Pietzowski , Benjamin Satzger , Theo Ungerer A Distributed Self-healing Data Store. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:458-467 [Conf ] Boyun Zhang , Jianping Yin , Jingbo Hao , Dingxing Zhang , Shulin Wang Malicious Codes Detection Based on Ensemble Learning. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:468-477 [Conf ] Yong Tang , Xicheng Lu , Bin Xiao Generating Simplified Regular Expression Signatures for Polymorphic Worms. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:478-488 [Conf ] Zhi (Judy) Fu , Minho Shin , John C. Strassner , Nitin Jain , Vishnu Ram , William A. Arbaugh AAA for Spontaneous Roaming Agreements in Heterogeneous Wireless Networks. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:489-498 [Conf ] Xianshu Zhu , Dafang Zhang , Wenjia Li , Kun Huang A Prediction-Based Fair Replication Algorithm in Structured P2P Systems. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:499-508 [Conf ] Li Wei , Yaoxue Zhang , Yue-Zhi Zhou TransCom: A Virtual Disk Based Self-management System. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:509-518 [Conf ] Wei Chen , Danwei Chen , Guozi Sun , Yingzhou Zhang Defending Against Jamming Attacks in Wireless Local Area Networks. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:519-528 [Conf ] Jun Li , Fumin Yang , Gang Tu , Wan-hua Cao , Yansheng Lu Schedulability Analysis of the Fault-Tolerant Hard Real-Time Tasks with Limited Priority Levels. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:529-538 [Conf ] Yoon-Hwa Choi , Myeong-Hyeon Lee A Property-Based Technique for Tolerating Faults in Bloom Filters for Deep Packet Inspection. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:539-548 [Conf ] Congfeng Jiang , Cheng Wang , Xiaohu Liu , Yinghui Zhao A Fuzzy Logic Approach for Secure and Fault Tolerant Grid Job Scheduling. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:549-558 [Conf ] Fang-Yie Leu , Fuu-Cheng Jiang , Ming-Chang Li , Jia-Chun Lin An Enhanced DGIDE Platform for Intrusion Detection. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:559-568 [Conf ]