The SCEAS System
Navigation Menu

Conferences in DBLP

(IEEEias)
2008 (conf/IEEEias/2008)


  1. A Formal Comparison of the Bell & LaPadula and RBAC Models. [Citation Graph (, )][DBLP]


  2. Threshold Proxy Signature Scheme with Strong Real-Time Efficiency. [Citation Graph (, )][DBLP]


  3. A Purchase Protocol with Live Cardholder Authentication for Online Credit Card Payment. [Citation Graph (, )][DBLP]


  4. Comparison and Evaluation of Identity Management in Three Architectures for Virtual Organizations. [Citation Graph (, )][DBLP]


  5. Speaker Identification by Multi-Frame Generative Models. [Citation Graph (, )][DBLP]


  6. Integrating Delegation with the Formal Core RBAC Model. [Citation Graph (, )][DBLP]


  7. Security Analysis of Temporal-RBAC Using Timed Automata. [Citation Graph (, )][DBLP]


  8. Secure Hybrid Group Key Management for Hierarchical Self-Organizing Sensor Network. [Citation Graph (, )][DBLP]


  9. PHAL-256 - Parameterized Hash Algorithm. [Citation Graph (, )][DBLP]


  10. Steganography in Textiles. [Citation Graph (, )][DBLP]


  11. Persian/Arabic Unicode Text Steganography. [Citation Graph (, )][DBLP]


  12. Efficient Hierarchical Group-Oriented Key Establishment and Decryption. [Citation Graph (, )][DBLP]


  13. Forward-Secure Proxy Signature Scheme for Multiple Proxy Signers Using Bellare-Miner Scheme with Proxy Revocation. [Citation Graph (, )][DBLP]


  14. Data Hiding in Non-Expansion Visual Cryptography Based on Edge Enhancement Multitoning. [Citation Graph (, )][DBLP]


  15. Skin Segmentation Using Color Distance Map and Water-Flow Property. [Citation Graph (, )][DBLP]


  16. An Implementation Infrastructure for Server-Passive Timed-Release Cryptography. [Citation Graph (, )][DBLP]


  17. A Group Key Agreement Scheme Revisited. [Citation Graph (, )][DBLP]


  18. Secure E-Passport Protocol Using Elliptic Curve Diffie-Hellman Key Agreement Protocol. [Citation Graph (, )][DBLP]


  19. A Server Based ASR Approach to Automated Cryptanalysis of Two Time Pads in Case of Speech. [Citation Graph (, )][DBLP]


  20. Dynamic Substitution Model. [Citation Graph (, )][DBLP]


  21. Data Fusion Assurance for the Kalman Filter in Uncertain Networks. [Citation Graph (, )][DBLP]


  22. A Time and Storage Efficient Solution to Remote File Integrity Check. [Citation Graph (, )][DBLP]


  23. A New Narrow Block Mode of Operations for Disk Encryption. [Citation Graph (, )][DBLP]


  24. Provenance Tracking with Bit Vectors. [Citation Graph (, )][DBLP]


  25. Impact of Cheating and Non-Cooperation on the Stability and the Performances of Application-Level Multicast Sessions. [Citation Graph (, )][DBLP]


  26. ACML: Capability Based Attack Modeling Language. [Citation Graph (, )][DBLP]


  27. Realistic Threats to Self-Enforcing Privacy. [Citation Graph (, )][DBLP]


  28. Operator-Centric and Adaptive Intrusion Detection. [Citation Graph (, )][DBLP]


  29. A Queuing Theory Based Model for Studying Intrusion Evolution and Elimination in Computer Networks. [Citation Graph (, )][DBLP]


  30. Matrix Factorization Approach for Feature Deduction and Design of Intrusion Detection Systems. [Citation Graph (, )][DBLP]


  31. Ensemble of One-Class Classifiers for Network Intrusion Detection System. [Citation Graph (, )][DBLP]


  32. Web Application Attack Prevention for Tiered Internet Services. [Citation Graph (, )][DBLP]


  33. LoSS Detection Approach Based on ESOSS and ASOSS Models. [Citation Graph (, )][DBLP]


  34. COTraSE: Connection Oriented Traceback in Switched Ethernet. [Citation Graph (, )][DBLP]


  35. Improving the Efficiency of Misuse Detection by Means of the q-gram Distance. [Citation Graph (, )][DBLP]


  36. An Efficient Approach to Minimum-Cost Network Hardening Using Attack Graphs. [Citation Graph (, )][DBLP]


  37. Developing a Security Typed Java Servlet. [Citation Graph (, )][DBLP]


  38. Designing a DRM System. [Citation Graph (, )][DBLP]


  39. Challenges for Security Typed Web Scripting Languages Design. [Citation Graph (, )][DBLP]


  40. Systematic Website Verification for Privacy Protection. [Citation Graph (, )][DBLP]


  41. Abusing SIP Authentication. [Citation Graph (, )][DBLP]


  42. A Friend Mechanism for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  43. A Composite Network Security Assessment. [Citation Graph (, )][DBLP]


  44. Managing Reputation over MANETs. [Citation Graph (, )][DBLP]


  45. Network Level Privacy for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  46. A Device Management Framework for Secure Ubiquitous Service Delivery. [Citation Graph (, )][DBLP]


  47. Automatic Verification of Simulatability in Security Protocols. [Citation Graph (, )][DBLP]


  48. A New Secure Binding Management Protocol for Mobile IPv6 Networks. [Citation Graph (, )][DBLP]


  49. Geolocation-Based Trust for Vanet's Privacy. [Citation Graph (, )][DBLP]


  50. An Automated Validation Method for Security Policies: The Firewall Case. [Citation Graph (, )][DBLP]


  51. Adaptive Dynamic Reaction to Automotive IT Security Incidents Using Multimedia Car Environment. [Citation Graph (, )][DBLP]


  52. Semantics-Driven Introspection in a Virtual Environment. [Citation Graph (, )][DBLP]


  53. Information Assurance in Critical Infrastructures via Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  54. A Model for the Study of Privacy Issues in Secure Shell Connections. [Citation Graph (, )][DBLP]


  55. IRC Traffic Analysis for Botnet Detection. [Citation Graph (, )][DBLP]


  56. Key Distribution Using Dual Quantum Channels. [Citation Graph (, )][DBLP]


  57. Quantum Key Distribution Based on Multi-qubit Hadamard Matrices. [Citation Graph (, )][DBLP]


  58. Chaotic Quantum Cryptography. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002