Conferences in DBLP
Intrusion Detection System to Detect Wormhole Using Fault Localization Techniques. [Citation Graph (, )][DBLP ] Intrusion Detection in Wireless Sensor Networks. [Citation Graph (, )][DBLP ] Distance Measures for Anomaly Intrusion Detection. [Citation Graph (, )][DBLP ] An Intrusion Detection Model Based on Intention Modeling. [Citation Graph (, )][DBLP ] Intelligent Mobile Agent for Intrusion Detection System. [Citation Graph (, )][DBLP ] An Overview of Multi-modal Biometrics for Authentication. [Citation Graph (, )][DBLP ] A study on biometric key generation from fingerprints: Fingerprint-key generation from stable feature value. [Citation Graph (, )][DBLP ] On the Generation of X.509v3 Certificates with Biometric Information. [Citation Graph (, )][DBLP ] Improvement of User Authentication Using Schema of Visual Memory: Guidance by Verbal Cue. [Citation Graph (, )][DBLP ] An Efficient Authentication Protocol for GSM. [Citation Graph (, )][DBLP ] Combinatorial Approach For Authentication Based on Face Recognition. [Citation Graph (, )][DBLP ] User Authentication via Mouse Biometrics and the usage of Graphic User Interfaces: An Application Approach. [Citation Graph (, )][DBLP ] A Unified Approach To Construct Non-perfect Secret Sharing And Traitor Tracing Schemes. [Citation Graph (, )][DBLP ] Visual Multi-Secret Sharing Scheme with Cheater Identification. [Citation Graph (, )][DBLP ] ParseKey+: A Five-Way Strong Authentication Procedure as an Approach to Client/Server Impersonation Avoidance using Steganography for Key Encryption. [Citation Graph (, )][DBLP ] Steganographic File System Development Based On The Information Hiding Scheme By Permutation Of Sequence Elements. [Citation Graph (, )][DBLP ] Proposal on Automatic Authentication of Cellular Phones by Using Force Sensor. [Citation Graph (, )][DBLP ] A New Steganography Scheme using a Frame. [Citation Graph (, )][DBLP ] Performance Optimization of Close-Color Pair Steganalysis. [Citation Graph (, )][DBLP ] A Time-Bound Hierarchical Key Assignment Cryptosystem with No Lifetime Limit. [Citation Graph (, )][DBLP ] Colored Probabilistic Visual Cryptography Scheme with Reversing. [Citation Graph (, )][DBLP ] RSA and Elliptic Curve- ElGamal Threshold Cryptography (ECCEG-TC) Implementations for Secure Data Forwarding in MANETs. [Citation Graph (, )][DBLP ] Using Generated Digital Images to Modify the PGP Cryptography Protocol. [Citation Graph (, )][DBLP ] Solving Semantic Problems in Chaff and Winnowing Problem by Using Cryptography. [Citation Graph (, )][DBLP ] Exploiting Silence for Ciphertext Only Cryptanalysis of Stream Ciphered Digitized Voice. [Citation Graph (, )][DBLP ] A Formal Approach for Security Policy Enforcement in Concurrent Programs. [Citation Graph (, )][DBLP ] Triangulating the Views of Human and Non-Human Stakeholders in Information System Security Risk Assessment. [Citation Graph (, )][DBLP ] Security Based Heuristic SAX for XML Parsing. [Citation Graph (, )][DBLP ] Calculating the Return on Security Investments - An Approach Based on Principles of Capital Budgeting. [Citation Graph (, )][DBLP ] Security and Privacy: Open Issues with RFID. [Citation Graph (, )][DBLP ] Universally Unique Identifiers: How To Ensure Uniqueness While Protecting The Issuer's Privacy. [Citation Graph (, )][DBLP ] Enhanced User Privacy on Trusted Processors. [Citation Graph (, )][DBLP ] Implementation of Protections as the Element of Information System Security Management. Experiences of Polish Enterprises. [Citation Graph (, )][DBLP ] Secure Web Applications: A Systematic Approach. [Citation Graph (, )][DBLP ] Modeling the Security Objectives According to the Common Criteria Methodology. [Citation Graph (, )][DBLP ] Extending Security/Sustainability through Pervasive Spider Web Networks in Urbanism. [Citation Graph (, )][DBLP ] Advance Diagnosis of Information Security for the Mobile RFID Service. [Citation Graph (, )][DBLP ] A Study of Estimate Risk Level Model Based on Security Maturity. [Citation Graph (, )][DBLP ] More Security on Tunisian e-Commerce Payments by Using SMS for Customer's Authenticity With National Post Office. [Citation Graph (, )][DBLP ] A Brief Study of Students' Attitudes, Curiosity, Interest, and Perceptions of Information and National Security. [Citation Graph (, )][DBLP ] A Key-Set Label Model for Protecting Information Security. [Citation Graph (, )][DBLP ] A Secure Key Distribution Scheme in Wireless Sensor Networks Using Dynamic Clustering Algorithms. [Citation Graph (, )][DBLP ] Enhanced Multi-Level Security: Secure Sharing. [Citation Graph (, )][DBLP ] A Trusted Domain-based Approach for Authorization and Delegation on Mobile Distributed System. [Citation Graph (, )][DBLP ] 4G and Manet, Wireless Network of Future Battlefield. [Citation Graph (, )][DBLP ] Economic Evaluation of IT Security. [Citation Graph (, )][DBLP ] A Generic Metric for Evaluation of Database Security. [Citation Graph (, )][DBLP ] Evaluation of the S-Box Construction Using Arithmetic Modulo Prime Numbers. [Citation Graph (, )][DBLP ] On the Security of 802.11 and 802.1X: Evaluating an Embedded Network Stack. [Citation Graph (, )][DBLP ] Analysis of Probabilistic Information Flow Security Properties. [Citation Graph (, )][DBLP ] Analysis of Smart Card-Based Remote User Authentication Schemes. [Citation Graph (, )][DBLP ] Analysis of Software Vulnerability in Sensor Nodes. [Citation Graph (, )][DBLP ] The Analysis of Key Typing Sounds using Self Organizing Maps. [Citation Graph (, )][DBLP ] A Survey on Digital Watermarking Technologies. [Citation Graph (, )][DBLP ] A Study about DDoS Attacks in SIP Environments. [Citation Graph (, )][DBLP ] Survey on Reputation Management Systems in P2P Network. [Citation Graph (, )][DBLP ] Software Protection by Hardware and Obfuscation. [Citation Graph (, )][DBLP ] An Ontology for the Management of Heteregenous Alerts of Information System. [Citation Graph (, )][DBLP ] Allocation of Partitioned Data by Using A Neural Network Based Approach. [Citation Graph (, )][DBLP ] Reducing Spam Using Network Management Techniques. [Citation Graph (, )][DBLP ] Immunity to Passive Attacks on Generic RNG Model. [Citation Graph (, )][DBLP ] Platform Trust Beyond BIOS Using the Unified Extensible Firmware Interface. [Citation Graph (, )][DBLP ] Contextual Risk-Based Access Control. [Citation Graph (, )][DBLP ] A Practical English Auction Based on the Discrete Logarithms. [Citation Graph (, )][DBLP ] Efficient Encrypted Storage Structure for Prevention of Information Leakage. [Citation Graph (, )][DBLP ] Finding the Change-Point in a Binary Stream with Two Unknown, but Distant, Distributions. [Citation Graph (, )][DBLP ] Non-linear and Non-group Cellular Automata for Cryptographic Applications. [Citation Graph (, )][DBLP ] A Secure E-cash Scheme with Optional Traceability. [Citation Graph (, )][DBLP ] Totally Asynchronous Stream Ciphers + Redundancy = Cryptcoding. [Citation Graph (, )][DBLP ] A PDA Implementation of an Off-line e-Cash Protocol. [Citation Graph (, )][DBLP ] Design and Performance Analysis of an Enhanced Group Key Generation Protocol. [Citation Graph (, )][DBLP ] Security Tools for GRID- Systems. [Citation Graph (, )][DBLP ] Survey of Supercomputer Cluster Security Issues. [Citation Graph (, )][DBLP ] RF Eavesdropping Beowulf Clusters. [Citation Graph (, )][DBLP ] The Issues Involved in Securing Electronic Health Information in Transit. [Citation Graph (, )][DBLP ] Implications for Use of Different Encryption Algorithms on Power Consumption for Mobile Devices in the Healthcare Industry. [Citation Graph (, )][DBLP ] Wireless Rx - Risk Assessment and Recommendations for Securing a Wireless Network in a Medical Practice. [Citation Graph (, )][DBLP ] IT Sharps: Issues Relating to Securely Disposing of Hard Disks from Medical Information Systems. [Citation Graph (, )][DBLP ] A Holistic Perspective on Models for Medical Information Security. [Citation Graph (, )][DBLP ] KILL Features of RFID Tags in a Medical Environment: Boon or Burden? [Citation Graph (, )][DBLP ] The Use of Watermark for the Authentication of Digital Images Mapped Through the Use of the Wavelet Transform. [Citation Graph (, )][DBLP ] PCA-Based Methods for Face Recognition. [Citation Graph (, )][DBLP ] Using Honeynets and Alerts Correlation for Intrusion Detection and Prevention. [Citation Graph (, )][DBLP ] A New Public Key Encryption Scheme Equivalent to Factoring. [Citation Graph (, )][DBLP ] Enhancement of Information Hiding Using XML. [Citation Graph (, )][DBLP ] Remote Group User Authentication with Forward Secrecy and Key Agreement with Smartcard. [Citation Graph (, )][DBLP ] Further Discussions on the Security of a Nominative Signature Scheme. [Citation Graph (, )][DBLP ] A Novel Unified Control Architecture for a High-Performance Network Security Accelerator. [Citation Graph (, )][DBLP ] A MLS Cooperation System Based on Virtual Machine Monitor. [Citation Graph (, )][DBLP ] Education in Software Security. [Citation Graph (, )][DBLP ] Embedded Processor Security. [Citation Graph (, )][DBLP ]