|
Conferences in DBLP
(securware) 2007 (conf/securware/2007)
Evaluating a New Reputation Algorithm With Consideration For Fairness. [Citation Graph (, )][DBLP]
Four security certification levels for IT Managers and Staff in the Public Sector. [Citation Graph (, )][DBLP]
A Survey of User-centric Identity Management Technologies. [Citation Graph (, )][DBLP]
SemID: Combining Semantics with Identity Management. [Citation Graph (, )][DBLP]
Evaluation of the Impact of Multipath Data Dispersion for Anonymous TCP Connections. [Citation Graph (, )][DBLP]
Trustworthily Forwarding Sensor Networks Information to the Internet. [Citation Graph (, )][DBLP]
Motivation for Behaviour-Based DNS Security: A Taxonomy of DNS-Related Internet Threats. [Citation Graph (, )][DBLP]
A Formal Approach to prevent Attacks on Mobile Agent Systems. [Citation Graph (, )][DBLP]
Increasing Detection Rate of User-to-Root Attacks Using Genetic Algorithms. [Citation Graph (, )][DBLP]
A Scheme for Protecting the Information Leakage Via Portable Devices. [Citation Graph (, )][DBLP]
A Quasi-Lossless Data Embedding Technique Based on Euclidean Distance Calculation. [Citation Graph (, )][DBLP]
Classification of Privacy Enhancing Technologies on Life-cycle of Information. [Citation Graph (, )][DBLP]
Chaos-Based Cryptography: End of the Road? [Citation Graph (, )][DBLP]
Long-term storage and management of encrypted biomedical data in real scenarios. [Citation Graph (, )][DBLP]
Semantically supported Authentication and Privacy in Social Networks. [Citation Graph (, )][DBLP]
Data Preparation for User Profiling from Traffic Log. [Citation Graph (, )][DBLP]
SECUAREA: Security in physical and logical areas. [Citation Graph (, )][DBLP]
Robust sensor self-initialization: Whispering to avoid intruders. [Citation Graph (, )][DBLP]
Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services. [Citation Graph (, )][DBLP]
Evaluation of Deviating Alerts coming from Behavioral Intrusion Detection System. [Citation Graph (, )][DBLP]
A low-cost embedded IDS to monitor and prevent Man-in-the-Middle attacks on wired LAN environments. [Citation Graph (, )][DBLP]
Dynamic environment evaluation for reliable AmI applications based on untrusted sensor. [Citation Graph (, )][DBLP]
Distributed Identity Management Model for Digital Ecosystems. [Citation Graph (, )][DBLP]
Security made easy: Achieving user-friendly communication protection in ad-hoc situations. [Citation Graph (, )][DBLP]
Adding Value to TCP/IP Based Information exchange Security by Specialized Hardware. [Citation Graph (, )][DBLP]
Migrating a HoneyDepot to Hardware. [Citation Graph (, )][DBLP]
Automatic Configuration of Ad-Hoc Networks: Establishing unique IP Link-Local Addresses. [Citation Graph (, )][DBLP]
Route Investigation for Secure Routing in Mobile Ad-hoc Networks. [Citation Graph (, )][DBLP]
A Proposal to Improve IKEv2 negotiation. [Citation Graph (, )][DBLP]
Temporal Verification in Secure Group Communication System Design. [Citation Graph (, )][DBLP]
Towards a Comprehensive View of Secure Software Engineering. [Citation Graph (, )][DBLP]
A Software Architecture for Automatic Security Policy Enforcement in Distributed Systems. [Citation Graph (, )][DBLP]
Identity-Based Cryptosystems for Enhanced Deployment of OSGi Bundles. [Citation Graph (, )][DBLP]
Formal Verification of Business Workflows and Role Based Access Control Systems. [Citation Graph (, )][DBLP]
A fast and elastic fingerprint matching algorithm using minutiae-centered circular regions. [Citation Graph (, )][DBLP]
AmTRUE: Authentication Management and Trusted Role-based Authorization in Multi-Application and Multi-User Environment. [Citation Graph (, )][DBLP]
|