Conferences in DBLP
Choon-Han Youn , Marlon E. Pierce , Geoffrey Fox Developing Secure Web Services for Computational Portals. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:367-372 [Conf ] Geonlyang Kim , Jung-Chan Na , Seung Won Sohn Design of a LDAP Schema Based on Network Security Policy Information Model for Storing Security Policy. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:373-377 [Conf ] Prabhaker Mateti , Sowgandh Sunil Gadi Prevention of Buffer Overflow Exploits in IA-32 Based Linux. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:378-384 [Conf ] Kyechan Lee , Kyubum Wee Detection of Loadable Kernel Module Rootkit. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:385-389 [Conf ] Maheshkumar Sabhnani , Gürsel Serpen Formulation of a Heuristic Rule for Misuse and Anomaly Detection for U2R Attacks in Solaris Operating System Environment. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:390-396 [Conf ] Sang-Kil Park , Jongsoo Jang , BongNam Noh Supporting Interoperability to Multi Intrusion Detection System in Secure Networking Framework. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:397-401 [Conf ] Alexander Buchmann , Harald Görl , Sven Lachmund Placement of Cryptographic Mechanisms in Operating Systems. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:402-408 [Conf ] Bo-Heung Chung , Jeong-Nyeo Kim , Sung Won Sohn Improve Network Security with Kernel-Level Intrusion Detection Sensor. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:409-414 [Conf ] Su-Hong Min , Ok-Ran Jeong , Dong-Sub Cho A Web-Based Login System Using the Time Based Password (TBP). [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:415-420 [Conf ] José R. Herrero , David Benlliure Operating System Support for Process Confinement. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:421-425 [Conf ] Jong Tak Kim , Chan Koh , Jin Tak Choi A Protection of Mobile System in Network Systems. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:426-432 [Conf ] Jongwook Moon , Hakbong Cho , Changseok Choi , Gihyun Jung , Younkwang Jung , Kyunghee Choi Accelerating Firewall. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:433-437 [Conf ] Hyunchul Kang , Gil-Haeng Lee , Dae-Ung Kim Fault Management Model and Implementation for Customer Network Management. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:438-443 [Conf ] Hye-Young Kim , Hwa-Sun Kim , Heung-Sik Kim , Sang-Gyun Kim , Heung-Kook Choi Cyber-Lecture Management System for XML-Based Secondary Education. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:444-448 [Conf ] Jangbok Kim , Hosung Lim , Kyunghee Choi , Gihyun Jung A New Architecture for Enhancing the Security of E-Mail System. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:449-454 [Conf ] Taeshik Shon , Jongsub Moon , Cheolwon Lee , Eul-Gyu Im , Jung-Taek Seo Safe Patch Distribution Architecture in Intranet Environments. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:455-460 [Conf ] Boleslaw Fabisiak Threats, Vulnerabilities and Exposures to Networked Manufacturing Systems. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:461-468 [Conf ] Holly Xiao Trust Management for Mobile IPv6 Binding Update. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:469-474 [Conf ] Wonjoo Park , Dong-il Seo , Daeyoung Kim The Methods of IPsec Applying Between MN and HA in Mobile IPv6. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:475-478 [Conf ] Yeojin Lee , TaeHoon Lee , Ilyong Chung A Secure Mobile Agent System Based on Identity-Based Digital Signature Scheme. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:479-485 [Conf ] Yoe-Sub Shin , Yang-Gyu Kim , Haeng-Seok Ko , Dong-Heyok Jang , TaeJoo Chang , Oh-Seok Kwon A Study on the High Crypto-System for the Multi-Sessions. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:486-490 [Conf ] Dong-ho Kang , Dong-il Seo , Jongsoo Jang A Study on Bandwidth Consumption DDoS: Attack Defense. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:491-494 [Conf ] Leonardo Mattes , Frank Meylan , Adilson Eduardo Guelfi , João Antonio Zuffo Performance Analysis of a Security Manager for Multi-Service Communication Middleware. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:495-501 [Conf ] Misun Kim , Sangjin Park , Youngsong Mun QoS Guaranteed Service Model in Mobile IPv6. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:502-507 [Conf ] Sang-Hun Lee , Kyoung-Hwa Do , Kun-Won Jang , Moon-Seog Jun VDTS: The Design of Real-Time Virus Detection and Tracing Systems. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:508-513 [Conf ] Bernhard Thurm Analysis of Web Service Performance for Network Management. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:514-520 [Conf ] Mira Kwak , Dong-Sub Cho Extended Probabilistic Packet Marking Scheme for IP Traceback. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:521-526 [Conf ] Gang Zhu , Jie Dai Economic Perspective of Information Security. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:527-533 [Conf ] Shin-Kyung Lee , Tae-wan Kim , Dae-Ung Kim The Subscriber Management of CO-LAN Gateway System. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:534-538 [Conf ] Darryl A. White , Ghasem S. Alijani Identifying Requirements for Network Security Software. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:539-543 [Conf ] Remus Chua Choong Hee , Jianping Chen , Ben M. Chen The Development of Network Security Suite for Windows-Based Servers. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:544-550 [Conf ] Miyoun Yoon , Kiyoung Kim , Yongtae Shin Robust Multimedia Authentication in Mobile Multicast Environment. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:551-557 [Conf ] Chung-E Wang Simultaneous Data Compression and Encryption. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:558-563 [Conf ] Sang-Hyun Bae , Hae Kyung Seong , Kang Hyeon Rhee Color Level Logo Image Watermarking on Multi Color Space. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:564-569 [Conf ] Viktor Bunimov , Manfred Schimmler , Wolfgang Bziuk Key Generation for Secure High Speed Communication. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:570-576 [Conf ] Dong-Hwan Shin , Jong-Weon Kim , Jong-Uk Choi Semi-Fragile Image Watermarking Based on Block Mean Difference. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:577-583 [Conf ] Simon McNicol , Serdar Boztas Randomized Traitor Tracing Algorithms for Broadcast Security. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:584-590 [Conf ] Young-Ho Suh , Won Gyum Kim , Jong-Weon Kim , Chi-Jung Hwang Image Fingerprinting with Multi-Bits Watermark. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:591-594 [Conf ] Han Ho Lee , Jung-Soo Lee , Nam Yong Lee , Jong-Weon Kim The Fingerprinting Algorithm for Digital Image and Video. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:595-600 [Conf ] Young-Shil Kim , Young-Mi Kim , Seong-Jin Park , Doo-Kwon Baik Design and Implementation of Stego WaveK Through Improved Lowbit Encoding Method. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:601-606 [Conf ] Sangwoo Lee , Yun-kyung Lee , Youngsae Kim , Youngsoo Park , Sung-Ik Jun , Kyo-Il Chung Implementation of an Elliptic Curve Cryptography Hardware Accelerator for Smart Cards. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:607-610 [Conf ] Soon Hwa Sung , Eunbae Kong Efficient Electronic Voting System with Secure Multiparty Fault-Detection Protocol. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:611-617 [Conf ] F. Sang-Ju Song , S. Doo-Sung Lee , T. Sun-Hyung Kim Development of Digital Content Viewer with Tracing Capability by Use of the Watermarking Technique. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:618-625 [Conf ] Jong-Weon Kim , Jung-Soo Lee , Jong-Uk Choi A New Multi-Layer Copyright Protection by Using Digital Watermarking. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:626-632 [Conf ] Wei-Kuei Chen Efficient On-Line Electronic Checks. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:633-636 [Conf ] Tom Coffey , Reiner Dojen , Tomas Flanagan On Different Approaches to Establish the Security of Cryptographic Protocols. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:637-643 [Conf ] Guillermo A. Francia III , Aditya Kilaru , Le Phuong , Mehul B. Vashi A Performance Comparison of Encryption Algorithms. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:644-649 [Conf ] Randy Justice , Sumitra Mukherjee Inferential Disclosure Limitation in Multivariate Categorical Databases. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:650-653 [Conf ] Tom Cribb , Asha Rao An Information Security Management Model. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:654-657 [Conf ] Scott F. Smith Similarity Searches in Computer Security. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:658-662 [Conf ] Willy Susilo , Yi Mu On Fail-Stop Verifiable Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:663-667 [Conf ] Willy Susilo , Jianyong Huang , Jennifer Seberry On Using Fast Exponentiation Algorithm in PDAs (or: How Secure is the Discrete Logarithm Problem Assumption in PDAs?). [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:668-674 [Conf ] Prashant Dewan , Partha Dasgupta , Vijay Karamcheti Defending Against Denial of Service Attacks Using Secure Name Resolution. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:675-681 [Conf ]