|
Conferences in DBLP
(secrypt) 2008 (conf/secrypt/2008)
Detection of Illicit Traffic using Neural Networks. [Citation Graph (, )][DBLP]
e-Business Innovation - Surviving the Coming Decades. [Citation Graph (, )][DBLP]
Novel and Anomalous Behavior Detection using Bayesian Network Classifiers. [Citation Graph (, )][DBLP]
Improving Reliability in Commercial IP Networks. [Citation Graph (, )][DBLP]
Cryptographic Algorithms - Successes, Failures and Challenges. [Citation Graph (, )][DBLP]
New Schemes for Anomaly Score Aggregation and Thresholding. [Citation Graph (, )][DBLP]
Watermarking, Steganography and Content Forensics. [Citation Graph (, )][DBLP]
Application to a Shared Terminal of a Roaming User Profile Set Up through LDAP-Smart Card Authentication Cooperation. [Citation Graph (, )][DBLP]
Rethinking Digital Signatures. [Citation Graph (, )][DBLP]
The Importance of Metrology in Wireless Communication Systems - From AM/FM to SDR Systems. [Citation Graph (, )][DBLP]
Improved Fuzzy Vault Scheme for Fingerprint Verification. [Citation Graph (, )][DBLP]
Next Generation CDMA Technologies for Futuristic Wireless Communications. [Citation Graph (, )][DBLP]
Ensuring Privacy of Biometric Factors in Multi-Factor Authentication Systems. [Citation Graph (, )][DBLP]
Alert Correlation based on a Logical Handling of Administrator Preferences and Knowledge. [Citation Graph (, )][DBLP]
Interactivity for Reactive Access Control. [Citation Graph (, )][DBLP]
Honeyd Detection Via Abnormal Behaviors Generated by the ARPD Daemon. [Citation Graph (, )][DBLP]
Functionality-based Application Confinement - Parameterised Hierarchical Application Restrictions. [Citation Graph (, )][DBLP]
Security Policy Instantiation to React to Network Attacks - An Ontology-based Approach using OWL and SWRL. [Citation Graph (, )][DBLP]
Cryptonet: Secure E-Mail System. [Citation Graph (, )][DBLP]
An Improvement of Strong Proxy Signature and Its Applications. [Citation Graph (, )][DBLP]
A Note on Biometrics-based Authentication with Portable Device. [Citation Graph (, )][DBLP]
A Polynomial based Hashing Algorithm. [Citation Graph (, )][DBLP]
Intrusion Detection and Prevention System using Secure Mobile Agents. [Citation Graph (, )][DBLP]
A Fast Encryption Scheme for Networks Applications. [Citation Graph (, )][DBLP]
Quantifying Misbehaviour Attacks Against the Self-Organized Public Key Management on Manets. [Citation Graph (, )][DBLP]
Multiphase Deployment Models for Fast Self Healing in Wireless Sensor Networks. [Citation Graph (, )][DBLP]
Novel Neurocomputing-based Scheme to Authenticate WLAN Users Employing Distance Proximity Threshold. [Citation Graph (, )][DBLP]
SAKE - Secure Authenticated Key Establishment in Sensor Networks. [Citation Graph (, )][DBLP]
Kerberos Implementation in Manets. [Citation Graph (, )][DBLP]
SCFS: Towards Design and Implementation of a Secure Distributed Filesystem. [Citation Graph (, )][DBLP]
Key Management of Quantum Generated Keys in IPsec. [Citation Graph (, )][DBLP]
Ensuring the Correctness of Cryptographic Protocols with Respect to Secrecy. [Citation Graph (, )][DBLP]
Efficient Localization Schemes in Sensor Networks with Malicious Nodes. [Citation Graph (, )][DBLP]
New Techniques to Enhance the Capabilities of the Socks Network Security Protocol. [Citation Graph (, )][DBLP]
An Efficient Methodology to Limit Path Length Guaranteeing Anonymity in Overlay Networks. [Citation Graph (, )][DBLP]
Price to Provide RFID Security and Privacy?. [Citation Graph (, )][DBLP]
An e-Voting Protocol based on Pairing Blind Signatures. [Citation Graph (, )][DBLP]
Yet Another Secure Distance-Bounding Protocol. [Citation Graph (, )][DBLP]
Sec-SNMP: Policy-based Security Management for Sensor Networks. [Citation Graph (, )][DBLP]
Applying SRP on SIP Authentication. [Citation Graph (, )][DBLP]
A Multiple Birthday Attack on NTRU. [Citation Graph (, )][DBLP]
Forward-Secure Proxy Signature and Revocation Scheme for a Proxy Signer with Multiple Original Signers. [Citation Graph (, )][DBLP]
On the (In)Security of Two Buyer-Seller Watermarking Protocols. [Citation Graph (, )][DBLP]
Key Distribution based on Quantum Fourier Transform. [Citation Graph (, )][DBLP]
FPGA-Targeted Hardware Implementations of K2. [Citation Graph (, )][DBLP]
Multi-Collisions Attack in Ring Hash Structure. [Citation Graph (, )][DBLP]
Efficient IBE-PKE Proxy Re-Encryption. [Citation Graph (, )][DBLP]
A Fair e-Tendering Protocol. [Citation Graph (, )][DBLP]
A General Framework for Guess-and-Determine and Time-Memory-Data Trade-Off Attacks on Stream Ciphers. [Citation Graph (, )][DBLP]
Secure Communication in Mobile Ad Hoc Network using Efficient Certificateless Encryption. [Citation Graph (, )][DBLP]
REBEL - Reconfigurable Block Encryption Logic. [Citation Graph (, )][DBLP]
An Efficient Multiplication Algorithm using Binomial Residue Representation. [Citation Graph (, )][DBLP]
A New Probabilistic Rekeying Method for Secure Dynamic Groups. [Citation Graph (, )][DBLP]
Traitor Tracing for Anonymous Attack in Content Protection. [Citation Graph (, )][DBLP]
Experimental Research and Capability Valuation on Security of SOA-SCA based SDO. [Citation Graph (, )][DBLP]
Identity-based Signcryption without Random Oracles. [Citation Graph (, )][DBLP]
Anonymous Message Authentication - Universally Composable Definition and Construction. [Citation Graph (, )][DBLP]
An Efficient Reconfigurable SOS Montgomery Multiplier in GF (P) usign FPGA DSP Slices. [Citation Graph (, )][DBLP]
A Short Note on Secret Sharing using Elliptic Curves. [Citation Graph (, )][DBLP]
Low Area Scalable Montgomery Inversion Over GF(2m). [Citation Graph (, )][DBLP]
Proper Key Generation for the IzoSign Algorithm. [Citation Graph (, )][DBLP]
Point Multiplication on Supersingular Elliptic Curves Defined over Fields of Characteristic 2 and 3. [Citation Graph (, )][DBLP]
Geographic Data and Steganography - Using Google Earth and KML Files for High-Capacity Steganography. [Citation Graph (, )][DBLP]
Practical Application of a Security Management Maturity Model for SMEs based on Predefined Schemas. [Citation Graph (, )][DBLP]
CSteg: Talking in C Code - Steganography of C Source Code in Text. [Citation Graph (, )][DBLP]
An Event-Driven, Inclusionary and Secure Approach to Kernel Integrity. [Citation Graph (, )][DBLP]
The Substitution Cipher Chaining Mode. [Citation Graph (, )][DBLP]
A Heuristic Polynomial Algorithm for Local Inconsistency Diagnosis in Firewall Rule Sets. [Citation Graph (, )][DBLP]
Security Requirements in Software Product Lines. [Citation Graph (, )][DBLP]
A 640 Mbit/S 32-Bit Pipelined Implementation of the AES Algorithm. [Citation Graph (, )][DBLP]
Towards Language-Independent Approach for Security Concerns Weaving. [Citation Graph (, )][DBLP]
Securing the Email Services - New System for Secure Managing the Organization's Mail Service. [Citation Graph (, )][DBLP]
Metrics Application in Metropolitan Broadband Access Network Security Analysis. [Citation Graph (, )][DBLP]
Security and Authentication for Networked Storage. [Citation Graph (, )][DBLP]
A Review of Trust Management, Security and Privacy Policy Languages. [Citation Graph (, )][DBLP]
Autonomic Trust Management for a Pervasive System. [Citation Graph (, )][DBLP]
Selecting Trustworthy Content using Tags. [Citation Graph (, )][DBLP]
Dynamics of Trust Evolution - Auto-configuration of Dispositional Trust Dynamics. [Citation Graph (, )][DBLP]
Trust Model for High Quality Recommendation. [Citation Graph (, )][DBLP]
Enhanced Secure Interface for a Portable e-Voting Terminal. [Citation Graph (, )][DBLP]
Reputation Management in Grid-based Virtual Organisations. [Citation Graph (, )][DBLP]
Formalizing End-to-End Context-Aware Trust Relationships in Collaborative Activities. [Citation Graph (, )][DBLP]
|