|
Conferences in DBLP
(IEEEias) 2008 (conf/IEEEias/2008)
A Formal Comparison of the Bell & LaPadula and RBAC Models. [Citation Graph (, )][DBLP]
Threshold Proxy Signature Scheme with Strong Real-Time Efficiency. [Citation Graph (, )][DBLP]
A Purchase Protocol with Live Cardholder Authentication for Online Credit Card Payment. [Citation Graph (, )][DBLP]
Comparison and Evaluation of Identity Management in Three Architectures for Virtual Organizations. [Citation Graph (, )][DBLP]
Speaker Identification by Multi-Frame Generative Models. [Citation Graph (, )][DBLP]
Integrating Delegation with the Formal Core RBAC Model. [Citation Graph (, )][DBLP]
Security Analysis of Temporal-RBAC Using Timed Automata. [Citation Graph (, )][DBLP]
Secure Hybrid Group Key Management for Hierarchical Self-Organizing Sensor Network. [Citation Graph (, )][DBLP]
PHAL-256 - Parameterized Hash Algorithm. [Citation Graph (, )][DBLP]
Steganography in Textiles. [Citation Graph (, )][DBLP]
Persian/Arabic Unicode Text Steganography. [Citation Graph (, )][DBLP]
Efficient Hierarchical Group-Oriented Key Establishment and Decryption. [Citation Graph (, )][DBLP]
Forward-Secure Proxy Signature Scheme for Multiple Proxy Signers Using Bellare-Miner Scheme with Proxy Revocation. [Citation Graph (, )][DBLP]
Data Hiding in Non-Expansion Visual Cryptography Based on Edge Enhancement Multitoning. [Citation Graph (, )][DBLP]
Skin Segmentation Using Color Distance Map and Water-Flow Property. [Citation Graph (, )][DBLP]
An Implementation Infrastructure for Server-Passive Timed-Release Cryptography. [Citation Graph (, )][DBLP]
A Group Key Agreement Scheme Revisited. [Citation Graph (, )][DBLP]
Secure E-Passport Protocol Using Elliptic Curve Diffie-Hellman Key Agreement Protocol. [Citation Graph (, )][DBLP]
A Server Based ASR Approach to Automated Cryptanalysis of Two Time Pads in Case of Speech. [Citation Graph (, )][DBLP]
Dynamic Substitution Model. [Citation Graph (, )][DBLP]
Data Fusion Assurance for the Kalman Filter in Uncertain Networks. [Citation Graph (, )][DBLP]
A Time and Storage Efficient Solution to Remote File Integrity Check. [Citation Graph (, )][DBLP]
A New Narrow Block Mode of Operations for Disk Encryption. [Citation Graph (, )][DBLP]
Provenance Tracking with Bit Vectors. [Citation Graph (, )][DBLP]
Impact of Cheating and Non-Cooperation on the Stability and the Performances of Application-Level Multicast Sessions. [Citation Graph (, )][DBLP]
ACML: Capability Based Attack Modeling Language. [Citation Graph (, )][DBLP]
Realistic Threats to Self-Enforcing Privacy. [Citation Graph (, )][DBLP]
Operator-Centric and Adaptive Intrusion Detection. [Citation Graph (, )][DBLP]
A Queuing Theory Based Model for Studying Intrusion Evolution and Elimination in Computer Networks. [Citation Graph (, )][DBLP]
Matrix Factorization Approach for Feature Deduction and Design of Intrusion Detection Systems. [Citation Graph (, )][DBLP]
Ensemble of One-Class Classifiers for Network Intrusion Detection System. [Citation Graph (, )][DBLP]
Web Application Attack Prevention for Tiered Internet Services. [Citation Graph (, )][DBLP]
LoSS Detection Approach Based on ESOSS and ASOSS Models. [Citation Graph (, )][DBLP]
COTraSE: Connection Oriented Traceback in Switched Ethernet. [Citation Graph (, )][DBLP]
Improving the Efficiency of Misuse Detection by Means of the q-gram Distance. [Citation Graph (, )][DBLP]
An Efficient Approach to Minimum-Cost Network Hardening Using Attack Graphs. [Citation Graph (, )][DBLP]
Developing a Security Typed Java Servlet. [Citation Graph (, )][DBLP]
Designing a DRM System. [Citation Graph (, )][DBLP]
Challenges for Security Typed Web Scripting Languages Design. [Citation Graph (, )][DBLP]
Systematic Website Verification for Privacy Protection. [Citation Graph (, )][DBLP]
Abusing SIP Authentication. [Citation Graph (, )][DBLP]
A Friend Mechanism for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]
A Composite Network Security Assessment. [Citation Graph (, )][DBLP]
Managing Reputation over MANETs. [Citation Graph (, )][DBLP]
Network Level Privacy for Wireless Sensor Networks. [Citation Graph (, )][DBLP]
A Device Management Framework for Secure Ubiquitous Service Delivery. [Citation Graph (, )][DBLP]
Automatic Verification of Simulatability in Security Protocols. [Citation Graph (, )][DBLP]
A New Secure Binding Management Protocol for Mobile IPv6 Networks. [Citation Graph (, )][DBLP]
Geolocation-Based Trust for Vanet's Privacy. [Citation Graph (, )][DBLP]
An Automated Validation Method for Security Policies: The Firewall Case. [Citation Graph (, )][DBLP]
Adaptive Dynamic Reaction to Automotive IT Security Incidents Using Multimedia Car Environment. [Citation Graph (, )][DBLP]
Semantics-Driven Introspection in a Virtual Environment. [Citation Graph (, )][DBLP]
Information Assurance in Critical Infrastructures via Wireless Sensor Networks. [Citation Graph (, )][DBLP]
A Model for the Study of Privacy Issues in Secure Shell Connections. [Citation Graph (, )][DBLP]
IRC Traffic Analysis for Botnet Detection. [Citation Graph (, )][DBLP]
Key Distribution Using Dual Quantum Channels. [Citation Graph (, )][DBLP]
Quantum Key Distribution Based on Multi-qubit Hadamard Matrices. [Citation Graph (, )][DBLP]
Chaotic Quantum Cryptography. [Citation Graph (, )][DBLP]
|