The SCEAS System
Navigation Menu

Conferences in DBLP

International Conference on Information Systems Security (iciss)
2008 (conf/iciss/2008)


  1. BitBlaze: A New Approach to Computer Security via Binary Analysis. [Citation Graph (, )][DBLP]


  2. On the Decidability of Model-Checking Information Flow Properties. [Citation Graph (, )][DBLP]


  3. Synthesizing Enforcement Monitors wrt. the Safety-Progress Classification of Properties. [Citation Graph (, )][DBLP]


  4. Implicit Flows: Can't Live with 'Em, Can't Live without 'Em. [Citation Graph (, )][DBLP]


  5. A Robust Reputation Scheme for Decentralized Group Management Systems. [Citation Graph (, )][DBLP]


  6. Complexity of Checking Freshness of Cryptographic Protocols. [Citation Graph (, )][DBLP]


  7. Secure Internet Voting Based on Paper Ballots. [Citation Graph (, )][DBLP]


  8. A Secure Round-Based Timestamping Scheme with Absolute Timestamps (Short Paper). [Citation Graph (, )][DBLP]


  9. A Framework for Trustworthy Service-Oriented Computing (Short Paper). [Citation Graph (, )][DBLP]


  10. Revisiting Bluetooth Security (Short Paper). [Citation Graph (, )][DBLP]


  11. A Verification Framework for Temporal RBAC with Role Hierarchy (Short Paper). [Citation Graph (, )][DBLP]


  12. Computing on Encrypted Data. [Citation Graph (, )][DBLP]


  13. Identification of Cryptographically Strong and Weak Pseudorandom Bit Generators. [Citation Graph (, )][DBLP]


  14. Proxy Re-signature Schemes. [Citation Graph (, )][DBLP]


  15. Fast Signature Matching Using Extended Finite Automaton (XFA). [Citation Graph (, )][DBLP]


  16. Real-Time Alert Correlation with Type Graphs. [Citation Graph (, )][DBLP]


  17. Incorporation of Application Layer Protocol Syntax into Anomaly Detection. [Citation Graph (, )][DBLP]


  18. A Parallel Architecture for Stateful, High-Speed Intrusion Detection. [Citation Graph (, )][DBLP]


  19. Indexing Multimodal Biometric Databases Using Kd-Tree with Feature Level Fusion. [Citation Graph (, )][DBLP]


  20. Audio Watermarking Based on Quantization in Wavelet Domain. [Citation Graph (, )][DBLP]


  21. Overwriting Hard Drive Data: The Great Wiping Controversy. [Citation Graph (, )][DBLP]


  22. Optimizing the Block Cipher and Modes of Operations Overhead at the Link Layer Security Framework in the Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  23. Privacy Management for Facebook. [Citation Graph (, )][DBLP]


  24. HyDRo - Hybrid Development of Roles. [Citation Graph (, )][DBLP]


  25. The Enlightened Era of Enterprise Security (Invited Talk). [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002