|
Conferences in DBLP
FORSIGS: Forensic Signature Analysis of the Hard Drive for Multimedia File Fingerprints. [Citation Graph (, )][DBLP]
Digital Forensic Readiness as a Component of Information Security Best Practice. [Citation Graph (, )][DBLP]
Value creation and Return On Security Investments (ROSI). [Citation Graph (, )][DBLP]
Usability and Security of Personal Firewalls. [Citation Graph (, )][DBLP]
Trusted Ticket Systems and Applications. [Citation Graph (, )][DBLP]
Trust Evaluation for Web Applications based on Behavioral Analysis. [Citation Graph (, )][DBLP]
Improving the Information Security Model by using TFI. [Citation Graph (, )][DBLP]
Ontological Mapping of Common Criteria's Security Assurance Requirements. [Citation Graph (, )][DBLP]
Management of Exceptions on Access Control Policies. [Citation Graph (, )][DBLP]
Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols. [Citation Graph (, )][DBLP]
Exploratory survey on an Evaluation Model for a Sense of Security. [Citation Graph (, )][DBLP]
Employees' Adherence to Information Security Policies: An Empirical Study. [Citation Graph (, )][DBLP]
Phishing in the Wireless: Implementation and Analysis. [Citation Graph (, )][DBLP]
Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks. [Citation Graph (, )][DBLP]
A Credential-Based System for the Anonymous Delegation of Rights. [Citation Graph (, )][DBLP]
Development and Application of a Proxy Server for Transparently, Digitally Signing E-Learning Content. [Citation Graph (, )][DBLP]
Identity Theft - Empirical evidence from a Phishing Exercise. [Citation Graph (, )][DBLP]
A Practical Usability Evaluation of Security Features in End-User Applications. [Citation Graph (, )][DBLP]
Personal Anomaly-based Intrusion Detection Smart Card Using Behavioural Analysis. [Citation Graph (, )][DBLP]
A Survey of Bots Used for Distributed Denial of Service Attacks. [Citation Graph (, )][DBLP]
A Hybrid PKI-IBC Based Ephemerizer System. [Citation Graph (, )][DBLP]
Keystroke Analysis for Thumb-based Keyboards on Mobile Devices. [Citation Graph (, )][DBLP]
Security Remarks on a Convertible Nominative Signature Scheme. [Citation Graph (, )][DBLP]
Using Payment Gateways to Maintain Privacy in Secure Electronic Transactions. [Citation Graph (, )][DBLP]
A Role-Based Architecture for Seamless Identity Management and Effective Task Separation. [Citation Graph (, )][DBLP]
Extending Role Based Access Control Model for Distributed Multidomain Applications. [Citation Graph (, )][DBLP]
A Middleware Architecture for Integrating Privacy Preferences and Location Accuracy. [Citation Graph (, )][DBLP]
Enabling Privacy of Real-Life LBS. [Citation Graph (, )][DBLP]
Crafting Web Counters into Covert Channels. [Citation Graph (, )][DBLP]
OPA: Onion Policy Administration Model - Another approach to manage rights in DRM. [Citation Graph (, )][DBLP]
Non-Repudiation in Internet Telephony. [Citation Graph (, )][DBLP]
FirePatch: Secure and Time-Critical Dissemination of Software Patches. [Citation Graph (, )][DBLP]
An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing. [Citation Graph (, )][DBLP]
Building a Distributed Semantic-aware Security Architecture. [Citation Graph (, )][DBLP]
Using Trust to Resist Censorship in the Presence of Collusion. [Citation Graph (, )][DBLP]
Evaluating the Effects of Model Generalization on Intrusion Detection Performance. [Citation Graph (, )][DBLP]
Modernising MAC: New Forms for Mandatory Access Control in an Era of DRM. [Citation Graph (, )][DBLP]
Covert Identity Information in Direct Anonymous Attestation (DAA). [Citation Graph (, )][DBLP]
Safeguarding Personal Data using Rights Management in Distributed Applications. [Citation Graph (, )][DBLP]
Identification Now and in the Future: Social Grant Distribution Process in South Africa. [Citation Graph (, )][DBLP]
Hard-drive Disposal and Identity Fraud. [Citation Graph (, )][DBLP]
An analysis of security and privacy issues relating to RFID enabled ePassports. [Citation Graph (, )][DBLP]
Toward User Evaluation of IT Security Certification Schemes: A Preliminary Framework. [Citation Graph (, )][DBLP]
Teaching of Information Security in the "Health Care and Nursing" Postgraduate program. [Citation Graph (, )][DBLP]
Remote Virtual Information Assurance Network. [Citation Graph (, )][DBLP]
Certifying the Computer Security Professional Using the Project Management Institute's PMP Model. [Citation Graph (, )][DBLP]
|