Conferences in DBLP
Rune Gustavsson Ensuring Dependability in Service Oriented Computing. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:3-11 [Conf ] Kenichi Takahashi , Kouichi Sakurai A Framework for the User-Oriented Personal Information Protection. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:12-19 [Conf ] Andrzej Bialas A Semiformal Approach to the Security Problem of the Target of Evaluation (TOE) Modeling. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:19-25 [Conf ] Norbik Bashah Idris , Bharanidharan Shanmugam Novel Attack Detection Using Fuzzy Logic and Data Mining. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:26-31 [Conf ] Omer Mahmood Custom Plugin - A Solution to Phishing and Pharming Attacks. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:32-37 [Conf ] Eunjin Ko , Yongsun Ryu , Gilhaeng Lee , Youngsun Kim The Fault Detecting Method for Supporting SLA Fault Metrics of IPTV Service. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:38-43 [Conf ] Guannan Gong , Liang Hu , Kuo Zhao , Jinxin He , Yuefeng Xu , Ying Duan SPS-VN: Research on the Security Policy System for Virtual Network. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:44-47 [Conf ] Gang Shin Lee , Mi-Hyun Ahn , Ho-Seong Kim , Jae-il Lee The Information Security Guideline for SMEs in Korea. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:48-56 [Conf ] Shahram Latifi , Nimalan Solayappan A Survey of Unimodal Biometric Methods. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:57-63 [Conf ] Hesham Elzouka A New Robust and Secure Steganographic System for Greyscale Images. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:64-71 [Conf ] Kevin Daimi , Katherine Snyder Security Requirements for Multimodal Biometric Systems. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:72-77 [Conf ] Yoshifumi Ueshige , Kouichi Sakurai A Proposal of One-Time Biometric Authentication. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:78-83 [Conf ] Xuan-Hien Dang , Krishna C. S. Kota Case Study: An Implementation of a Secure Steganographic System. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:84-90 [Conf ] Jonathan White , Dale Thompson Using Synthetic Decoys to Digitally Watermark Personally-Identifying Data and to Promote Data Security. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:91-99 [Conf ] Hiroshi Dozono , Yoshio Noguchi , Masanori Nakakuni , Hisao Tokushima The Analyses of Key Stroke Timings using Self Organizing Maps and its Application to Authentication. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:100-105 [Conf ] Kun-Won Jang , Chan-Kil Park , Jung-jae Kim , Moon-Seog Jun A Study on DRM System for On/Off Line Key Authentication. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:106-111 [Conf ] Wilfrid Mirville , Jamie Kobie , Michael Nelson MRAS: A Multi-Layered Remote Authentication System. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:112-117 [Conf ] Jinxin He , Gaochao Xu , Zhiguo Zhou , Guannan Gong A New Approach For Source Authentication Of Multicast Data. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:118-121 [Conf ] Huang-Ju Chen , Jyh-Ming Huang , Lei Wang Efficient and Secure Authentication Protocols for Mobile VoIP Communications. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:122-128 [Conf ] Hao Wang , Zhongfu Wu , Xin Tan A New Secure Authentication Scheme Based Threshold ECDSA For Wireless Sensor Network. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:129-133 [Conf ] Haibo Tian , Yumin Wang Security Analysis of the Digital Transmission Copy Protection Specification. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:134-137 [Conf ] Zemao Zhao , Xiangxong Tang , Bin Li , Longhai Zhu An ID-based Anonymous Proxy Signature From Bilinear Pairings. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:138-144 [Conf ] Danilo Gligoroski , Svein J. Knapskog , Suzana Andova Cryptcoding - Encryption and Error-Correction Coding in a Single Step. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:145-151 [Conf ] Levent Ertaul , Vaidehi Kedlaya Finding Minimum Optimal Path Securely Using Homomorphic Encryption Schemes in Computer Networks. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:152-158 [Conf ] Li Lu , Lei Hu Pairing-Based Multi-Recipient Public Key Encryption. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:159-165 [Conf ] Sughyuck Hong , Noé Lopez-Benitez Enhanced Group Key Generation Protocol. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:166-171 [Conf ] Levent Ertaul , Jayalalitha Panda Mobile Agent Security. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:172-178 [Conf ] Mykola Karpinskyy , Lesya Vasylkiv , Marcin Gizycki Secret Key Leakage Caused by Hamming-weight Timing Analysis on Modular Exponentiation. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:179-185 [Conf ] Tae Ho Kim , Jong Jin Kim , Chang Hoon Kim , Chun Pyo Hong Flexible Cryptographic Component Design for Secure Web Applications. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:186-192 [Conf ] Norbert Lehmann , Reinhard Schwarz , Jörg Keller FireCrocodile: A Checker for Static Firewall Configurations. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:193-199 [Conf ] Hongmei Deng , Roger Xu , Frank Zhang , Chiman Kwan , Leonard Haynes Agent-based Distributed Intrusion Detection Methodology for MANETs. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:200-206 [Conf ] Grant A. Jacoby , Thadeus Hickman , Stuart Warders , Barak Griffin , Aaron Darensburg , Daniel Castle Gibraltar: A Mobile Host-Based Intrusion Protection System. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:207-212 [Conf ] Thawatchai Chomsiri , Chotipat Pornavalai Firewall Rules Analysis. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:213-219 [Conf ] Shuangbao Wang , Fengjing Shao , Robert S. Ledley Connputer - A Framework of Intrusion-Free Secure Computer Architecture. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:220-225 [Conf ] Wen Ouyang , Kun-Ming Yu , Wen-Ping Lee Design and Implementation of a High-Performance Active Network Security System. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:226-232 [Conf ] Omer Demir , Ping Ji , Jinwoo Kim Session Based Logging (SBL) for IP-Traceback on Network Forensics. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:233-239 [Conf ] Richard Wasniowski Network Intrusion Detection System with Data Mart. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:240-244 [Conf ] Jun Qian , Chao Xu , Meilin Shi Remodeling and Simulation of Intrusion Detection Evaluation Dataset. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:245-251 [Conf ] Johnnes Arreymbi Modelling to Enhance GSM Network Security. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:252-260 [Conf ] Kuo Zhao , Liang Hu , Guannan Gong , Meng Zhang , Kexin Yang Comparison of Two Sampling-Based Data Collection Mechanisms for Intrusion Detection System. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:261-265 [Conf ] Hsun-Jung Cho , Li-Yen Hsu Integrating the Generalized-Honeycomb-Torus for Sustainable Parking Structures in the Globalizing Age. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:266-271 [Conf ] Yan-ning Huang , Yong Jiang Firewall Design: Understandable, Designable and Testable. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:272-278 [Conf ] Anil Kumar Venkataiahgari , Mourad Debbabi , J. William Atwood Secure E-commerce Protection Profile. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:279-285 [Conf ] Pierre K. Y. Lai , Siu-Ming Yiu , K. P. Chow , C. F. Chong , Lucas Chi Kwong Hui An Efficient Bloom Filter Based Solution for Multiparty Private Matching. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:286-292 [Conf ] Mohammad Chowdhury , Bon Sy , Rasheed Ahmad Application of Gaussian Estimation for Devising Reliable Vulnerability Assessment on SIP-based VoIP Infrastructure. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:293-299 [Conf ] Jörg Keller , Tobias Eggendorfer Combining SMTP and HTTP tar Pits to Proactively Reduce Spam. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:300-306 [Conf ] Dongwan Shin Modeling Role-based Trust and Authority in Open Environments. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:307-313 [Conf ] Li-Yen Hsu , Shin-Shin Kao Developing Dual-Surveillance Based Vehicle Security Management with Generalized Honeycomb Tori. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:314-320 [Conf ] Bernard Kaddour , Joël Quinqueton Using Aspects and Compilation Techniques to Dynamically Manage Applications. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:321-327 [Conf ] Michael LeMay , Jack Tan Acoustic Surveillance of Physically Unmodified PCs. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:328-334 [Conf ] Xiaodong Yuan , Dajiong Yue Software Vaccine Technique and Its Application in Early Virus. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:335-340 [Conf ] Jianwu Zheng , Mingsheng Liu , Hui Liu On Achieving Trustworthy SOA-Based Web Services. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:341-350 [Conf ] Satish Baddelpeli , Gregory Vert Adaptive Security Metrics for Computer Systems. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:351-356 [Conf ] Rajasekhar Yakkali , Gregory Vert Architectural Framework Design for Authentication Mechanism in Mobile Adhoc Networks (MANETs). [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:357-363 [Conf ] Gregory Vert , Manaf Alfize An Enhanced Pretty Good Privacy (EPGP) System with Mutual Non-Repudiation. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:364-370 [Conf ] Sara Nasser , Sergiu Dascalu , Gregory Vert User Interface Design of the Interactive Fingerprint Recognition (INFIR) System. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:371-377 [Conf ] Arthur Reloj , Gregory Vert Optical Wireless: Chromatic Encoded Visual Data Transfer. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:378-383 [Conf ] Gregory Vert , Nic Herndon Secure Simultaneous Search of Distributed, Heterogeneous Bioinformatics Databases. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:384-389 [Conf ] Amit Mathur , Suneuy Kim , Mark Stamp Role Based Access Control and the JXTA Peer-to-Peer Framework. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:390-398 [Conf ] Christopher Bolan Do No Harm: The Use of RFID Tags in a Medical Environment. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:399-403 [Conf ] Andrew Woodward Data Security and wireless networks: mutually exclusive? [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:404-409 [Conf ] Craig Valli The Insider Threat to Medical Records; Has the Network Age Changed Anything? [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:410-414 [Conf ] Patricia A. H. Williams The Role of Standards in Medical Information Security: An Opportunity for Improvement. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:415-420 [Conf ] Craig Valli SQL Injection - Threats to Medical Systems: The Issues and Countermeasures. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:421-425 [Conf ] Patricia A. H. Williams Security Immunization Using Basic Countermeasures. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:426-434 [Conf ] Gregory Vert , Sergiu M. Dascalu , Frederick C. Harris Jr. , Sermsak Buntha A Visual Environment for Characterization of State Changes in Computer Systems. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:435-440 [Conf ] Ebrahim Khosravi , Brandy Tyson Increasing Security in Mobile Ad Hoc Networks by Incentives to Cooperate and Secure Routing. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:441-447 [Conf ] Jinqiao Yu , Y. V. Ramana Reddy , Sumitra Reddy TRINETR: Facilitating Alerts Analysis and Response Decision Making. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:448-455 [Conf ] Shamila Makki , Wunnava V. Subbarao On Security in TCP/IP over Wireless Network. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:456-461 [Conf ] Okbin Lee , Seongyeol Kim Conference Key Agrement Protocol Employing a Symmetric Balanced Incomplete Block Design. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:462-467 [Conf ] Yoichi Shibata , Masahiro Mimura , Kenta Takahashi , Masakatsu Nishigaki Mechanism-Based PKI - A Real-Time Key Generation from Fingerprints. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:468-474 [Conf ] Cesar Monroy , Rayford B. Vaughn Keeping An Educational Network Healthy: Differentiating Malicious And Naive Students On An Educational Network Environment. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:475-481 [Conf ] Vivek Kumar Sehgal Stochastic Modeling of Worm Propagation in Trusted Networks. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:482-488 [Conf ] Ali Berrached , André de Korvin Reinforcing Access Control Using Fuzzy Relation Equations. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:489-493 [Conf ] Rajarshi Sanyal Framework for realizing Mobile and Computer Communications through Color Signals. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:494-500 [Conf ] Manoj B. Sastry , Michael J. Covington , Deepak J. Manohar Securing Collaborative Applications. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:501-508 [Conf ] Rongzhen Yang , Liang He , Shoufeng Yang , Forni Gary , Fei Liu , Jiayue Chang , Manxue Guo The Value of Hardware-Based Security Solutions and its Architecture for Security Demanding Wireless Services. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:509-514 [Conf ] Bob Thibadeau , Michael Willett Trusted Storage: Focus on Use Cases. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:515-521 [Conf ] Pravesh Gaonjur , Chandradeo Bokhoree Risk of Insider Threats in Information Technology Outsourcing: Can Deceptive Techniques be Applied? [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:522-0 [Conf ]