The SCEAS System
Navigation Menu

Conferences in DBLP

(IEEEias)
2007 (conf/IEEEias/2007)


  1. Secure M-commerce Transactions: A Third Party Based Signature Protocol. [Citation Graph (, )][DBLP]


  2. Secure E-Commerce Protocol for Purchase of e-Goods - Using Smart Card. [Citation Graph (, )][DBLP]


  3. Certified Email Delivery with Offline TTP. [Citation Graph (, )][DBLP]


  4. An Effective and Secure Buyer-Seller Watermarking Protocol. [Citation Graph (, )][DBLP]


  5. Towards an Autonomic Security System for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  6. A Secure Authenticated Key Agreement Protocol For Wireless Security. [Citation Graph (, )][DBLP]


  7. Hierarchical Multi-Party Key Agreement for Wireless Networks. [Citation Graph (, )][DBLP]


  8. Applying Secure Data Aggregation techniques for a Structure and Density Independent Group Based Key Management Protocol. [Citation Graph (, )][DBLP]


  9. A Performance Comparison of Wireless Ad Hoc Network Routing Protocols under Security Attack. [Citation Graph (, )][DBLP]


  10. On Detecting Packets Droppers in MANET: A Novel Low Cost Approach. [Citation Graph (, )][DBLP]


  11. Threshold SKI Protocol for ID-based Cryptosystems. [Citation Graph (, )][DBLP]


  12. Fuzzy Key Extraction from Fingerprint Biometrics based on Dynamic Quantization Mechanism. [Citation Graph (, )][DBLP]


  13. Low-cost Anonymous Timed-Release Encryption. [Citation Graph (, )][DBLP]


  14. Integrating Multi-Modal Circuit Features within an Efficient Encryption System. [Citation Graph (, )][DBLP]


  15. A Secure Authenticated Key Agreement Protocol Based on Elliptic Curve Cryptography. [Citation Graph (, )][DBLP]


  16. Inclusion of a Montgomery Multiplier Unit into an Embedded Processor’s Datapath to Speed-up Elliptic Curve Cryptography. [Citation Graph (, )][DBLP]


  17. An LSB Data Hiding Technique Using Prime Numbers. [Citation Graph (, )][DBLP]


  18. Binding Update Authentication Scheme for Mobile IPv6. [Citation Graph (, )][DBLP]


  19. An Authentication Scheme Using Non-Commutative Semigroups. [Citation Graph (, )][DBLP]


  20. Function-Based Authorization Constraints Specification and Enforcement. [Citation Graph (, )][DBLP]


  21. Separation of Duty in Role-Based Access Control Model through Fuzzy Relations. [Citation Graph (, )][DBLP]


  22. Enhancing Role-Based Access Control Model through Fuzzy Relations. [Citation Graph (, )][DBLP]


  23. A Theoretical Security Model for Access Control and Security Assurance. [Citation Graph (, )][DBLP]


  24. A Purpose-Based Access Control Model. [Citation Graph (, )][DBLP]


  25. SARBAC07: A Scoped Administration Model for RBAC with Hybrid Hierarchy. [Citation Graph (, )][DBLP]


  26. Levels of Authentication Assurance: an Investigation. [Citation Graph (, )][DBLP]


  27. Vulnerability Assessment by Learning Attack Specifications in Graphs. [Citation Graph (, )][DBLP]


  28. Automatic Patch Generation for Buffer Overflow Attacks. [Citation Graph (, )][DBLP]


  29. Protecting IP Multimedia Subsystem (IMS) Service Delivery Platform from Time Independent Attacks. [Citation Graph (, )][DBLP]


  30. Cyber Threat Trend Analysis Model Using HMM. [Citation Graph (, )][DBLP]


  31. DIPS: A Framework for Distributed Intrusion Prediction and Prevention Using Hidden Markov Models and Online Fuzzy Risk Assessment. [Citation Graph (, )][DBLP]


  32. Detection and Honeypot Based Redirection to Counter DDoS Attacks in ISP Domain. [Citation Graph (, )][DBLP]


  33. IP protection: Detecting Email based breaches of confidence. [Citation Graph (, )][DBLP]


  34. Non-Stationary Markov Models and Anomaly Propagation Analysis in IDS. [Citation Graph (, )][DBLP]


  35. Building Trustworthy Intrusion Detection through VM Introspection. [Citation Graph (, )][DBLP]


  36. Early DoS Attack Detection using Smoothened Time-Series andWavelet Analysis. [Citation Graph (, )][DBLP]


  37. A Security Model for Detecting Suspicious Patterns in Physical Environment. [Citation Graph (, )][DBLP]


  38. Detection of Web Defacements by means of Genetic Programming. [Citation Graph (, )][DBLP]


  39. Team Edit Automata for Testing Security Property. [Citation Graph (, )][DBLP]


  40. Analysing the Security Threats against Network Convergence Architectures. [Citation Graph (, )][DBLP]


  41. Modelling Quality of Protection in Outsourced Business Processes. [Citation Graph (, )][DBLP]


  42. Modeling Security Protocols as Games. [Citation Graph (, )][DBLP]


  43. A Secure Storage Service for the gLite Middleware. [Citation Graph (, )][DBLP]


  44. FPGA/ASIC based Cryptographic Object Store System. [Citation Graph (, )][DBLP]


  45. An Architecture for Privacy Preserving Collaborative Filtering on Web Portals. [Citation Graph (, )][DBLP]


  46. Enforcing Privacy by Means of an Ontology Driven XACML Framework. [Citation Graph (, )][DBLP]


  47. Addressing privacy issues in CardSpace. [Citation Graph (, )][DBLP]


  48. Second-LSB-Dependent Robust Watermarking for Relational Database. [Citation Graph (, )][DBLP]


  49. Operational risk: acceptability criteria. [Citation Graph (, )][DBLP]


  50. HPRS: A Hybrid P2P Reputation System using File and Peer Rating. [Citation Graph (, )][DBLP]


  51. Resource Classification Based Negotiation in Web Services. [Citation Graph (, )][DBLP]


  52. Managing Behaviour Trust in Grids Using Statistical Methods of Quality Assurance. [Citation Graph (, )][DBLP]


  53. Dynamic Risk Mitigation in Computing Infrastructures. [Citation Graph (, )][DBLP]


  54. Risk management in coalition networks. [Citation Graph (, )][DBLP]


  55. On the Definition and Policies of Confidentiality. [Citation Graph (, )][DBLP]


  56. Enhanced Availability and Security by Rate Control Using Extended Policy Framework in SELinux. [Citation Graph (, )][DBLP]


  57. CCARCH: Architecting Common Criteria Security Requirements. [Citation Graph (, )][DBLP]


  58. Organized Anonymous Agents. [Citation Graph (, )][DBLP]


  59. Comparing the Trust and Security Models of Mobile Agents. [Citation Graph (, )][DBLP]


  60. Program Fragmentation as a Metamorphic Software Protection. [Citation Graph (, )][DBLP]


  61. Accurate Application-Specific Sandboxing for Win32/Intel Binaries. [Citation Graph (, )][DBLP]


  62. Computational Forensics: Towards Hybrid-Intelligent Crime Investigation. [Citation Graph (, )][DBLP]


  63. Shoeprint Image Retrieval Based on Local Image Features. [Citation Graph (, )][DBLP]


  64. Statistical Disk Cluster Classification for File Carving. [Citation Graph (, )][DBLP]


  65. Application of Language Models to Suspect Prioritisation and Suspect Likelihood in Serial Crimes. [Citation Graph (, )][DBLP]


  66. Improving the Efficiency of Digital Forensic Search by Means of the Constrained Edit Distance. [Citation Graph (, )][DBLP]


  67. Information-theoretical comparison of likelihood ratio methods of forensic evidence evaluation. [Citation Graph (, )][DBLP]


  68. Study of structural features of handwritten grapheme ‘th’ for writer identification. [Citation Graph (, )][DBLP]


  69. Generative Models for Fingerprint Individuality using Ridge Types. [Citation Graph (, )][DBLP]


  70. Craniofacial Superimposition in Forensic Identification using Genetic Algorithms. [Citation Graph (, )][DBLP]


  71. The Influence of Frame Length on Speaker Identification Performance. [Citation Graph (, )][DBLP]


  72. On Periodic Properties of Interpolation and Their Application To Image Authentication. [Citation Graph (, )][DBLP]


  73. Detection of Hidden Information in Webpages Based on Randomness. [Citation Graph (, )][DBLP]


  74. A Weighted Stego Image Detector for Sequential LSB Replacement. [Citation Graph (, )][DBLP]


  75. A Framework for Design and Analysis of Asymmetric Fingerprinting Protocols. [Citation Graph (, )][DBLP]


  76. An Analysis of Database Watermarking Security. [Citation Graph (, )][DBLP]


  77. A New Data Hiding Scheme with Quality Control for Binary Images Using Block Parity. [Citation Graph (, )][DBLP]


  78. Metrics-based Evaluation of Slicing Obfuscations. [Citation Graph (, )][DBLP]


  79. Structural Digital Signature and Semi-Fragile Fingerprinting for Image Authentication in Wavelet Domain. [Citation Graph (, )][DBLP]


  80. A novel anti-collusion coding scheme tailored to track linear collusions. [Citation Graph (, )][DBLP]


  81. Research on Steganalysis for Text Steganography Based on Font Format. [Citation Graph (, )][DBLP]


  82. Protection of Mammograms Using Blind Steganography and Watermarking. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002