The SCEAS System
Navigation Menu

Conferences in DBLP

Security and Management (SAM) (csreaSAM)
2007 (conf/csreaSAM/2007)


  1. Intrusion Detection System to Detect Wormhole Using Fault Localization Techniques. [Citation Graph (, )][DBLP]


  2. Intrusion Detection in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  3. Distance Measures for Anomaly Intrusion Detection. [Citation Graph (, )][DBLP]


  4. An Intrusion Detection Model Based on Intention Modeling. [Citation Graph (, )][DBLP]


  5. Intelligent Mobile Agent for Intrusion Detection System. [Citation Graph (, )][DBLP]


  6. An Overview of Multi-modal Biometrics for Authentication. [Citation Graph (, )][DBLP]


  7. A study on biometric key generation from fingerprints: Fingerprint-key generation from stable feature value. [Citation Graph (, )][DBLP]


  8. On the Generation of X.509v3 Certificates with Biometric Information. [Citation Graph (, )][DBLP]


  9. Improvement of User Authentication Using Schema of Visual Memory: Guidance by Verbal Cue. [Citation Graph (, )][DBLP]


  10. An Efficient Authentication Protocol for GSM. [Citation Graph (, )][DBLP]


  11. Combinatorial Approach For Authentication Based on Face Recognition. [Citation Graph (, )][DBLP]


  12. User Authentication via Mouse Biometrics and the usage of Graphic User Interfaces: An Application Approach. [Citation Graph (, )][DBLP]


  13. A Unified Approach To Construct Non-perfect Secret Sharing And Traitor Tracing Schemes. [Citation Graph (, )][DBLP]


  14. Visual Multi-Secret Sharing Scheme with Cheater Identification. [Citation Graph (, )][DBLP]


  15. ParseKey+: A Five-Way Strong Authentication Procedure as an Approach to Client/Server Impersonation Avoidance using Steganography for Key Encryption. [Citation Graph (, )][DBLP]


  16. Steganographic File System Development Based On The Information Hiding Scheme By Permutation Of Sequence Elements. [Citation Graph (, )][DBLP]


  17. Proposal on Automatic Authentication of Cellular Phones by Using Force Sensor. [Citation Graph (, )][DBLP]


  18. A New Steganography Scheme using a Frame. [Citation Graph (, )][DBLP]


  19. Performance Optimization of Close-Color Pair Steganalysis. [Citation Graph (, )][DBLP]


  20. A Time-Bound Hierarchical Key Assignment Cryptosystem with No Lifetime Limit. [Citation Graph (, )][DBLP]


  21. Colored Probabilistic Visual Cryptography Scheme with Reversing. [Citation Graph (, )][DBLP]


  22. RSA and Elliptic Curve- ElGamal Threshold Cryptography (ECCEG-TC) Implementations for Secure Data Forwarding in MANETs. [Citation Graph (, )][DBLP]


  23. Using Generated Digital Images to Modify the PGP Cryptography Protocol. [Citation Graph (, )][DBLP]


  24. Solving Semantic Problems in Chaff and Winnowing Problem by Using Cryptography. [Citation Graph (, )][DBLP]


  25. Exploiting Silence for Ciphertext Only Cryptanalysis of Stream Ciphered Digitized Voice. [Citation Graph (, )][DBLP]


  26. A Formal Approach for Security Policy Enforcement in Concurrent Programs. [Citation Graph (, )][DBLP]


  27. Triangulating the Views of Human and Non-Human Stakeholders in Information System Security Risk Assessment. [Citation Graph (, )][DBLP]


  28. Security Based Heuristic SAX for XML Parsing. [Citation Graph (, )][DBLP]


  29. Calculating the Return on Security Investments - An Approach Based on Principles of Capital Budgeting. [Citation Graph (, )][DBLP]


  30. Security and Privacy: Open Issues with RFID. [Citation Graph (, )][DBLP]


  31. Universally Unique Identifiers: How To Ensure Uniqueness While Protecting The Issuer's Privacy. [Citation Graph (, )][DBLP]


  32. Enhanced User Privacy on Trusted Processors. [Citation Graph (, )][DBLP]


  33. Implementation of Protections as the Element of Information System Security Management. Experiences of Polish Enterprises. [Citation Graph (, )][DBLP]


  34. Secure Web Applications: A Systematic Approach. [Citation Graph (, )][DBLP]


  35. Modeling the Security Objectives According to the Common Criteria Methodology. [Citation Graph (, )][DBLP]


  36. Extending Security/Sustainability through Pervasive Spider Web Networks in Urbanism. [Citation Graph (, )][DBLP]


  37. Advance Diagnosis of Information Security for the Mobile RFID Service. [Citation Graph (, )][DBLP]


  38. A Study of Estimate Risk Level Model Based on Security Maturity. [Citation Graph (, )][DBLP]


  39. More Security on Tunisian e-Commerce Payments by Using SMS for Customer's Authenticity With National Post Office. [Citation Graph (, )][DBLP]


  40. A Brief Study of Students' Attitudes, Curiosity, Interest, and Perceptions of Information and National Security. [Citation Graph (, )][DBLP]


  41. A Key-Set Label Model for Protecting Information Security. [Citation Graph (, )][DBLP]


  42. A Secure Key Distribution Scheme in Wireless Sensor Networks Using Dynamic Clustering Algorithms. [Citation Graph (, )][DBLP]


  43. Enhanced Multi-Level Security: Secure Sharing. [Citation Graph (, )][DBLP]


  44. A Trusted Domain-based Approach for Authorization and Delegation on Mobile Distributed System. [Citation Graph (, )][DBLP]


  45. 4G and Manet, Wireless Network of Future Battlefield. [Citation Graph (, )][DBLP]


  46. Economic Evaluation of IT Security. [Citation Graph (, )][DBLP]


  47. A Generic Metric for Evaluation of Database Security. [Citation Graph (, )][DBLP]


  48. Evaluation of the S-Box Construction Using Arithmetic Modulo Prime Numbers. [Citation Graph (, )][DBLP]


  49. On the Security of 802.11 and 802.1X: Evaluating an Embedded Network Stack. [Citation Graph (, )][DBLP]


  50. Analysis of Probabilistic Information Flow Security Properties. [Citation Graph (, )][DBLP]


  51. Analysis of Smart Card-Based Remote User Authentication Schemes. [Citation Graph (, )][DBLP]


  52. Analysis of Software Vulnerability in Sensor Nodes. [Citation Graph (, )][DBLP]


  53. The Analysis of Key Typing Sounds using Self Organizing Maps. [Citation Graph (, )][DBLP]


  54. A Survey on Digital Watermarking Technologies. [Citation Graph (, )][DBLP]


  55. A Study about DDoS Attacks in SIP Environments. [Citation Graph (, )][DBLP]


  56. Survey on Reputation Management Systems in P2P Network. [Citation Graph (, )][DBLP]


  57. Software Protection by Hardware and Obfuscation. [Citation Graph (, )][DBLP]


  58. An Ontology for the Management of Heteregenous Alerts of Information System. [Citation Graph (, )][DBLP]


  59. Allocation of Partitioned Data by Using A Neural Network Based Approach. [Citation Graph (, )][DBLP]


  60. Reducing Spam Using Network Management Techniques. [Citation Graph (, )][DBLP]


  61. Immunity to Passive Attacks on Generic RNG Model. [Citation Graph (, )][DBLP]


  62. Platform Trust Beyond BIOS Using the Unified Extensible Firmware Interface. [Citation Graph (, )][DBLP]


  63. Contextual Risk-Based Access Control. [Citation Graph (, )][DBLP]


  64. A Practical English Auction Based on the Discrete Logarithms. [Citation Graph (, )][DBLP]


  65. Efficient Encrypted Storage Structure for Prevention of Information Leakage. [Citation Graph (, )][DBLP]


  66. Finding the Change-Point in a Binary Stream with Two Unknown, but Distant, Distributions. [Citation Graph (, )][DBLP]


  67. Non-linear and Non-group Cellular Automata for Cryptographic Applications. [Citation Graph (, )][DBLP]


  68. A Secure E-cash Scheme with Optional Traceability. [Citation Graph (, )][DBLP]


  69. Totally Asynchronous Stream Ciphers + Redundancy = Cryptcoding. [Citation Graph (, )][DBLP]


  70. A PDA Implementation of an Off-line e-Cash Protocol. [Citation Graph (, )][DBLP]


  71. Design and Performance Analysis of an Enhanced Group Key Generation Protocol. [Citation Graph (, )][DBLP]


  72. Security Tools for GRID- Systems. [Citation Graph (, )][DBLP]


  73. Survey of Supercomputer Cluster Security Issues. [Citation Graph (, )][DBLP]


  74. RF Eavesdropping Beowulf Clusters. [Citation Graph (, )][DBLP]


  75. The Issues Involved in Securing Electronic Health Information in Transit. [Citation Graph (, )][DBLP]


  76. Implications for Use of Different Encryption Algorithms on Power Consumption for Mobile Devices in the Healthcare Industry. [Citation Graph (, )][DBLP]


  77. Wireless Rx - Risk Assessment and Recommendations for Securing a Wireless Network in a Medical Practice. [Citation Graph (, )][DBLP]


  78. IT Sharps: Issues Relating to Securely Disposing of Hard Disks from Medical Information Systems. [Citation Graph (, )][DBLP]


  79. A Holistic Perspective on Models for Medical Information Security. [Citation Graph (, )][DBLP]


  80. KILL Features of RFID Tags in a Medical Environment: Boon or Burden? [Citation Graph (, )][DBLP]


  81. The Use of Watermark for the Authentication of Digital Images Mapped Through the Use of the Wavelet Transform. [Citation Graph (, )][DBLP]


  82. PCA-Based Methods for Face Recognition. [Citation Graph (, )][DBLP]


  83. Using Honeynets and Alerts Correlation for Intrusion Detection and Prevention. [Citation Graph (, )][DBLP]


  84. A New Public Key Encryption Scheme Equivalent to Factoring. [Citation Graph (, )][DBLP]


  85. Enhancement of Information Hiding Using XML. [Citation Graph (, )][DBLP]


  86. Remote Group User Authentication with Forward Secrecy and Key Agreement with Smartcard. [Citation Graph (, )][DBLP]


  87. Further Discussions on the Security of a Nominative Signature Scheme. [Citation Graph (, )][DBLP]


  88. A Novel Unified Control Architecture for a High-Performance Network Security Accelerator. [Citation Graph (, )][DBLP]


  89. A MLS Cooperation System Based on Virtual Machine Monitor. [Citation Graph (, )][DBLP]


  90. Education in Software Security. [Citation Graph (, )][DBLP]


  91. Embedded Processor Security. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002