The SCEAS System
Navigation Menu

Conferences in DBLP

Security and Management (SAM) (csreaSAM)
2008 (conf/csreaSAM/2008)


  1. A Fast FPGA Implementation of Tate Pairing in Cryptography over Binary Field. [Citation Graph (, )][DBLP]


  2. Impossible Differential Cryptanalysis of Safer++. [Citation Graph (, )][DBLP]


  3. Cryptographic Voter-Verifiability: Practical Approach. [Citation Graph (, )][DBLP]


  4. Using a PC Camera to Generate Cryptographically Strong Random Numbers. [Citation Graph (, )][DBLP]


  5. Exploration of Quantum Cryptography in Network Security: The Case Study of The DARPA Quantum Cryptography Network. [Citation Graph (, )][DBLP]


  6. Invertibility Issues of Truncated Polynomials in NTRU Cryptosystems. [Citation Graph (, )][DBLP]


  7. Incremental Fingerprint Recognition Model for Distributed Authentication. [Citation Graph (, )][DBLP]


  8. How to Integrate Diverse Client Authentication Protocol with various authentication means. [Citation Graph (, )][DBLP]


  9. Realization of Customer Authentication by SMS and a New Way to Pay in e-Commerce. [Citation Graph (, )][DBLP]


  10. A Method of Automatic User Authentication by Fulltime Monitoring of Keystroke Timings. [Citation Graph (, )][DBLP]


  11. Ownership Transfer of RFID Tags based on Electronic Fingerprint. [Citation Graph (, )][DBLP]


  12. E-mail Security and Authentication Using Captcha and DSA. [Citation Graph (, )][DBLP]


  13. General Authentication Test. [Citation Graph (, )][DBLP]


  14. Digital Watermarking Technique for Ownership Claim using Buyer Signature. [Citation Graph (, )][DBLP]


  15. Efficient Biometrics Remote User Authentication Scheme. [Citation Graph (, )][DBLP]


  16. A Novel Group Key Management Scheme for Privacy Protection Sensitive Information Systems. [Citation Graph (, )][DBLP]


  17. An Authorization Scheme Using partial ID for Privacy protection in RFID. [Citation Graph (, )][DBLP]


  18. Making A CASE for PACE: Components of the Combined Authentication Scheme Encapsulation for a Privacy Augmented Collaborative Environment. [Citation Graph (, )][DBLP]


  19. A Theory of Probabilistic One-Time Passwords. [Citation Graph (, )][DBLP]


  20. Password Entry Scheme Resistant to Eavesdropping. [Citation Graph (, )][DBLP]


  21. Design of an Automatic Password Protection Mechanism for Digital Documents. [Citation Graph (, )][DBLP]


  22. Visual Applications of Probabilistic One-Time Passwords for Personal Authentication. [Citation Graph (, )][DBLP]


  23. Virtual Password: Virtual Environment Based User Authentication. [Citation Graph (, )][DBLP]


  24. Experiments with a Visual Probabilistic One-Time Password Authentication System. [Citation Graph (, )][DBLP]


  25. Automated Intrusion Response System: Surveys and Analysis. [Citation Graph (, )][DBLP]


  26. IPSec Mechanism for Implementing VPN. [Citation Graph (, )][DBLP]


  27. Remote IP Addresses Based Intrusion Detection. [Citation Graph (, )][DBLP]


  28. Website Registration Using Link for Privacy. [Citation Graph (, )][DBLP]


  29. Forensic Protocol Filtering of Phone Managers. [Citation Graph (, )][DBLP]


  30. Conceptual Modeling of Information Systems for Integrated IT-Risk and Security Management. [Citation Graph (, )][DBLP]


  31. A Security Design for Information Sharing between Control System and Information System. [Citation Graph (, )][DBLP]


  32. Raising Awareness in Information Security: Everyone Should Participate. [Citation Graph (, )][DBLP]


  33. On Providing Automatic Parental Consent over Information Collection from Children. [Citation Graph (, )][DBLP]


  34. Approximate Packet Pre-filtering to Accelerate Pattern Matching. [Citation Graph (, )][DBLP]


  35. Physical Access Control with Biometric Keys. [Citation Graph (, )][DBLP]


  36. Service Independent Access Control Architecture for User Generated Content (UGC). [Citation Graph (, )][DBLP]


  37. Comparison of Threshold Proxy Signature Schemes. [Citation Graph (, )][DBLP]


  38. A Generalized Chaos Synchronization Based Digital Signature Scheme with Application. [Citation Graph (, )][DBLP]


  39. New Proxy Signature, Proxy Blind Signature and Blind Proxy Signature Based on the Okamoto Signature. [Citation Graph (, )][DBLP]


  40. Abstracting Parent Mitigations from the CAPEC Attack Pattern Dictionary. [Citation Graph (, )][DBLP]


  41. DDoS Attack Detection Based on Compensation Non-Parameter CUSUM Algorithm. [Citation Graph (, )][DBLP]


  42. A Framework of Decentralized PKI Key Management Based on Dynamic Trust. [Citation Graph (, )][DBLP]


  43. Design Principles of a Decision Support System for Critical Information Infrastructure Protection. [Citation Graph (, )][DBLP]


  44. TUVNL: An Experimental Network Security Lab for Research and Education. [Citation Graph (, )][DBLP]


  45. Secure Resource Sharing in Ad hoc Networks. [Citation Graph (, )][DBLP]


  46. Securing Security Policies in Autonomic Computing Systems. [Citation Graph (, )][DBLP]


  47. Performance Evaluation of Secured versus Non-Secured EIGRP Routing Protocol. [Citation Graph (, )][DBLP]


  48. A Multi-Layered Approach to Botnet Detection. [Citation Graph (, )][DBLP]


  49. Phishing Guard and Antivirus: A New Approach. [Citation Graph (, )][DBLP]


  50. Web Spoofing. [Citation Graph (, )][DBLP]


  51. Steps for Improving Data Comprehension for Digital Security and Forensics. [Citation Graph (, )][DBLP]


  52. Multi-Map Orbit Hopping Chaotic Cipher. [Citation Graph (, )][DBLP]


  53. Combining the SMTP tar pit simulator with white listing. [Citation Graph (, )][DBLP]


  54. Security at the Terminal Building at Airports. [Citation Graph (, )][DBLP]


  55. Considerations of the SLA management system. [Citation Graph (, )][DBLP]


  56. 3D Face Recognition for Unattended Border Control. [Citation Graph (, )][DBLP]


  57. A Client-Server Approach to Capture Web Browsing History. [Citation Graph (, )][DBLP]


  58. Managing Diversity in Networks. [Citation Graph (, )][DBLP]


  59. System Isolation Beyond BIOS using the Unified Extensible Firmware Interface. [Citation Graph (, )][DBLP]


  60. Distributed Authorization Cache. [Citation Graph (, )][DBLP]


  61. Detection of Malicious User in Oracle 10g DBMS and Cost of Elimination. [Citation Graph (, )][DBLP]


  62. The Multi-Map Orbit Hopping Mechanism. [Citation Graph (, )][DBLP]


  63. An Improved Indexing Scheme for Range Queries. [Citation Graph (, )][DBLP]


  64. Robust Distance-Based Watermarking for Digital Image. [Citation Graph (, )][DBLP]


  65. Forensic Data Acquisition from Cell Phones using JTAG Interface. [Citation Graph (, )][DBLP]


  66. Secure Inter-Vehicle Vital Signal Communication via Short Dynamic Group Management. [Citation Graph (, )][DBLP]


  67. Support for multiple federation technologies in a Single Sign On architecture. [Citation Graph (, )][DBLP]


  68. Requirements for Digital Forensics Investigation Domain-Specific Languages. [Citation Graph (, )][DBLP]


  69. Synchronous Key Generation from Chaotic Systems. [Citation Graph (, )][DBLP]


  70. Memetic & Genetic Algorithms: A Comparison between two approaches for the cryptanalysis of Simplified Data Encryption Standard algorithm. [Citation Graph (, )][DBLP]


  71. Encryption and Decryption of Bitmap Images via Blowfish and Pseudo Triple DES Block Cipher Algorithms in Distributed Systems. [Citation Graph (, )][DBLP]


  72. DES Enhancement Using Key-Based Randomized Initial Permutation. [Citation Graph (, )][DBLP]


  73. New S-box Design of Advance Encryption Standard, AES. [Citation Graph (, )][DBLP]


  74. A Scalable Security Protocol for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  75. Implementing Cryptography for Packet Level Authentication. [Citation Graph (, )][DBLP]


  76. Secure Authentication in Virtual Community by Using Media Access Control address (MAC). [Citation Graph (, )][DBLP]


  77. Security Modification for the Hwang-Wen-Hwang's E-voting Scheme. [Citation Graph (, )][DBLP]


  78. Implementations of Montgomery Multiplication Algorithms in Machine Languages. [Citation Graph (, )][DBLP]


  79. Implementation of Domingo Ferrer's a New Privacy Homomorphism (DF a New PH) in Securing Wireless Sensor Networks (WSN). [Citation Graph (, )][DBLP]


  80. A Cryptographic Protocol for E-Voting Systems. [Citation Graph (, )][DBLP]


  81. Real Time Cryptanalysis of Unsystematic Cipher. [Citation Graph (, )][DBLP]


  82. A Secure Online Chat System. [Citation Graph (, )][DBLP]


  83. Developing Applications for Lego Robots Using Multiple Platforms. [Citation Graph (, )][DBLP]


  84. Automatic Formation of Abstract State Space Representations for Reinforcement Learning Agents Agents with Hierarchical Skill Sets. [Citation Graph (, )][DBLP]


  85. Decision Assistant Model for the Identity Selector in User-Centric Idm. [Citation Graph (, )][DBLP]


  86. An Ad Hoc Trust Inference Model for Flexible and Controlled Information Sharing. [Citation Graph (, )][DBLP]


  87. Web Intrusion Detection Using a Graph-based Sequence Learning Algorithm. [Citation Graph (, )][DBLP]


  88. An Integrated Face-Gait System for Automatic Recognition of Humans. [Citation Graph (, )][DBLP]


  89. Intrusion Detection System for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  90. Ontology-based Approach to the Common Criteria Compliant IT Security Development. [Citation Graph (, )][DBLP]


  91. Forensic Implications of Using the Firewire Memory Exploit with Microsoft Windows XP. [Citation Graph (, )][DBLP]


  92. Is There an Ideal Forensic Process?. [Citation Graph (, )][DBLP]


  93. A Study into the Forensic Recoverability of Data from 2nd Hand Blackberry Devices: World-Class Security, Foiled by Humans. [Citation Graph (, )][DBLP]


  94. What Artifacts do Current BitTorrent Clients Leave Behind?. [Citation Graph (, )][DBLP]


  95. Integrating Forensics Capabilities into Web Applications: Teaching Students the Why and How. [Citation Graph (, )][DBLP]


  96. Cold Boot Memory Acquisition: An Investigation into Memory Freezing and Data Retention Claims. [Citation Graph (, )][DBLP]


  97. A Comparison Between Residues of Prime Numbers and Arithmetic Modulo Powers of Two for S-Box Implementation. [Citation Graph (, )][DBLP]


  98. Matrix Cipher and Its Application in Computer Security. [Citation Graph (, )][DBLP]


  99. Authentication Architecture Based on Crypto-Biometric Systems. [Citation Graph (, )][DBLP]


  100. Towards a Mobile Applications Security Approach. [Citation Graph (, )][DBLP]


  101. Identity Authentication Services. [Citation Graph (, )][DBLP]


  102. A Knowledge-Based Distributed Biometric Authentication Entity Mechanism. [Citation Graph (, )][DBLP]


  103. An Adaptive Coding Algorithm for Secret Transmission of Information. [Citation Graph (, )][DBLP]


  104. An Image-Based Website User Authentication Mechanism Using Smart Card. [Citation Graph (, )][DBLP]


  105. Framework Proposal for Sender's Authentication. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002