The SCEAS System
Navigation Menu

Conferences in DBLP

Conference on Computer and Communications Security (CCS) (ccs)
2007 (conf/ccs/2007asia)

  1. Mark Bregman
    Keynote speech. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:1- [Conf]
  2. Sushil Jajodia
    Topological analysis of network attack vulnerability. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:2- [Conf]
  3. Virgil D. Gligor
    On the evolution of adversary models in security protocols: from the beginning to sensor networks. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:3- [Conf]
  4. Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Purushothaman Iyer
    Analyzing network traffic to detect self-decrypting exploit code. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:4-12 [Conf]
  5. Yang Li, Binxing Fang, Li Guo, You Chen
    Network anomaly detection based on TCM-KNN algorithm. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:13-19 [Conf]
  6. Heejo Lee, Minjin Kwon, Geoffrey Hasker, Adrian Perrig
    BASE: an incrementally deployable mechanism for viable IP spoofing prevention. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:20-31 [Conf]
  7. Guanhua Yan, Hector D. Flores, Leticia Cuellar, Nicolas Hengartner, Stephan Eidenbenz, Vincent Vu
    Bluetooth worm propagation: mobility pattern matters! [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:32-44 [Conf]
  8. Pan Wang, Peng Ning, Douglas S. Reeves
    A k-anonymous communication protocol for overlay networks. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:45-56 [Conf]
  9. Przemyslaw Kubiak, Miroslaw Kutylowski, Filip Zagórski
    Kleptographic attacks on a cascade of mix servers. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:57-62 [Conf]
  10. Yu Yu, Jussipekka Leiwo, Benjamin Premkumar
    Private stateful circuits secure against probing attacks. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:63-69 [Conf]
  11. David A. Basin, Ernst-Rüdiger Olderog, Paul E. Sevinç
    Specifying and analyzing security automata using CSP-OZ. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:70-81 [Conf]
  12. Mikhail J. Atallah, Marina Blanton, Keith B. Frikken
    Efficient techniques for realizing geo-spatial access control. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:82-92 [Conf]
  13. Meenakshi Balasubramanian, Abhishek Bhatnagar, Namit Chaturvedi, Atish Datta Chowdhury, Arul Ganesh
    A framework for decentralized access control. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:93-104 [Conf]
  14. Padmapriya Ayyagari, Prasenjit Mitra, Dongwon Lee, Peng Liu, Wang-Chien Lee
    Incremental adaptation of XPath access control views. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:105-116 [Conf]
  15. Xinwen Zhang, Michael J. Covington, Songqing Chen, Ravi S. Sandhu
    SecureBus: towards application-transparent trusted computing with mandatory access control. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:117-126 [Conf]
  16. Ninghui Li, Ziqing Mao
    Administration in role-based access control. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:127-138 [Conf]
  17. Chaoyi Pang, David P. Hansen, Anthony J. Maeder
    Managing RBAC states with transitive relations. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:139-148 [Conf]
  18. Sabrina De Capitani di Vimercati, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
    Trust management services in relational databases. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:149-160 [Conf]
  19. Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini, Joonsang Baek
    Concurrently-secure credential ownership proofs. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:161-172 [Conf]
  20. Reihaneh Safavi-Naini, Shuhong Wang, Yvo Desmedt
    Unconditionally secure ring authentication. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:173-181 [Conf]
  21. Dongvu Tonien, Reihaneh Safavi-Naini, Peter R. Wild
    Combinatorial characterizations of authentication codes in verification oracle model. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:183-193 [Conf]
  22. Anh-Quynh Nguyen, Yoshiyasu Takefuji
    A novel approach for a file-system integrity monitor tool of Xen virtual machine. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:194-202 [Conf]
  23. Jason Reid, Juan Manuel González Nieto, Tee Tang, Bouchra Senadji
    Detecting relay attacks with timing-based protocols. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:204-213 [Conf]
  24. Qihua Wang, Ninghui Li
    Direct static enforcement of high-level security policies. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:214-225 [Conf]
  25. Matthias Schwan
    An extended model of security policy for multi-applicative smart cards. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:226-233 [Conf]
  26. Yingjiu Li, Xuhua Ding
    Protecting RFID communications in supply chains. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:234-241 [Conf]
  27. Tri Van Le, Mike Burmester, Breno de Medeiros
    Universally composable and forward-secure RFID authentication and authenticated key exchange. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:242-252 [Conf]
  28. Jianjun Shen, Sihan Qing
    A dynamic information flow model of secure systems. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:341-343 [Conf]
  29. Hioki Hirohisa
    Crocus: a steganographic filesystem manager. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:344-346 [Conf]
  30. David Arditti, Côme Berbain, Olivier Billet, Henri Gilbert
    Compact FPGA implementations of QUAD. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:347-349 [Conf]
  31. Debra L. Cook, Angelos D. Keromytis, Moti Yung
    Elastic block ciphers: the basic design. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:350-352 [Conf]
  32. Ileana Buhan, Jeroen Doumen, Pieter H. Hartel, Raymond N. J. Veldhuis
    Fuzzy extractors for continuous distributions. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:353-355 [Conf]
  33. Victor K. Wei
    Invisible designated confirmer signatures without random oracles. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:356-358 [Conf]
  34. Cheng-Huang Jiang, Shiuhpyng Shieh, Jen-Chien Liu
    Keystroke statistical learning model for web authentication. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:359-361 [Conf]
  35. Lawrence Teo, Gail-Joon Ahn
    Managing heterogeneous network environments using an extensible policy framework. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:362-364 [Conf]
  36. Xiaoxin Wu, David K. Y. Yau
    Mitigating denial-of-service attacks in MANET by distributed packet filtering: a game-theoretic approach. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:365-367 [Conf]
  37. Joonsang Baek, Willy Susilo, Jianying Zhou
    New constructions of fuzzy identity-based encryption. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:368-370 [Conf]
  38. Vrizlynn L. L. Thing, Morris Sloman, Naranker Dulay
    Non-intrusive IP traceback for DDoS attacks. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:371-373 [Conf]
  39. Kazuki Yoneyama, Kazuo Ohta
    Ring signatures: universally composable definitions and constructions. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:374-376 [Conf]
  40. Tae-Kyou Park, Ilkyeun Ra
    SPECS: smart partial enciphering service for accessing encrypted files with efficient and transparent. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:377-379 [Conf]
  41. Johann Großschädl, Alexander Szekely, Stefan Tillich
    The energy cost of cryptographic key establishment in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:380-382 [Conf]
  42. M. A. C. Dekker, J. G. Cederquist, Jason Crampton, Sandro Etalle
    Extended privilege inheritance in RBAC. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:383-385 [Conf]
  43. Patrick Röder, Omid Tafreschi, Claudia Eckert
    History-based access control for XML documents. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:386-388 [Conf]
  44. Vishwas Patil, Alessandro Mei, Luigi V. Mancini
    Addressing interoperability issues in access control models. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:389-391 [Conf]
  45. Lynette Qu Nguyen, Tufan Demir, Jeff Rowe, Francis Hsu, Karl N. Levitt
    A framework for diversifying windows native APIs to tolerate code injection attacks. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:392-394 [Conf]
  46. Chinyang Henry Tseng, Shiau-Huey Wang, Karl N. Levitt
    DRETA: distributed routing evidence tracing and authentication intrusion detection model for MANET. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:395-397 [Conf]
  47. Jeongseok Seo, Sung Deok Cha
    Masquerade detection based on SVM and sequence-based user commands profile. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:398-400 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002