Conferences in DBLP
Mark Bregman Keynote speech. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:1- [Conf ] Sushil Jajodia Topological analysis of network attack vulnerability. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:2- [Conf ] Virgil D. Gligor On the evolution of adversary models in security protocols: from the beginning to sensor networks. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:3- [Conf ] Qinghua Zhang , Douglas S. Reeves , Peng Ning , S. Purushothaman Iyer Analyzing network traffic to detect self-decrypting exploit code. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:4-12 [Conf ] Yang Li , Binxing Fang , Li Guo , You Chen Network anomaly detection based on TCM-KNN algorithm. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:13-19 [Conf ] Heejo Lee , Minjin Kwon , Geoffrey Hasker , Adrian Perrig BASE: an incrementally deployable mechanism for viable IP spoofing prevention. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:20-31 [Conf ] Guanhua Yan , Hector D. Flores , Leticia Cuellar , Nicolas Hengartner , Stephan Eidenbenz , Vincent Vu Bluetooth worm propagation: mobility pattern matters! [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:32-44 [Conf ] Pan Wang , Peng Ning , Douglas S. Reeves A k -anonymous communication protocol for overlay networks. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:45-56 [Conf ] Przemyslaw Kubiak , Miroslaw Kutylowski , Filip Zagórski Kleptographic attacks on a cascade of mix servers. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:57-62 [Conf ] Yu Yu , Jussipekka Leiwo , Benjamin Premkumar Private stateful circuits secure against probing attacks. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:63-69 [Conf ] David A. Basin , Ernst-Rüdiger Olderog , Paul E. Sevinç Specifying and analyzing security automata using CSP-OZ. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:70-81 [Conf ] Mikhail J. Atallah , Marina Blanton , Keith B. Frikken Efficient techniques for realizing geo-spatial access control. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:82-92 [Conf ] Meenakshi Balasubramanian , Abhishek Bhatnagar , Namit Chaturvedi , Atish Datta Chowdhury , Arul Ganesh A framework for decentralized access control. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:93-104 [Conf ] Padmapriya Ayyagari , Prasenjit Mitra , Dongwon Lee , Peng Liu , Wang-Chien Lee Incremental adaptation of XPath access control views. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:105-116 [Conf ] Xinwen Zhang , Michael J. Covington , Songqing Chen , Ravi S. Sandhu SecureBus: towards application-transparent trusted computing with mandatory access control. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:117-126 [Conf ] Ninghui Li , Ziqing Mao Administration in role-based access control. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:127-138 [Conf ] Chaoyi Pang , David P. Hansen , Anthony J. Maeder Managing RBAC states with transitive relations. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:139-148 [Conf ] Sabrina De Capitani di Vimercati , Sushil Jajodia , Stefano Paraboschi , Pierangela Samarati Trust management services in relational databases. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:149-160 [Conf ] Siamak Fayyaz Shahandashti , Reihaneh Safavi-Naini , Joonsang Baek Concurrently-secure credential ownership proofs. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:161-172 [Conf ] Reihaneh Safavi-Naini , Shuhong Wang , Yvo Desmedt Unconditionally secure ring authentication. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:173-181 [Conf ] Dongvu Tonien , Reihaneh Safavi-Naini , Peter R. Wild Combinatorial characterizations of authentication codes in verification oracle model. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:183-193 [Conf ] Anh-Quynh Nguyen , Yoshiyasu Takefuji A novel approach for a file-system integrity monitor tool of Xen virtual machine. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:194-202 [Conf ] Jason Reid , Juan Manuel González Nieto , Tee Tang , Bouchra Senadji Detecting relay attacks with timing-based protocols. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:204-213 [Conf ] Qihua Wang , Ninghui Li Direct static enforcement of high-level security policies. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:214-225 [Conf ] Matthias Schwan An extended model of security policy for multi-applicative smart cards. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:226-233 [Conf ] Yingjiu Li , Xuhua Ding Protecting RFID communications in supply chains. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:234-241 [Conf ] Tri Van Le , Mike Burmester , Breno de Medeiros Universally composable and forward-secure RFID authentication and authenticated key exchange. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:242-252 [Conf ] Jianjun Shen , Sihan Qing A dynamic information flow model of secure systems. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:341-343 [Conf ] Hioki Hirohisa Crocus: a steganographic filesystem manager. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:344-346 [Conf ] David Arditti , Côme Berbain , Olivier Billet , Henri Gilbert Compact FPGA implementations of QUAD. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:347-349 [Conf ] Debra L. Cook , Angelos D. Keromytis , Moti Yung Elastic block ciphers: the basic design. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:350-352 [Conf ] Ileana Buhan , Jeroen Doumen , Pieter H. Hartel , Raymond N. J. Veldhuis Fuzzy extractors for continuous distributions. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:353-355 [Conf ] Victor K. Wei Invisible designated confirmer signatures without random oracles. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:356-358 [Conf ] Cheng-Huang Jiang , Shiuhpyng Shieh , Jen-Chien Liu Keystroke statistical learning model for web authentication. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:359-361 [Conf ] Lawrence Teo , Gail-Joon Ahn Managing heterogeneous network environments using an extensible policy framework. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:362-364 [Conf ] Xiaoxin Wu , David K. Y. Yau Mitigating denial-of-service attacks in MANET by distributed packet filtering: a game-theoretic approach. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:365-367 [Conf ] Joonsang Baek , Willy Susilo , Jianying Zhou New constructions of fuzzy identity-based encryption. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:368-370 [Conf ] Vrizlynn L. L. Thing , Morris Sloman , Naranker Dulay Non-intrusive IP traceback for DDoS attacks. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:371-373 [Conf ] Kazuki Yoneyama , Kazuo Ohta Ring signatures: universally composable definitions and constructions. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:374-376 [Conf ] Tae-Kyou Park , Ilkyeun Ra SPECS: smart partial enciphering service for accessing encrypted files with efficient and transparent. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:377-379 [Conf ] Johann Großschädl , Alexander Szekely , Stefan Tillich The energy cost of cryptographic key establishment in wireless sensor networks. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:380-382 [Conf ] M. A. C. Dekker , J. G. Cederquist , Jason Crampton , Sandro Etalle Extended privilege inheritance in RBAC. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:383-385 [Conf ] Patrick Röder , Omid Tafreschi , Claudia Eckert History-based access control for XML documents. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:386-388 [Conf ] Vishwas Patil , Alessandro Mei , Luigi V. Mancini Addressing interoperability issues in access control models. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:389-391 [Conf ] Lynette Qu Nguyen , Tufan Demir , Jeff Rowe , Francis Hsu , Karl N. Levitt A framework for diversifying windows native APIs to tolerate code injection attacks. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:392-394 [Conf ] Chinyang Henry Tseng , Shiau-Huey Wang , Karl N. Levitt DRETA: distributed routing evidence tracing and authentication intrusion detection model for MANET. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:395-397 [Conf ] Jeongseok Seo , Sung Deok Cha Masquerade detection based on SVM and sequence-based user commands profile. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:398-400 [Conf ]