The SCEAS System
Navigation Menu

Conferences in DBLP

(secrypt)
2008 (conf/secrypt/2008)


  1. Detection of Illicit Traffic using Neural Networks. [Citation Graph (, )][DBLP]


  2. e-Business Innovation - Surviving the Coming Decades. [Citation Graph (, )][DBLP]


  3. Novel and Anomalous Behavior Detection using Bayesian Network Classifiers. [Citation Graph (, )][DBLP]


  4. Improving Reliability in Commercial IP Networks. [Citation Graph (, )][DBLP]


  5. Cryptographic Algorithms - Successes, Failures and Challenges. [Citation Graph (, )][DBLP]


  6. New Schemes for Anomaly Score Aggregation and Thresholding. [Citation Graph (, )][DBLP]


  7. Watermarking, Steganography and Content Forensics. [Citation Graph (, )][DBLP]


  8. Application to a Shared Terminal of a Roaming User Profile Set Up through LDAP-Smart Card Authentication Cooperation. [Citation Graph (, )][DBLP]


  9. Rethinking Digital Signatures. [Citation Graph (, )][DBLP]


  10. The Importance of Metrology in Wireless Communication Systems - From AM/FM to SDR Systems. [Citation Graph (, )][DBLP]


  11. Improved Fuzzy Vault Scheme for Fingerprint Verification. [Citation Graph (, )][DBLP]


  12. Next Generation CDMA Technologies for Futuristic Wireless Communications. [Citation Graph (, )][DBLP]


  13. Ensuring Privacy of Biometric Factors in Multi-Factor Authentication Systems. [Citation Graph (, )][DBLP]


  14. Alert Correlation based on a Logical Handling of Administrator Preferences and Knowledge. [Citation Graph (, )][DBLP]


  15. Interactivity for Reactive Access Control. [Citation Graph (, )][DBLP]


  16. Honeyd Detection Via Abnormal Behaviors Generated by the ARPD Daemon. [Citation Graph (, )][DBLP]


  17. Functionality-based Application Confinement - Parameterised Hierarchical Application Restrictions. [Citation Graph (, )][DBLP]


  18. Security Policy Instantiation to React to Network Attacks - An Ontology-based Approach using OWL and SWRL. [Citation Graph (, )][DBLP]


  19. Cryptonet: Secure E-Mail System. [Citation Graph (, )][DBLP]


  20. An Improvement of Strong Proxy Signature and Its Applications. [Citation Graph (, )][DBLP]


  21. A Note on Biometrics-based Authentication with Portable Device. [Citation Graph (, )][DBLP]


  22. A Polynomial based Hashing Algorithm. [Citation Graph (, )][DBLP]


  23. Intrusion Detection and Prevention System using Secure Mobile Agents. [Citation Graph (, )][DBLP]


  24. A Fast Encryption Scheme for Networks Applications. [Citation Graph (, )][DBLP]


  25. Quantifying Misbehaviour Attacks Against the Self-Organized Public Key Management on Manets. [Citation Graph (, )][DBLP]


  26. Multiphase Deployment Models for Fast Self Healing in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  27. Novel Neurocomputing-based Scheme to Authenticate WLAN Users Employing Distance Proximity Threshold. [Citation Graph (, )][DBLP]


  28. SAKE - Secure Authenticated Key Establishment in Sensor Networks. [Citation Graph (, )][DBLP]


  29. Kerberos Implementation in Manets. [Citation Graph (, )][DBLP]


  30. SCFS: Towards Design and Implementation of a Secure Distributed Filesystem. [Citation Graph (, )][DBLP]


  31. Key Management of Quantum Generated Keys in IPsec. [Citation Graph (, )][DBLP]


  32. Ensuring the Correctness of Cryptographic Protocols with Respect to Secrecy. [Citation Graph (, )][DBLP]


  33. Efficient Localization Schemes in Sensor Networks with Malicious Nodes. [Citation Graph (, )][DBLP]


  34. New Techniques to Enhance the Capabilities of the Socks Network Security Protocol. [Citation Graph (, )][DBLP]


  35. An Efficient Methodology to Limit Path Length Guaranteeing Anonymity in Overlay Networks. [Citation Graph (, )][DBLP]


  36. Price to Provide RFID Security and Privacy?. [Citation Graph (, )][DBLP]


  37. An e-Voting Protocol based on Pairing Blind Signatures. [Citation Graph (, )][DBLP]


  38. Yet Another Secure Distance-Bounding Protocol. [Citation Graph (, )][DBLP]


  39. Sec-SNMP: Policy-based Security Management for Sensor Networks. [Citation Graph (, )][DBLP]


  40. Applying SRP on SIP Authentication. [Citation Graph (, )][DBLP]


  41. A Multiple Birthday Attack on NTRU. [Citation Graph (, )][DBLP]


  42. Forward-Secure Proxy Signature and Revocation Scheme for a Proxy Signer with Multiple Original Signers. [Citation Graph (, )][DBLP]


  43. On the (In)Security of Two Buyer-Seller Watermarking Protocols. [Citation Graph (, )][DBLP]


  44. Key Distribution based on Quantum Fourier Transform. [Citation Graph (, )][DBLP]


  45. FPGA-Targeted Hardware Implementations of K2. [Citation Graph (, )][DBLP]


  46. Multi-Collisions Attack in Ring Hash Structure. [Citation Graph (, )][DBLP]


  47. Efficient IBE-PKE Proxy Re-Encryption. [Citation Graph (, )][DBLP]


  48. A Fair e-Tendering Protocol. [Citation Graph (, )][DBLP]


  49. A General Framework for Guess-and-Determine and Time-Memory-Data Trade-Off Attacks on Stream Ciphers. [Citation Graph (, )][DBLP]


  50. Secure Communication in Mobile Ad Hoc Network using Efficient Certificateless Encryption. [Citation Graph (, )][DBLP]


  51. REBEL - Reconfigurable Block Encryption Logic. [Citation Graph (, )][DBLP]


  52. An Efficient Multiplication Algorithm using Binomial Residue Representation. [Citation Graph (, )][DBLP]


  53. A New Probabilistic Rekeying Method for Secure Dynamic Groups. [Citation Graph (, )][DBLP]


  54. Traitor Tracing for Anonymous Attack in Content Protection. [Citation Graph (, )][DBLP]


  55. Experimental Research and Capability Valuation on Security of SOA-SCA based SDO. [Citation Graph (, )][DBLP]


  56. Identity-based Signcryption without Random Oracles. [Citation Graph (, )][DBLP]


  57. Anonymous Message Authentication - Universally Composable Definition and Construction. [Citation Graph (, )][DBLP]


  58. An Efficient Reconfigurable SOS Montgomery Multiplier in GF (P) usign FPGA DSP Slices. [Citation Graph (, )][DBLP]


  59. A Short Note on Secret Sharing using Elliptic Curves. [Citation Graph (, )][DBLP]


  60. Low Area Scalable Montgomery Inversion Over GF(2m). [Citation Graph (, )][DBLP]


  61. Proper Key Generation for the IzoSign Algorithm. [Citation Graph (, )][DBLP]


  62. Point Multiplication on Supersingular Elliptic Curves Defined over Fields of Characteristic 2 and 3. [Citation Graph (, )][DBLP]


  63. Geographic Data and Steganography - Using Google Earth and KML Files for High-Capacity Steganography. [Citation Graph (, )][DBLP]


  64. Practical Application of a Security Management Maturity Model for SMEs based on Predefined Schemas. [Citation Graph (, )][DBLP]


  65. CSteg: Talking in C Code - Steganography of C Source Code in Text. [Citation Graph (, )][DBLP]


  66. An Event-Driven, Inclusionary and Secure Approach to Kernel Integrity. [Citation Graph (, )][DBLP]


  67. The Substitution Cipher Chaining Mode. [Citation Graph (, )][DBLP]


  68. A Heuristic Polynomial Algorithm for Local Inconsistency Diagnosis in Firewall Rule Sets. [Citation Graph (, )][DBLP]


  69. Security Requirements in Software Product Lines. [Citation Graph (, )][DBLP]


  70. A 640 Mbit/S 32-Bit Pipelined Implementation of the AES Algorithm. [Citation Graph (, )][DBLP]


  71. Towards Language-Independent Approach for Security Concerns Weaving. [Citation Graph (, )][DBLP]


  72. Securing the Email Services - New System for Secure Managing the Organization's Mail Service. [Citation Graph (, )][DBLP]


  73. Metrics Application in Metropolitan Broadband Access Network Security Analysis. [Citation Graph (, )][DBLP]


  74. Security and Authentication for Networked Storage. [Citation Graph (, )][DBLP]


  75. A Review of Trust Management, Security and Privacy Policy Languages. [Citation Graph (, )][DBLP]


  76. Autonomic Trust Management for a Pervasive System. [Citation Graph (, )][DBLP]


  77. Selecting Trustworthy Content using Tags. [Citation Graph (, )][DBLP]


  78. Dynamics of Trust Evolution - Auto-configuration of Dispositional Trust Dynamics. [Citation Graph (, )][DBLP]


  79. Trust Model for High Quality Recommendation. [Citation Graph (, )][DBLP]


  80. Enhanced Secure Interface for a Portable e-Voting Terminal. [Citation Graph (, )][DBLP]


  81. Reputation Management in Grid-based Virtual Organisations. [Citation Graph (, )][DBLP]


  82. Formalizing End-to-End Context-Aware Trust Relationships in Collaborative Activities. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002