The SCEAS System
Navigation Menu

Conferences in DBLP

Security and Management (SAM) (csreaSAM)
2009 (conf/csreaSAM/2009)

  1. A Stochastic Model of the Damage Propagation in Database Systems. [Citation Graph (, )][DBLP]

  2. Adaptive Risk-Aware Application-Level Access Control. [Citation Graph (, )][DBLP]

  3. Investigation of Computer Security and Ethics Awareness in University Environment. [Citation Graph (, )][DBLP]

  4. Information Security and Threats: A study on E-Commerce. [Citation Graph (, )][DBLP]

  5. A Translation of NIST Security Controls Into DBMS Security Procedures (FISMA Compliance). [Citation Graph (, )][DBLP]

  6. Detecting Anomalies in Network Traffic with Entropy based MA-RMSE Algorithms. [Citation Graph (, )][DBLP]

  7. An Analysis of Data Protection Strategies. [Citation Graph (, )][DBLP]

  8. Steganographic System with Dynamically Reconfigurable Structure. [Citation Graph (, )][DBLP]

  9. A New Element in Information Security Process Security Aware Smart Household Employee. [Citation Graph (, )][DBLP]

  10. Advanced Network Traffic Visualization in the Service of Network Security. [Citation Graph (, )][DBLP]

  11. An organizational pattern for contributing to the deployment of secure Virtual Enterprises. [Citation Graph (, )][DBLP]

  12. A New Practical Scheme for Protecting Web Content. [Citation Graph (, )][DBLP]

  13. Computer Support of Risk Analysis in Information Technology Environment. [Citation Graph (, )][DBLP]

  14. Today & Tomorrow: IEEE 802.11 WLAN Security. [Citation Graph (, )][DBLP]

  15. New Data Encryption Algorithm and its Implementation for Online User Authentication. [Citation Graph (, )][DBLP]

  16. Analysis of Chinese Remainder Theorem Based Group Key Management Protocols. [Citation Graph (, )][DBLP]

  17. A Performance Comparison of Microsoft SQL Server 2008 Transparent Data Encryption and NetLib Encryptionizer. [Citation Graph (, )][DBLP]

  18. Security Requirements for Scalable IPTV Services. [Citation Graph (, )][DBLP]

  19. A Framework for Online Examination Security Based on Cryptology and Biometrics. [Citation Graph (, )][DBLP]

  20. An AES-Based Encryption Algorithm with Shuffling. [Citation Graph (, )][DBLP]

  21. Cryptanalysis of an Identification Scheme Based on the Perceptron Problem using a Hybridization of Deterministic Optimization and Genetic Algorithm. [Citation Graph (, )][DBLP]

  22. Design and Anlysis of Cryptographically Strong S-Boxes: A Novel Approach. [Citation Graph (, )][DBLP]

  23. A Secure Intranet VoIP Framework. [Citation Graph (, )][DBLP]

  24. Cryptanalysis of RSA with Constrained Low Public Exponent. [Citation Graph (, )][DBLP]

  25. A Novel And Efficient Algorithm To Enhance The Complexity Of Elliptic Curve Cryptography. [Citation Graph (, )][DBLP]

  26. Metrics for Analysis of Cryptograhic Algorithms. [Citation Graph (, )][DBLP]

  27. Cryptanalysis of Finite Automata Public Key Cryptosystems. [Citation Graph (, )][DBLP]

  28. Optical Encryption with Jigsaw Transform using Matlab. [Citation Graph (, )][DBLP]

  29. Design of a Cryptographic Software for Wireless Network Security. [Citation Graph (, )][DBLP]

  30. Prevention of ATM Fraud Using F-PIN. [Citation Graph (, )][DBLP]

  31. A Practical SMS-based Mutual Authentication Protocol for Secure Online Banking. [Citation Graph (, )][DBLP]

  32. Differentiated Services to Provide Efficient Node Authentication in VANETs. [Citation Graph (, )][DBLP]

  33. A Shoulder-Surfing-Resistant Image-Based Authentication System with Temporal Indirect Image Selection. [Citation Graph (, )][DBLP]

  34. Study of Biometric Authentication Method Using Behavior Characteristics on Game Consoles. [Citation Graph (, )][DBLP]

  35. Usage Control in Conditional Access System with malicious Set-top Box. [Citation Graph (, )][DBLP]

  36. Secure Authentication Using Visual Cryptography. [Citation Graph (, )][DBLP]

  37. Fingerprint Biometric Solution for Securely Secret Sharing. [Citation Graph (, )][DBLP]

  38. Conditional Access Systems for Internet Content Protection. [Citation Graph (, )][DBLP]

  39. An Agent-Based Single Sign-On Scheme for Web Services Environments. [Citation Graph (, )][DBLP]

  40. RFID Authentication Protocol Conforming to EPC Class-1 Generation-2 Standard. [Citation Graph (, )][DBLP]

  41. An Effective Method for Revocable Biometric Key Generation. [Citation Graph (, )][DBLP]

  42. A Secure Certificate for Secure Group Communication. [Citation Graph (, )][DBLP]

  43. Authentication Practices At The User Interface: Vulnerability Of Users And Organizations In Nigeria. [Citation Graph (, )][DBLP]

  44. Realistic Approach against Worm Attack on Computer Networks by Emulating Human Immune System. [Citation Graph (, )][DBLP]

  45. Denial of Service Attack Resilience on Area Expanded WLAN Services. [Citation Graph (, )][DBLP]

  46. Simplified Single Packet Authorization. [Citation Graph (, )][DBLP]

  47. Artificial Neural Network for IDS Solution. [Citation Graph (, )][DBLP]

  48. Validation of the Specification Means Ontology on the Simple Firewall Case. [Citation Graph (, )][DBLP]

  49. An Intrusion Detection System for Mobile Ad-Hoc Networks. [Citation Graph (, )][DBLP]

  50. A Database Firewall Server Using Data Masking. [Citation Graph (, )][DBLP]

  51. Data Mining and Anonymous Opt-out. [Citation Graph (, )][DBLP]

  52. Two Efficient Proxy Signature Schemes for Delegation Chains with Nonrepudiation and Untraceability. [Citation Graph (, )][DBLP]

  53. A Tripartite Strong Designated Verifier Scheme Based On Threshold RSA Signatures. [Citation Graph (, )][DBLP]

  54. Intelligent Anti-Internet Worm Automatically Detect and Update Signatures Server. [Citation Graph (, )][DBLP]

  55. Bilinear-pairings Based Designated-verifier Threshold Proxy Signature Scheme. [Citation Graph (, )][DBLP]

  56. Cloud Net-Booting Beyond BIOS Using the Unified Extensible Firmware Interface. [Citation Graph (, )][DBLP]

  57. A Secure Multi-Provider OSGi Platform Enabling Process-Isolation by Using Distribution. [Citation Graph (, )][DBLP]

  58. Security Level Determination Using Branes for Contextual Based Global Processing: An Architecture. [Citation Graph (, )][DBLP]

  59. Access Control Beyond BIOS Using the Unified Extensible Firmware Interface. [Citation Graph (, )][DBLP]

  60. Evaluation of Secure Routing Protocols in Mobile Ad Hoc Networks (MANETs). [Citation Graph (, )][DBLP]

  61. Analysis of RFID Authentication Protocols Based on Static and Dynamic Shared Secret. [Citation Graph (, )][DBLP]

  62. A Service Framework based on Grades of IdPs and SPs. [Citation Graph (, )][DBLP]

  63. Design Considerations for a Cyber Incident Mission Impact Assessment (CIMIA) Process. [Citation Graph (, )][DBLP]

  64. USB Data leakage prevention Using hardware based data inspection technique. [Citation Graph (, )][DBLP]

  65. Incremental Information Flow Analysis of Role Based Access Control. [Citation Graph (, )][DBLP]

  66. Location Contexts in Role-based Security Policy Enforcement. [Citation Graph (, )][DBLP]

  67. Securing the Environment: A Methodology for Weighting and Analyzing Attack Graphs. [Citation Graph (, )][DBLP]

  68. Multi-region based Clustering Analysis Method for Unknown Malicious Code Detection. [Citation Graph (, )][DBLP]

  69. Tamper Detection and Localization for Categorical Data Using Fragile Watermarks for Multi Owner Databases. [Citation Graph (, )][DBLP]

  70. The Stability of Trapdoor One Way Function Based on Finite Automata. [Citation Graph (, )][DBLP]

  71. Ontology Driven Security for Mobile Applications. [Citation Graph (, )][DBLP]

  72. Security Metrics-Review and Research Directions. [Citation Graph (, )][DBLP]

  73. Artificial Neural Networks as a Tool for Identifying Image Spam. [Citation Graph (, )][DBLP]

  74. Abnormal Traffcic Detection using Flow-based Traffic Measuring Scheme. [Citation Graph (, )][DBLP]

  75. Digital ID Wallet: Provide Selective Disclosure and Users Control of Identity Information. [Citation Graph (, )][DBLP]

  76. Phishpin: An Integrated Anti-Phishing Framework. [Citation Graph (, )][DBLP]

  77. Split-DFA (SDFA) for Scalable Pattern Matching in Network Security. [Citation Graph (, )][DBLP]

  78. Visualization for Rapid Assessment and Projection in Cyber Situational Awareness. [Citation Graph (, )][DBLP]

  79. A Multi-secret Sharing Scheme in an Access Structure. [Citation Graph (, )][DBLP]

  80. Rule-Based Auditing System for Security Assurance in Ubiquitous Computing. [Citation Graph (, )][DBLP]

  81. A Framework for Building and Managing Secured ERP Landscape. [Citation Graph (, )][DBLP]

  82. Multiple Watermarking for Relational Data. [Citation Graph (, )][DBLP]

  83. A Matter of Trust: Studies of Organizational Systems of Justice Perceptions on Attitudes about Corporate Surveillance. [Citation Graph (, )][DBLP]

  84. Increasing Security Awareness: Designing a Socially Engineered E-mail Worm. [Citation Graph (, )][DBLP]

  85. Using a Statistical Approach for Optimal Security Parameter Determination. [Citation Graph (, )][DBLP]

  86. On the Randomness and Regularity of Reduced Edon-R Compression Function. [Citation Graph (, )][DBLP]

  87. Improving the Client Security Using the Smart Card and Trusted Server. [Citation Graph (, )][DBLP]

  88. The Detection and Response Mechanism against Abnormal Traffic Attack in ATN Network. [Citation Graph (, )][DBLP]

  89. Fingerprint Based Secure Authentication Protocol using OTP in e-Banking. [Citation Graph (, )][DBLP]

  90. Security and Efficiency Analyses of Security Mechanisms in e-Passport Systems. [Citation Graph (, )][DBLP]

  91. On the Security and Efficiency of Secure Channel Coding Schemes Based on Punctured Codes. [Citation Graph (, )][DBLP]

  92. Biometric Fuzzy Extractor Scheme for Iris Templates. [Citation Graph (, )][DBLP]

  93. A Study on Multi-Resipient Encryptions for Selective Disclosure. [Citation Graph (, )][DBLP]

  94. Graphic Multisecret Sharing Schemes with One-Dimensional Cellular Automata. [Citation Graph (, )][DBLP]

  95. On the use of Continued Fractions for Stream Ciphers. [Citation Graph (, )][DBLP]

  96. Tantra: A Fast PRNG Algorithm and its Implementation. [Citation Graph (, )][DBLP]

  97. The Development of a Security Engineering Course at Tuskegee University. [Citation Graph (, )][DBLP]

  98. Specialized Solutions for Improvement of Firewall Performance and Conformity to Security Policy. [Citation Graph (, )][DBLP]

  99. Fun & Games: An Introduction to Console Forensics. [Citation Graph (, )][DBLP]

  100. SCADA Security - Slowly Circling a Disaster Area. [Citation Graph (, )][DBLP]

  101. Snort IDS for SCADA Networks. [Citation Graph (, )][DBLP]

  102. Do Current BitTorrent Clients Running on Windows 7 Beta Leave Behind Meaningful Data? [Citation Graph (, )][DBLP]

  103. Selecting Trust Peers Based on Updated Credit Value in Peer-to-Peer Networks. [Citation Graph (, )][DBLP]

  104. Firewire Forensics in Modern Operating Systems. [Citation Graph (, )][DBLP]

  105. Data Protection in Object-based Storage Devices. [Citation Graph (, )][DBLP]

  106. Detection of Specific Semantic Functionalities, such as Self-Replication Mechanism, in Malware Using Colored Petri Nets. [Citation Graph (, )][DBLP]

  107. A modified Knuth-Morris-Pratt Algorithm for Zero-day Polymorphic Worms Detection. [Citation Graph (, )][DBLP]

  108. Proposed New Quantum Cryptography System Using Quantum Description Techniques for Generated Curves. [Citation Graph (, )][DBLP]

  109. Self Generating Multi Keys Cryptosystem Model for Non-Invertible Matrices based on Hill Cipher. [Citation Graph (, )][DBLP]

System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002