Conferences in DBLP
Michael G. Merideth , Priya Narasimhan Proactive Containment of Malice in Survivable Distributed Systems. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:3-9 [Conf ] Hongmei Deng , Qing-An Zeng , Dharma P. Agrawal Network Intrusion Detection System Using Random Projection Technique. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:10-16 [Conf ] Thomas Droste , Wolfgang Weber Additional Security Requirements to Integrate Wireless Networks. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:17-19 [Conf ] Jinoh Kim , Ik-Kyun Kim , Kiyoung Kim , Jongsoo Jang , Sung Won Sohn , Koohong Kang An Integrated Network-Wide Defense Framework (INwDF) for Large Networks. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:20-26 [Conf ] Alexandros G. Fragkiadakis , Nikolaos G. Bartzoudis , David J. Parish , Mark Sandford Hardware Support for Active Networking. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:27-33 [Conf ] Kafi Hassan , Michael Conner Identifying Security Threats in Ad Hoc Wireless Network. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:34-40 [Conf ] David Grawrock The Pull Model of Trust. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:41-47 [Conf ] Ned M. Smith Prioritizing Facts for On-Line Trust Negotiation. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:48-54 [Conf ] Todd A. Anderson , Vijay Tewari Establishing Confidence in Untrusted Storage Providers. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:55-64 [Conf ] Hassan Aljifri , Nizar Tyrewalla Security in Mobility Management. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:65-71 [Conf ] Simeon Xenitellis , Pita Jarupunphol Security Vulnerabilities in the Trust-List PKI. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:72-77 [Conf ] In-Seock Cho , Byung kwan Lee , Tai-Chi Lee An ISEP (Improved Secure Electronic Payment) Protocol Design Using 3BC Algorithm. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:78-84 [Conf ] Gianluigi Me A Secure Mobile Local Payment Application Framework. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:85-92 [Conf ] Ghita Kouadri Mostéfaoui Security in Pervasive Environments, What's Next? [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:93-98 [Conf ] Abhay Dharmadhikari , Uttam Sengupta , Ameen Ahmad , Roger Chandler SIM Based WLAN Authentication for Open Platforms. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:99-104 [Conf ] Shushuang Man , Dawei Hong , Manton M. Matthews A Shoulder-Surfing Resistant Graphical Password Scheme - WIW. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:105-111 [Conf ] Jung-Soo Lee , Han Ho Lee , Jong-Weon Kim Multi-Bits Image Watermarking Technique Against Geometrical Attacks. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:112-117 [Conf ] Dennis Heimbigner A Tamper-Detecting Implementation of Lisp. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:118-124 [Conf ] Zhuhan Jiang , Laxmikanth Gudipudi , Hiep Pham Distributed Resource Relay Under Personalized Firewalls. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:125-134 [Conf ] Niklas Borselius , Chris J. Mitchell Securing FIPA Agent Communication. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:135-141 [Conf ] Athanasios Agiannidis , Neil Glover , Kevin Warwick Behavior-Based Authentication in the Built Environment. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:142-148 [Conf ] Regine Endsuleit , Thilo Mie Secure Multi-Agent Computations. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:149-155 [Conf ] Anil Madhavapeddy , Alan Mycroft , David Scott , Richard Sharp The Case for Abstracting Security Policies. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:156-160 [Conf ] Padmanabhan Krishnan , Robert Bannerman User Assisted Verification of Non-Repudiation and Similar Properties. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:161-170 [Conf ] Gerry V. Dozier IDS Vulnerability Analysis Using Genertia Red Teams. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:171-176 [Conf ] Kyoung-Hwa Do , Kun-Won Jang , Sang-Hun Lee , Moon-Seog Jun The Design of WEB Stegodata Detection Systems Using Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:177-182 [Conf ] M. Ammar Rayes , Michael Cheung Security Management in IP Metro Ethernet/ETTx Networks. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:183-189 [Conf ] Myung-Kyu Yi , MaengSoon Baik , Chong-Sun Hwang Design of a Fault-Tolerant Mechanism for Multi-Agent Based Intrusion Detection System. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:190-198 [Conf ] Wayne A. Jansen , Tom Karygiannis , Michaela Iorga , Serban I. Gavrila , Vlad Korolev Security Policy Management for Handheld Devices. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:199-204 [Conf ] Pavan K. Sura , Ravi Mukkamala A PKI Architecture for Academic Institutions: Design and Prototype. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:205-212 [Conf ] Yan Yan , Yi Huang , Geoffrey Fox , Shrideep Pallickara , Marlon E. Pierce , Ali Kaplan , Ahmet E. Topcu Implementing a Prototype of the Security Framework for Distributed Brokering Systems. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:212-218 [Conf ] Kyeong Ja Jeong , Moonsun Shin , Hosung Moon , Keun Ho Ryu , Kiyoung Kim Alert Analysis Using Data Mining for Security Policy Server in Policy Based Network Security Management. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:219-225 [Conf ] Tony White , Eugen Bacic Implementing Policy-Based Content Filtering for Web Servers. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:226-232 [Conf ] Ron Forrester Trusted Platforms and Integrity Management: Scaling TCPA to the Enterprise. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:233-240 [Conf ] Jing Wu , Tianbing Xia , Jennifer Seberry Construction of Highly Non-Linear Cubic Homogeneous Boolean Functions on GF2n+1 (2). [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:241-247 [Conf ] Young-Jun Heo , Jongsoo Jang Defeating DoS Attacks Using Wavelet Analysis. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:248-252 [Conf ] Mohannad Najjar Petra-r Cryptographic Hash Functions. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:253-259 [Conf ] Hee Bong Choi , Hyoon Jae Lee , Choon Su Kim , Byung Hwa Chang , Dongho Won On Differential Power Analysis Attack on the Addition Modular 2N Operation of Smart Cards. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:260-266 [Conf ] Chun Ruan , Vijay Varadharajan , Yan Zhang Delegatable Authorization Program and Its Application. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:267-273 [Conf ] Ok-Ran Jeong , Dong-Sub Cho Personalized Filtering Agent for E-Mail Classification. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:274-280 [Conf ] Carol Taylor , Paul W. Oman , Axel W. Krings Assessing Power Substation Network Security and Survivability: A Work in Progress Report. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:281-287 [Conf ] Sungsu Kim , Kyubum Wee Limits of Signature-Based Detection of Buffer Overflow Attacks. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:288-293 [Conf ] JongSoon Park , YoungLok Lee , HyungHyo Lee , BongNam Noh A Role-Based Delegation Model Using Role Hierarchy Supporting Restricted Permission Inheritance. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:294-302 [Conf ] James F. Smith III Automated Resource Manager for Group Security. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:303-309 [Conf ] Maheshkumar Sabhnani , Gürsel Serpen KDD Feature Set Complaint Heuristic Rules for R2L Attack Detection. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:310-316 [Conf ] Yanet Manzano FDS Model: A Distributed Architectural Design for Management of Inbound Network Traffic on Web-Server Systems. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:317-323 [Conf ] Kyoung-Ja Kim , Sung-Ock Hong , Tae-Mu Chang Agent Based Intrusion Tolerance Scheme in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:324-329 [Conf ] Manhee Lee , Sangkil Jung , Younjoo Kwon , KookHan Kim , Jeonghoon Moon , Okhwan Byeon Spanning Tree Search Model to Traceback DDoS Attack Using Netflow. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:330-333 [Conf ] Yoon-Jung Jung , In-Jung Kim The Development for the Risk Assessment Methodology of Spiral Model. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:334-336 [Conf ] Su-Hyung Jo , Jeong-Nyeo Kim , Sung Won Sohn Design of Policy-Based Security Management for Intrusion Detection. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:337-340 [Conf ] Evon M. Abu-Taieh , Sattar J. Aboud A New Factoring Algorithm. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:341-347 [Conf ] Peyman Nasirifard Web Services Security Overview and Security Proposal for UDDI Framework. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:348-351 [Conf ] Moon-Ku Lee Stability Verification of Proxy Firewall Using Colored Petri Nets. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:352-358 [Conf ] Lau Nga Sin , Moon-Chuen Lee Intrusion Detection System Models. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:359-366 [Conf ]