The SCEAS System
Navigation Menu

Conferences in DBLP

Security and Management (SAM) (csreaSAM)
2003 (conf/csreaSAM/2003-1)

  1. Michael G. Merideth, Priya Narasimhan
    Proactive Containment of Malice in Survivable Distributed Systems. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:3-9 [Conf]
  2. Hongmei Deng, Qing-An Zeng, Dharma P. Agrawal
    Network Intrusion Detection System Using Random Projection Technique. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:10-16 [Conf]
  3. Thomas Droste, Wolfgang Weber
    Additional Security Requirements to Integrate Wireless Networks. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:17-19 [Conf]
  4. Jinoh Kim, Ik-Kyun Kim, Kiyoung Kim, Jongsoo Jang, Sung Won Sohn, Koohong Kang
    An Integrated Network-Wide Defense Framework (INwDF) for Large Networks. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:20-26 [Conf]
  5. Alexandros G. Fragkiadakis, Nikolaos G. Bartzoudis, David J. Parish, Mark Sandford
    Hardware Support for Active Networking. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:27-33 [Conf]
  6. Kafi Hassan, Michael Conner
    Identifying Security Threats in Ad Hoc Wireless Network. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:34-40 [Conf]
  7. David Grawrock
    The Pull Model of Trust. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:41-47 [Conf]
  8. Ned M. Smith
    Prioritizing Facts for On-Line Trust Negotiation. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:48-54 [Conf]
  9. Todd A. Anderson, Vijay Tewari
    Establishing Confidence in Untrusted Storage Providers. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:55-64 [Conf]
  10. Hassan Aljifri, Nizar Tyrewalla
    Security in Mobility Management. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:65-71 [Conf]
  11. Simeon Xenitellis, Pita Jarupunphol
    Security Vulnerabilities in the Trust-List PKI. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:72-77 [Conf]
  12. In-Seock Cho, Byung kwan Lee, Tai-Chi Lee
    An ISEP (Improved Secure Electronic Payment) Protocol Design Using 3BC Algorithm. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:78-84 [Conf]
  13. Gianluigi Me
    A Secure Mobile Local Payment Application Framework. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:85-92 [Conf]
  14. Ghita Kouadri Mostéfaoui
    Security in Pervasive Environments, What's Next? [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:93-98 [Conf]
  15. Abhay Dharmadhikari, Uttam Sengupta, Ameen Ahmad, Roger Chandler
    SIM Based WLAN Authentication for Open Platforms. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:99-104 [Conf]
  16. Shushuang Man, Dawei Hong, Manton M. Matthews
    A Shoulder-Surfing Resistant Graphical Password Scheme - WIW. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:105-111 [Conf]
  17. Jung-Soo Lee, Han Ho Lee, Jong-Weon Kim
    Multi-Bits Image Watermarking Technique Against Geometrical Attacks. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:112-117 [Conf]
  18. Dennis Heimbigner
    A Tamper-Detecting Implementation of Lisp. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:118-124 [Conf]
  19. Zhuhan Jiang, Laxmikanth Gudipudi, Hiep Pham
    Distributed Resource Relay Under Personalized Firewalls. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:125-134 [Conf]
  20. Niklas Borselius, Chris J. Mitchell
    Securing FIPA Agent Communication. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:135-141 [Conf]
  21. Athanasios Agiannidis, Neil Glover, Kevin Warwick
    Behavior-Based Authentication in the Built Environment. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:142-148 [Conf]
  22. Regine Endsuleit, Thilo Mie
    Secure Multi-Agent Computations. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:149-155 [Conf]
  23. Anil Madhavapeddy, Alan Mycroft, David Scott, Richard Sharp
    The Case for Abstracting Security Policies. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:156-160 [Conf]
  24. Padmanabhan Krishnan, Robert Bannerman
    User Assisted Verification of Non-Repudiation and Similar Properties. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:161-170 [Conf]
  25. Gerry V. Dozier
    IDS Vulnerability Analysis Using Genertia Red Teams. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:171-176 [Conf]
  26. Kyoung-Hwa Do, Kun-Won Jang, Sang-Hun Lee, Moon-Seog Jun
    The Design of WEB Stegodata Detection Systems Using Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:177-182 [Conf]
  27. M. Ammar Rayes, Michael Cheung
    Security Management in IP Metro Ethernet/ETTx Networks. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:183-189 [Conf]
  28. Myung-Kyu Yi, MaengSoon Baik, Chong-Sun Hwang
    Design of a Fault-Tolerant Mechanism for Multi-Agent Based Intrusion Detection System. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:190-198 [Conf]
  29. Wayne A. Jansen, Tom Karygiannis, Michaela Iorga, Serban I. Gavrila, Vlad Korolev
    Security Policy Management for Handheld Devices. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:199-204 [Conf]
  30. Pavan K. Sura, Ravi Mukkamala
    A PKI Architecture for Academic Institutions: Design and Prototype. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:205-212 [Conf]
  31. Yan Yan, Yi Huang, Geoffrey Fox, Shrideep Pallickara, Marlon E. Pierce, Ali Kaplan, Ahmet E. Topcu
    Implementing a Prototype of the Security Framework for Distributed Brokering Systems. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:212-218 [Conf]
  32. Kyeong Ja Jeong, Moonsun Shin, Hosung Moon, Keun Ho Ryu, Kiyoung Kim
    Alert Analysis Using Data Mining for Security Policy Server in Policy Based Network Security Management. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:219-225 [Conf]
  33. Tony White, Eugen Bacic
    Implementing Policy-Based Content Filtering for Web Servers. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:226-232 [Conf]
  34. Ron Forrester
    Trusted Platforms and Integrity Management: Scaling TCPA to the Enterprise. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:233-240 [Conf]
  35. Jing Wu, Tianbing Xia, Jennifer Seberry
    Construction of Highly Non-Linear Cubic Homogeneous Boolean Functions on GF2n+1(2). [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:241-247 [Conf]
  36. Young-Jun Heo, Jongsoo Jang
    Defeating DoS Attacks Using Wavelet Analysis. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:248-252 [Conf]
  37. Mohannad Najjar
    Petra-r Cryptographic Hash Functions. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:253-259 [Conf]
  38. Hee Bong Choi, Hyoon Jae Lee, Choon Su Kim, Byung Hwa Chang, Dongho Won
    On Differential Power Analysis Attack on the Addition Modular 2N Operation of Smart Cards. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:260-266 [Conf]
  39. Chun Ruan, Vijay Varadharajan, Yan Zhang
    Delegatable Authorization Program and Its Application. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:267-273 [Conf]
  40. Ok-Ran Jeong, Dong-Sub Cho
    Personalized Filtering Agent for E-Mail Classification. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:274-280 [Conf]
  41. Carol Taylor, Paul W. Oman, Axel W. Krings
    Assessing Power Substation Network Security and Survivability: A Work in Progress Report. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:281-287 [Conf]
  42. Sungsu Kim, Kyubum Wee
    Limits of Signature-Based Detection of Buffer Overflow Attacks. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:288-293 [Conf]
  43. JongSoon Park, YoungLok Lee, HyungHyo Lee, BongNam Noh
    A Role-Based Delegation Model Using Role Hierarchy Supporting Restricted Permission Inheritance. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:294-302 [Conf]
  44. James F. Smith III
    Automated Resource Manager for Group Security. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:303-309 [Conf]
  45. Maheshkumar Sabhnani, Gürsel Serpen
    KDD Feature Set Complaint Heuristic Rules for R2L Attack Detection. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:310-316 [Conf]
  46. Yanet Manzano
    FDS Model: A Distributed Architectural Design for Management of Inbound Network Traffic on Web-Server Systems. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:317-323 [Conf]
  47. Kyoung-Ja Kim, Sung-Ock Hong, Tae-Mu Chang
    Agent Based Intrusion Tolerance Scheme in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:324-329 [Conf]
  48. Manhee Lee, Sangkil Jung, Younjoo Kwon, KookHan Kim, Jeonghoon Moon, Okhwan Byeon
    Spanning Tree Search Model to Traceback DDoS Attack Using Netflow. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:330-333 [Conf]
  49. Yoon-Jung Jung, In-Jung Kim
    The Development for the Risk Assessment Methodology of Spiral Model. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:334-336 [Conf]
  50. Su-Hyung Jo, Jeong-Nyeo Kim, Sung Won Sohn
    Design of Policy-Based Security Management for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:337-340 [Conf]
  51. Evon M. Abu-Taieh, Sattar J. Aboud
    A New Factoring Algorithm. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:341-347 [Conf]
  52. Peyman Nasirifard
    Web Services Security Overview and Security Proposal for UDDI Framework. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:348-351 [Conf]
  53. Moon-Ku Lee
    Stability Verification of Proxy Firewall Using Colored Petri Nets. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:352-358 [Conf]
  54. Lau Nga Sin, Moon-Chuen Lee
    Intrusion Detection System Models. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:359-366 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002