The SCEAS System
Navigation Menu

Conferences in DBLP

Security and Management (SAM) (csreaSAM)
2006 (conf/csreaSAM/2006)

  1. Rune Gustavsson
    Ensuring Dependability in Service Oriented Computing. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:3-11 [Conf]
  2. Kenichi Takahashi, Kouichi Sakurai
    A Framework for the User-Oriented Personal Information Protection. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:12-19 [Conf]
  3. Andrzej Bialas
    A Semiformal Approach to the Security Problem of the Target of Evaluation (TOE) Modeling. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:19-25 [Conf]
  4. Norbik Bashah Idris, Bharanidharan Shanmugam
    Novel Attack Detection Using Fuzzy Logic and Data Mining. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:26-31 [Conf]
  5. Omer Mahmood
    Custom Plugin - A Solution to Phishing and Pharming Attacks. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:32-37 [Conf]
  6. Eunjin Ko, Yongsun Ryu, Gilhaeng Lee, Youngsun Kim
    The Fault Detecting Method for Supporting SLA Fault Metrics of IPTV Service. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:38-43 [Conf]
  7. Guannan Gong, Liang Hu, Kuo Zhao, Jinxin He, Yuefeng Xu, Ying Duan
    SPS-VN: Research on the Security Policy System for Virtual Network. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:44-47 [Conf]
  8. Gang Shin Lee, Mi-Hyun Ahn, Ho-Seong Kim, Jae-il Lee
    The Information Security Guideline for SMEs in Korea. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:48-56 [Conf]
  9. Shahram Latifi, Nimalan Solayappan
    A Survey of Unimodal Biometric Methods. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:57-63 [Conf]
  10. Hesham Elzouka
    A New Robust and Secure Steganographic System for Greyscale Images. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:64-71 [Conf]
  11. Kevin Daimi, Katherine Snyder
    Security Requirements for Multimodal Biometric Systems. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:72-77 [Conf]
  12. Yoshifumi Ueshige, Kouichi Sakurai
    A Proposal of One-Time Biometric Authentication. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:78-83 [Conf]
  13. Xuan-Hien Dang, Krishna C. S. Kota
    Case Study: An Implementation of a Secure Steganographic System. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:84-90 [Conf]
  14. Jonathan White, Dale Thompson
    Using Synthetic Decoys to Digitally Watermark Personally-Identifying Data and to Promote Data Security. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:91-99 [Conf]
  15. Hiroshi Dozono, Yoshio Noguchi, Masanori Nakakuni, Hisao Tokushima
    The Analyses of Key Stroke Timings using Self Organizing Maps and its Application to Authentication. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:100-105 [Conf]
  16. Kun-Won Jang, Chan-Kil Park, Jung-jae Kim, Moon-Seog Jun
    A Study on DRM System for On/Off Line Key Authentication. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:106-111 [Conf]
  17. Wilfrid Mirville, Jamie Kobie, Michael Nelson
    MRAS: A Multi-Layered Remote Authentication System. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:112-117 [Conf]
  18. Jinxin He, Gaochao Xu, Zhiguo Zhou, Guannan Gong
    A New Approach For Source Authentication Of Multicast Data. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:118-121 [Conf]
  19. Huang-Ju Chen, Jyh-Ming Huang, Lei Wang
    Efficient and Secure Authentication Protocols for Mobile VoIP Communications. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:122-128 [Conf]
  20. Hao Wang, Zhongfu Wu, Xin Tan
    A New Secure Authentication Scheme Based Threshold ECDSA For Wireless Sensor Network. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:129-133 [Conf]
  21. Haibo Tian, Yumin Wang
    Security Analysis of the Digital Transmission Copy Protection Specification. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:134-137 [Conf]
  22. Zemao Zhao, Xiangxong Tang, Bin Li, Longhai Zhu
    An ID-based Anonymous Proxy Signature From Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:138-144 [Conf]
  23. Danilo Gligoroski, Svein J. Knapskog, Suzana Andova
    Cryptcoding - Encryption and Error-Correction Coding in a Single Step. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:145-151 [Conf]
  24. Levent Ertaul, Vaidehi Kedlaya
    Finding Minimum Optimal Path Securely Using Homomorphic Encryption Schemes in Computer Networks. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:152-158 [Conf]
  25. Li Lu, Lei Hu
    Pairing-Based Multi-Recipient Public Key Encryption. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:159-165 [Conf]
  26. Sughyuck Hong, Noé Lopez-Benitez
    Enhanced Group Key Generation Protocol. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:166-171 [Conf]
  27. Levent Ertaul, Jayalalitha Panda
    Mobile Agent Security. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:172-178 [Conf]
  28. Mykola Karpinskyy, Lesya Vasylkiv, Marcin Gizycki
    Secret Key Leakage Caused by Hamming-weight Timing Analysis on Modular Exponentiation. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:179-185 [Conf]
  29. Tae Ho Kim, Jong Jin Kim, Chang Hoon Kim, Chun Pyo Hong
    Flexible Cryptographic Component Design for Secure Web Applications. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:186-192 [Conf]
  30. Norbert Lehmann, Reinhard Schwarz, Jörg Keller
    FireCrocodile: A Checker for Static Firewall Configurations. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:193-199 [Conf]
  31. Hongmei Deng, Roger Xu, Frank Zhang, Chiman Kwan, Leonard Haynes
    Agent-based Distributed Intrusion Detection Methodology for MANETs. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:200-206 [Conf]
  32. Grant A. Jacoby, Thadeus Hickman, Stuart Warders, Barak Griffin, Aaron Darensburg, Daniel Castle
    Gibraltar: A Mobile Host-Based Intrusion Protection System. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:207-212 [Conf]
  33. Thawatchai Chomsiri, Chotipat Pornavalai
    Firewall Rules Analysis. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:213-219 [Conf]
  34. Shuangbao Wang, Fengjing Shao, Robert S. Ledley
    Connputer - A Framework of Intrusion-Free Secure Computer Architecture. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:220-225 [Conf]
  35. Wen Ouyang, Kun-Ming Yu, Wen-Ping Lee
    Design and Implementation of a High-Performance Active Network Security System. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:226-232 [Conf]
  36. Omer Demir, Ping Ji, Jinwoo Kim
    Session Based Logging (SBL) for IP-Traceback on Network Forensics. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:233-239 [Conf]
  37. Richard Wasniowski
    Network Intrusion Detection System with Data Mart. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:240-244 [Conf]
  38. Jun Qian, Chao Xu, Meilin Shi
    Remodeling and Simulation of Intrusion Detection Evaluation Dataset. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:245-251 [Conf]
  39. Johnnes Arreymbi
    Modelling to Enhance GSM Network Security. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:252-260 [Conf]
  40. Kuo Zhao, Liang Hu, Guannan Gong, Meng Zhang, Kexin Yang
    Comparison of Two Sampling-Based Data Collection Mechanisms for Intrusion Detection System. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:261-265 [Conf]
  41. Hsun-Jung Cho, Li-Yen Hsu
    Integrating the Generalized-Honeycomb-Torus for Sustainable Parking Structures in the Globalizing Age. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:266-271 [Conf]
  42. Yan-ning Huang, Yong Jiang
    Firewall Design: Understandable, Designable and Testable. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:272-278 [Conf]
  43. Anil Kumar Venkataiahgari, Mourad Debbabi, J. William Atwood
    Secure E-commerce Protection Profile. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:279-285 [Conf]
  44. Pierre K. Y. Lai, Siu-Ming Yiu, K. P. Chow, C. F. Chong, Lucas Chi Kwong Hui
    An Efficient Bloom Filter Based Solution for Multiparty Private Matching. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:286-292 [Conf]
  45. Mohammad Chowdhury, Bon Sy, Rasheed Ahmad
    Application of Gaussian Estimation for Devising Reliable Vulnerability Assessment on SIP-based VoIP Infrastructure. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:293-299 [Conf]
  46. Jörg Keller, Tobias Eggendorfer
    Combining SMTP and HTTP tar Pits to Proactively Reduce Spam. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:300-306 [Conf]
  47. Dongwan Shin
    Modeling Role-based Trust and Authority in Open Environments. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:307-313 [Conf]
  48. Li-Yen Hsu, Shin-Shin Kao
    Developing Dual-Surveillance Based Vehicle Security Management with Generalized Honeycomb Tori. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:314-320 [Conf]
  49. Bernard Kaddour, Joël Quinqueton
    Using Aspects and Compilation Techniques to Dynamically Manage Applications. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:321-327 [Conf]
  50. Michael LeMay, Jack Tan
    Acoustic Surveillance of Physically Unmodified PCs. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:328-334 [Conf]
  51. Xiaodong Yuan, Dajiong Yue
    Software Vaccine Technique and Its Application in Early Virus. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:335-340 [Conf]
  52. Jianwu Zheng, Mingsheng Liu, Hui Liu
    On Achieving Trustworthy SOA-Based Web Services. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:341-350 [Conf]
  53. Satish Baddelpeli, Gregory Vert
    Adaptive Security Metrics for Computer Systems. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:351-356 [Conf]
  54. Rajasekhar Yakkali, Gregory Vert
    Architectural Framework Design for Authentication Mechanism in Mobile Adhoc Networks (MANETs). [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:357-363 [Conf]
  55. Gregory Vert, Manaf Alfize
    An Enhanced Pretty Good Privacy (EPGP) System with Mutual Non-Repudiation. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:364-370 [Conf]
  56. Sara Nasser, Sergiu Dascalu, Gregory Vert
    User Interface Design of the Interactive Fingerprint Recognition (INFIR) System. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:371-377 [Conf]
  57. Arthur Reloj, Gregory Vert
    Optical Wireless: Chromatic Encoded Visual Data Transfer. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:378-383 [Conf]
  58. Gregory Vert, Nic Herndon
    Secure Simultaneous Search of Distributed, Heterogeneous Bioinformatics Databases. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:384-389 [Conf]
  59. Amit Mathur, Suneuy Kim, Mark Stamp
    Role Based Access Control and the JXTA Peer-to-Peer Framework. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:390-398 [Conf]
  60. Christopher Bolan
    Do No Harm: The Use of RFID Tags in a Medical Environment. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:399-403 [Conf]
  61. Andrew Woodward
    Data Security and wireless networks: mutually exclusive? [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:404-409 [Conf]
  62. Craig Valli
    The Insider Threat to Medical Records; Has the Network Age Changed Anything? [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:410-414 [Conf]
  63. Patricia A. H. Williams
    The Role of Standards in Medical Information Security: An Opportunity for Improvement. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:415-420 [Conf]
  64. Craig Valli
    SQL Injection - Threats to Medical Systems: The Issues and Countermeasures. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:421-425 [Conf]
  65. Patricia A. H. Williams
    Security Immunization Using Basic Countermeasures. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:426-434 [Conf]
  66. Gregory Vert, Sergiu M. Dascalu, Frederick C. Harris Jr., Sermsak Buntha
    A Visual Environment for Characterization of State Changes in Computer Systems. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:435-440 [Conf]
  67. Ebrahim Khosravi, Brandy Tyson
    Increasing Security in Mobile Ad Hoc Networks by Incentives to Cooperate and Secure Routing. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:441-447 [Conf]
  68. Jinqiao Yu, Y. V. Ramana Reddy, Sumitra Reddy
    TRINETR: Facilitating Alerts Analysis and Response Decision Making. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:448-455 [Conf]
  69. Shamila Makki, Wunnava V. Subbarao
    On Security in TCP/IP over Wireless Network. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:456-461 [Conf]
  70. Okbin Lee, Seongyeol Kim
    Conference Key Agrement Protocol Employing a Symmetric Balanced Incomplete Block Design. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:462-467 [Conf]
  71. Yoichi Shibata, Masahiro Mimura, Kenta Takahashi, Masakatsu Nishigaki
    Mechanism-Based PKI - A Real-Time Key Generation from Fingerprints. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:468-474 [Conf]
  72. Cesar Monroy, Rayford B. Vaughn
    Keeping An Educational Network Healthy: Differentiating Malicious And Naive Students On An Educational Network Environment. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:475-481 [Conf]
  73. Vivek Kumar Sehgal
    Stochastic Modeling of Worm Propagation in Trusted Networks. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:482-488 [Conf]
  74. Ali Berrached, André de Korvin
    Reinforcing Access Control Using Fuzzy Relation Equations. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:489-493 [Conf]
  75. Rajarshi Sanyal
    Framework for realizing Mobile and Computer Communications through Color Signals. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:494-500 [Conf]
  76. Manoj B. Sastry, Michael J. Covington, Deepak J. Manohar
    Securing Collaborative Applications. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:501-508 [Conf]
  77. Rongzhen Yang, Liang He, Shoufeng Yang, Forni Gary, Fei Liu, Jiayue Chang, Manxue Guo
    The Value of Hardware-Based Security Solutions and its Architecture for Security Demanding Wireless Services. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:509-514 [Conf]
  78. Bob Thibadeau, Michael Willett
    Trusted Storage: Focus on Use Cases. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:515-521 [Conf]
  79. Pravesh Gaonjur, Chandradeo Bokhoree
    Risk of Insider Threats in Information Technology Outsourcing: Can Deceptive Techniques be Applied? [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:522-0 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002