The SCEAS System
Navigation Menu

Conferences in DBLP

(securware)
2007 (conf/securware/2007)


  1. Evaluating a New Reputation Algorithm With Consideration For Fairness. [Citation Graph (, )][DBLP]


  2. Four security certification levels for IT Managers and Staff in the Public Sector. [Citation Graph (, )][DBLP]


  3. A Survey of User-centric Identity Management Technologies. [Citation Graph (, )][DBLP]


  4. SemID: Combining Semantics with Identity Management. [Citation Graph (, )][DBLP]


  5. Evaluation of the Impact of Multipath Data Dispersion for Anonymous TCP Connections. [Citation Graph (, )][DBLP]


  6. Trustworthily Forwarding Sensor Networks Information to the Internet. [Citation Graph (, )][DBLP]


  7. Motivation for Behaviour-Based DNS Security: A Taxonomy of DNS-Related Internet Threats. [Citation Graph (, )][DBLP]


  8. A Formal Approach to prevent Attacks on Mobile Agent Systems. [Citation Graph (, )][DBLP]


  9. Increasing Detection Rate of User-to-Root Attacks Using Genetic Algorithms. [Citation Graph (, )][DBLP]


  10. A Scheme for Protecting the Information Leakage Via Portable Devices. [Citation Graph (, )][DBLP]


  11. A Quasi-Lossless Data Embedding Technique Based on Euclidean Distance Calculation. [Citation Graph (, )][DBLP]


  12. Classification of Privacy Enhancing Technologies on Life-cycle of Information. [Citation Graph (, )][DBLP]


  13. Chaos-Based Cryptography: End of the Road? [Citation Graph (, )][DBLP]


  14. Long-term storage and management of encrypted biomedical data in real scenarios. [Citation Graph (, )][DBLP]


  15. Semantically supported Authentication and Privacy in Social Networks. [Citation Graph (, )][DBLP]


  16. Data Preparation for User Profiling from Traffic Log. [Citation Graph (, )][DBLP]


  17. SECUAREA: Security in physical and logical areas. [Citation Graph (, )][DBLP]


  18. Robust sensor self-initialization: Whispering to avoid intruders. [Citation Graph (, )][DBLP]


  19. Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services. [Citation Graph (, )][DBLP]


  20. Evaluation of Deviating Alerts coming from Behavioral Intrusion Detection System. [Citation Graph (, )][DBLP]


  21. A low-cost embedded IDS to monitor and prevent Man-in-the-Middle attacks on wired LAN environments. [Citation Graph (, )][DBLP]


  22. Dynamic environment evaluation for reliable AmI applications based on untrusted sensor. [Citation Graph (, )][DBLP]


  23. Distributed Identity Management Model for Digital Ecosystems. [Citation Graph (, )][DBLP]


  24. Security made easy: Achieving user-friendly communication protection in ad-hoc situations. [Citation Graph (, )][DBLP]


  25. Adding Value to TCP/IP Based Information exchange Security by Specialized Hardware. [Citation Graph (, )][DBLP]


  26. Migrating a HoneyDepot to Hardware. [Citation Graph (, )][DBLP]


  27. Automatic Configuration of Ad-Hoc Networks: Establishing unique IP Link-Local Addresses. [Citation Graph (, )][DBLP]


  28. Route Investigation for Secure Routing in Mobile Ad-hoc Networks. [Citation Graph (, )][DBLP]


  29. A Proposal to Improve IKEv2 negotiation. [Citation Graph (, )][DBLP]


  30. Temporal Verification in Secure Group Communication System Design. [Citation Graph (, )][DBLP]


  31. Towards a Comprehensive View of Secure Software Engineering. [Citation Graph (, )][DBLP]


  32. A Software Architecture for Automatic Security Policy Enforcement in Distributed Systems. [Citation Graph (, )][DBLP]


  33. Identity-Based Cryptosystems for Enhanced Deployment of OSGi Bundles. [Citation Graph (, )][DBLP]


  34. Formal Verification of Business Workflows and Role Based Access Control Systems. [Citation Graph (, )][DBLP]


  35. A fast and elastic fingerprint matching algorithm using minutiae-centered circular regions. [Citation Graph (, )][DBLP]


  36. AmTRUE: Authentication Management and Trusted Role-based Authorization in Multi-Application and Multi-User Environment. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002