The SCEAS System
Navigation Menu

Conferences in DBLP

Information Security (sec)
2007 (conf/sec/2007)


  1. FORSIGS: Forensic Signature Analysis of the Hard Drive for Multimedia File Fingerprints. [Citation Graph (, )][DBLP]


  2. Digital Forensic Readiness as a Component of Information Security Best Practice. [Citation Graph (, )][DBLP]


  3. Value creation and Return On Security Investments (ROSI). [Citation Graph (, )][DBLP]


  4. Usability and Security of Personal Firewalls. [Citation Graph (, )][DBLP]


  5. Trusted Ticket Systems and Applications. [Citation Graph (, )][DBLP]


  6. Trust Evaluation for Web Applications based on Behavioral Analysis. [Citation Graph (, )][DBLP]


  7. Improving the Information Security Model by using TFI. [Citation Graph (, )][DBLP]


  8. Ontological Mapping of Common Criteria's Security Assurance Requirements. [Citation Graph (, )][DBLP]


  9. Management of Exceptions on Access Control Policies. [Citation Graph (, )][DBLP]


  10. Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols. [Citation Graph (, )][DBLP]


  11. Exploratory survey on an Evaluation Model for a Sense of Security. [Citation Graph (, )][DBLP]


  12. Employees' Adherence to Information Security Policies: An Empirical Study. [Citation Graph (, )][DBLP]


  13. Phishing in the Wireless: Implementation and Analysis. [Citation Graph (, )][DBLP]


  14. Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks. [Citation Graph (, )][DBLP]


  15. A Credential-Based System for the Anonymous Delegation of Rights. [Citation Graph (, )][DBLP]


  16. Development and Application of a Proxy Server for Transparently, Digitally Signing E-Learning Content. [Citation Graph (, )][DBLP]


  17. Identity Theft - Empirical evidence from a Phishing Exercise. [Citation Graph (, )][DBLP]


  18. A Practical Usability Evaluation of Security Features in End-User Applications. [Citation Graph (, )][DBLP]


  19. Personal Anomaly-based Intrusion Detection Smart Card Using Behavioural Analysis. [Citation Graph (, )][DBLP]


  20. A Survey of Bots Used for Distributed Denial of Service Attacks. [Citation Graph (, )][DBLP]


  21. A Hybrid PKI-IBC Based Ephemerizer System. [Citation Graph (, )][DBLP]


  22. Keystroke Analysis for Thumb-based Keyboards on Mobile Devices. [Citation Graph (, )][DBLP]


  23. Security Remarks on a Convertible Nominative Signature Scheme. [Citation Graph (, )][DBLP]


  24. Using Payment Gateways to Maintain Privacy in Secure Electronic Transactions. [Citation Graph (, )][DBLP]


  25. A Role-Based Architecture for Seamless Identity Management and Effective Task Separation. [Citation Graph (, )][DBLP]


  26. Extending Role Based Access Control Model for Distributed Multidomain Applications. [Citation Graph (, )][DBLP]


  27. A Middleware Architecture for Integrating Privacy Preferences and Location Accuracy. [Citation Graph (, )][DBLP]


  28. Enabling Privacy of Real-Life LBS. [Citation Graph (, )][DBLP]


  29. Crafting Web Counters into Covert Channels. [Citation Graph (, )][DBLP]


  30. OPA: Onion Policy Administration Model - Another approach to manage rights in DRM. [Citation Graph (, )][DBLP]


  31. Non-Repudiation in Internet Telephony. [Citation Graph (, )][DBLP]


  32. FirePatch: Secure and Time-Critical Dissemination of Software Patches. [Citation Graph (, )][DBLP]


  33. An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing. [Citation Graph (, )][DBLP]


  34. Building a Distributed Semantic-aware Security Architecture. [Citation Graph (, )][DBLP]


  35. Using Trust to Resist Censorship in the Presence of Collusion. [Citation Graph (, )][DBLP]


  36. Evaluating the Effects of Model Generalization on Intrusion Detection Performance. [Citation Graph (, )][DBLP]


  37. Modernising MAC: New Forms for Mandatory Access Control in an Era of DRM. [Citation Graph (, )][DBLP]


  38. Covert Identity Information in Direct Anonymous Attestation (DAA). [Citation Graph (, )][DBLP]


  39. Safeguarding Personal Data using Rights Management in Distributed Applications. [Citation Graph (, )][DBLP]


  40. Identification Now and in the Future: Social Grant Distribution Process in South Africa. [Citation Graph (, )][DBLP]


  41. Hard-drive Disposal and Identity Fraud. [Citation Graph (, )][DBLP]


  42. An analysis of security and privacy issues relating to RFID enabled ePassports. [Citation Graph (, )][DBLP]


  43. Toward User Evaluation of IT Security Certification Schemes: A Preliminary Framework. [Citation Graph (, )][DBLP]


  44. Teaching of Information Security in the "Health Care and Nursing" Postgraduate program. [Citation Graph (, )][DBLP]


  45. Remote Virtual Information Assurance Network. [Citation Graph (, )][DBLP]


  46. Certifying the Computer Security Professional Using the Project Management Institute's PMP Model. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002