Conferences in DBLP
(IEEEias) 2007 (conf/IEEEias/2007)
Secure M-commerce Transactions: A Third Party Based Signature Protocol. [Citation Graph (, )][DBLP ] Secure E-Commerce Protocol for Purchase of e-Goods - Using Smart Card. [Citation Graph (, )][DBLP ] Certified Email Delivery with Offline TTP. [Citation Graph (, )][DBLP ] An Effective and Secure Buyer-Seller Watermarking Protocol. [Citation Graph (, )][DBLP ] Towards an Autonomic Security System for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP ] A Secure Authenticated Key Agreement Protocol For Wireless Security. [Citation Graph (, )][DBLP ] Hierarchical Multi-Party Key Agreement for Wireless Networks. [Citation Graph (, )][DBLP ] Applying Secure Data Aggregation techniques for a Structure and Density Independent Group Based Key Management Protocol. [Citation Graph (, )][DBLP ] A Performance Comparison of Wireless Ad Hoc Network Routing Protocols under Security Attack. [Citation Graph (, )][DBLP ] On Detecting Packets Droppers in MANET: A Novel Low Cost Approach. [Citation Graph (, )][DBLP ] Threshold SKI Protocol for ID-based Cryptosystems. [Citation Graph (, )][DBLP ] Fuzzy Key Extraction from Fingerprint Biometrics based on Dynamic Quantization Mechanism. [Citation Graph (, )][DBLP ] Low-cost Anonymous Timed-Release Encryption. [Citation Graph (, )][DBLP ] Integrating Multi-Modal Circuit Features within an Efficient Encryption System. [Citation Graph (, )][DBLP ] A Secure Authenticated Key Agreement Protocol Based on Elliptic Curve Cryptography. [Citation Graph (, )][DBLP ] Inclusion of a Montgomery Multiplier Unit into an Embedded Processors Datapath to Speed-up Elliptic Curve Cryptography. [Citation Graph (, )][DBLP ] An LSB Data Hiding Technique Using Prime Numbers. [Citation Graph (, )][DBLP ] Binding Update Authentication Scheme for Mobile IPv6. [Citation Graph (, )][DBLP ] An Authentication Scheme Using Non-Commutative Semigroups. [Citation Graph (, )][DBLP ] Function-Based Authorization Constraints Specification and Enforcement. [Citation Graph (, )][DBLP ] Separation of Duty in Role-Based Access Control Model through Fuzzy Relations. [Citation Graph (, )][DBLP ] Enhancing Role-Based Access Control Model through Fuzzy Relations. [Citation Graph (, )][DBLP ] A Theoretical Security Model for Access Control and Security Assurance. [Citation Graph (, )][DBLP ] A Purpose-Based Access Control Model. [Citation Graph (, )][DBLP ] SARBAC07: A Scoped Administration Model for RBAC with Hybrid Hierarchy. [Citation Graph (, )][DBLP ] Levels of Authentication Assurance: an Investigation. [Citation Graph (, )][DBLP ] Vulnerability Assessment by Learning Attack Specifications in Graphs. [Citation Graph (, )][DBLP ] Automatic Patch Generation for Buffer Overflow Attacks. [Citation Graph (, )][DBLP ] Protecting IP Multimedia Subsystem (IMS) Service Delivery Platform from Time Independent Attacks. [Citation Graph (, )][DBLP ] Cyber Threat Trend Analysis Model Using HMM. [Citation Graph (, )][DBLP ] DIPS: A Framework for Distributed Intrusion Prediction and Prevention Using Hidden Markov Models and Online Fuzzy Risk Assessment. [Citation Graph (, )][DBLP ] Detection and Honeypot Based Redirection to Counter DDoS Attacks in ISP Domain. [Citation Graph (, )][DBLP ] IP protection: Detecting Email based breaches of confidence. [Citation Graph (, )][DBLP ] Non-Stationary Markov Models and Anomaly Propagation Analysis in IDS. [Citation Graph (, )][DBLP ] Building Trustworthy Intrusion Detection through VM Introspection. [Citation Graph (, )][DBLP ] Early DoS Attack Detection using Smoothened Time-Series andWavelet Analysis. [Citation Graph (, )][DBLP ] A Security Model for Detecting Suspicious Patterns in Physical Environment. [Citation Graph (, )][DBLP ] Detection of Web Defacements by means of Genetic Programming. [Citation Graph (, )][DBLP ] Team Edit Automata for Testing Security Property. [Citation Graph (, )][DBLP ] Analysing the Security Threats against Network Convergence Architectures. [Citation Graph (, )][DBLP ] Modelling Quality of Protection in Outsourced Business Processes. [Citation Graph (, )][DBLP ] Modeling Security Protocols as Games. [Citation Graph (, )][DBLP ] A Secure Storage Service for the gLite Middleware. [Citation Graph (, )][DBLP ] FPGA/ASIC based Cryptographic Object Store System. [Citation Graph (, )][DBLP ] An Architecture for Privacy Preserving Collaborative Filtering on Web Portals. [Citation Graph (, )][DBLP ] Enforcing Privacy by Means of an Ontology Driven XACML Framework. [Citation Graph (, )][DBLP ] Addressing privacy issues in CardSpace. [Citation Graph (, )][DBLP ] Second-LSB-Dependent Robust Watermarking for Relational Database. [Citation Graph (, )][DBLP ] Operational risk: acceptability criteria. [Citation Graph (, )][DBLP ] HPRS: A Hybrid P2P Reputation System using File and Peer Rating. [Citation Graph (, )][DBLP ] Resource Classification Based Negotiation in Web Services. [Citation Graph (, )][DBLP ] Managing Behaviour Trust in Grids Using Statistical Methods of Quality Assurance. [Citation Graph (, )][DBLP ] Dynamic Risk Mitigation in Computing Infrastructures. [Citation Graph (, )][DBLP ] Risk management in coalition networks. [Citation Graph (, )][DBLP ] On the Definition and Policies of Confidentiality. [Citation Graph (, )][DBLP ] Enhanced Availability and Security by Rate Control Using Extended Policy Framework in SELinux. [Citation Graph (, )][DBLP ] CCARCH: Architecting Common Criteria Security Requirements. [Citation Graph (, )][DBLP ] Organized Anonymous Agents. [Citation Graph (, )][DBLP ] Comparing the Trust and Security Models of Mobile Agents. [Citation Graph (, )][DBLP ] Program Fragmentation as a Metamorphic Software Protection. [Citation Graph (, )][DBLP ] Accurate Application-Specific Sandboxing for Win32/Intel Binaries. [Citation Graph (, )][DBLP ] Computational Forensics: Towards Hybrid-Intelligent Crime Investigation. [Citation Graph (, )][DBLP ] Shoeprint Image Retrieval Based on Local Image Features. [Citation Graph (, )][DBLP ] Statistical Disk Cluster Classification for File Carving. [Citation Graph (, )][DBLP ] Application of Language Models to Suspect Prioritisation and Suspect Likelihood in Serial Crimes. [Citation Graph (, )][DBLP ] Improving the Efficiency of Digital Forensic Search by Means of the Constrained Edit Distance. [Citation Graph (, )][DBLP ] Information-theoretical comparison of likelihood ratio methods of forensic evidence evaluation. [Citation Graph (, )][DBLP ] Study of structural features of handwritten grapheme th for writer identification. [Citation Graph (, )][DBLP ] Generative Models for Fingerprint Individuality using Ridge Types. [Citation Graph (, )][DBLP ] Craniofacial Superimposition in Forensic Identification using Genetic Algorithms. [Citation Graph (, )][DBLP ] The Influence of Frame Length on Speaker Identification Performance. [Citation Graph (, )][DBLP ] On Periodic Properties of Interpolation and Their Application To Image Authentication. [Citation Graph (, )][DBLP ] Detection of Hidden Information in Webpages Based on Randomness. [Citation Graph (, )][DBLP ] A Weighted Stego Image Detector for Sequential LSB Replacement. [Citation Graph (, )][DBLP ] A Framework for Design and Analysis of Asymmetric Fingerprinting Protocols. [Citation Graph (, )][DBLP ] An Analysis of Database Watermarking Security. [Citation Graph (, )][DBLP ] A New Data Hiding Scheme with Quality Control for Binary Images Using Block Parity. [Citation Graph (, )][DBLP ] Metrics-based Evaluation of Slicing Obfuscations. [Citation Graph (, )][DBLP ] Structural Digital Signature and Semi-Fragile Fingerprinting for Image Authentication in Wavelet Domain. [Citation Graph (, )][DBLP ] A novel anti-collusion coding scheme tailored to track linear collusions. [Citation Graph (, )][DBLP ] Research on Steganalysis for Text Steganography Based on Font Format. [Citation Graph (, )][DBLP ] Protection of Mammograms Using Blind Steganography and Watermarking. [Citation Graph (, )][DBLP ]