The SCEAS System
Navigation Menu

Conferences in DBLP

Security and Management (SAM) (csreaSAM)
2003 (conf/csreaSAM/2003-2)

  1. Choon-Han Youn, Marlon E. Pierce, Geoffrey Fox
    Developing Secure Web Services for Computational Portals. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:367-372 [Conf]
  2. Geonlyang Kim, Jung-Chan Na, Seung Won Sohn
    Design of a LDAP Schema Based on Network Security Policy Information Model for Storing Security Policy. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:373-377 [Conf]
  3. Prabhaker Mateti, Sowgandh Sunil Gadi
    Prevention of Buffer Overflow Exploits in IA-32 Based Linux. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:378-384 [Conf]
  4. Kyechan Lee, Kyubum Wee
    Detection of Loadable Kernel Module Rootkit. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:385-389 [Conf]
  5. Maheshkumar Sabhnani, Gürsel Serpen
    Formulation of a Heuristic Rule for Misuse and Anomaly Detection for U2R Attacks in Solaris Operating System Environment. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:390-396 [Conf]
  6. Sang-Kil Park, Jongsoo Jang, BongNam Noh
    Supporting Interoperability to Multi Intrusion Detection System in Secure Networking Framework. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:397-401 [Conf]
  7. Alexander Buchmann, Harald Görl, Sven Lachmund
    Placement of Cryptographic Mechanisms in Operating Systems. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:402-408 [Conf]
  8. Bo-Heung Chung, Jeong-Nyeo Kim, Sung Won Sohn
    Improve Network Security with Kernel-Level Intrusion Detection Sensor. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:409-414 [Conf]
  9. Su-Hong Min, Ok-Ran Jeong, Dong-Sub Cho
    A Web-Based Login System Using the Time Based Password (TBP). [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:415-420 [Conf]
  10. José R. Herrero, David Benlliure
    Operating System Support for Process Confinement. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:421-425 [Conf]
  11. Jong Tak Kim, Chan Koh, Jin Tak Choi
    A Protection of Mobile System in Network Systems. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:426-432 [Conf]
  12. Jongwook Moon, Hakbong Cho, Changseok Choi, Gihyun Jung, Younkwang Jung, Kyunghee Choi
    Accelerating Firewall. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:433-437 [Conf]
  13. Hyunchul Kang, Gil-Haeng Lee, Dae-Ung Kim
    Fault Management Model and Implementation for Customer Network Management. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:438-443 [Conf]
  14. Hye-Young Kim, Hwa-Sun Kim, Heung-Sik Kim, Sang-Gyun Kim, Heung-Kook Choi
    Cyber-Lecture Management System for XML-Based Secondary Education. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:444-448 [Conf]
  15. Jangbok Kim, Hosung Lim, Kyunghee Choi, Gihyun Jung
    A New Architecture for Enhancing the Security of E-Mail System. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:449-454 [Conf]
  16. Taeshik Shon, Jongsub Moon, Cheolwon Lee, Eul-Gyu Im, Jung-Taek Seo
    Safe Patch Distribution Architecture in Intranet Environments. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:455-460 [Conf]
  17. Boleslaw Fabisiak
    Threats, Vulnerabilities and Exposures to Networked Manufacturing Systems. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:461-468 [Conf]
  18. Holly Xiao
    Trust Management for Mobile IPv6 Binding Update. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:469-474 [Conf]
  19. Wonjoo Park, Dong-il Seo, Daeyoung Kim
    The Methods of IPsec Applying Between MN and HA in Mobile IPv6. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:475-478 [Conf]
  20. Yeojin Lee, TaeHoon Lee, Ilyong Chung
    A Secure Mobile Agent System Based on Identity-Based Digital Signature Scheme. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:479-485 [Conf]
  21. Yoe-Sub Shin, Yang-Gyu Kim, Haeng-Seok Ko, Dong-Heyok Jang, TaeJoo Chang, Oh-Seok Kwon
    A Study on the High Crypto-System for the Multi-Sessions. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:486-490 [Conf]
  22. Dong-ho Kang, Dong-il Seo, Jongsoo Jang
    A Study on Bandwidth Consumption DDoS: Attack Defense. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:491-494 [Conf]
  23. Leonardo Mattes, Frank Meylan, Adilson Eduardo Guelfi, João Antonio Zuffo
    Performance Analysis of a Security Manager for Multi-Service Communication Middleware. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:495-501 [Conf]
  24. Misun Kim, Sangjin Park, Youngsong Mun
    QoS Guaranteed Service Model in Mobile IPv6. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:502-507 [Conf]
  25. Sang-Hun Lee, Kyoung-Hwa Do, Kun-Won Jang, Moon-Seog Jun
    VDTS: The Design of Real-Time Virus Detection and Tracing Systems. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:508-513 [Conf]
  26. Bernhard Thurm
    Analysis of Web Service Performance for Network Management. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:514-520 [Conf]
  27. Mira Kwak, Dong-Sub Cho
    Extended Probabilistic Packet Marking Scheme for IP Traceback. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:521-526 [Conf]
  28. Gang Zhu, Jie Dai
    Economic Perspective of Information Security. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:527-533 [Conf]
  29. Shin-Kyung Lee, Tae-wan Kim, Dae-Ung Kim
    The Subscriber Management of CO-LAN Gateway System. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:534-538 [Conf]
  30. Darryl A. White, Ghasem S. Alijani
    Identifying Requirements for Network Security Software. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:539-543 [Conf]
  31. Remus Chua Choong Hee, Jianping Chen, Ben M. Chen
    The Development of Network Security Suite for Windows-Based Servers. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:544-550 [Conf]
  32. Miyoun Yoon, Kiyoung Kim, Yongtae Shin
    Robust Multimedia Authentication in Mobile Multicast Environment. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:551-557 [Conf]
  33. Chung-E Wang
    Simultaneous Data Compression and Encryption. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:558-563 [Conf]
  34. Sang-Hyun Bae, Hae Kyung Seong, Kang Hyeon Rhee
    Color Level Logo Image Watermarking on Multi Color Space. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:564-569 [Conf]
  35. Viktor Bunimov, Manfred Schimmler, Wolfgang Bziuk
    Key Generation for Secure High Speed Communication. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:570-576 [Conf]
  36. Dong-Hwan Shin, Jong-Weon Kim, Jong-Uk Choi
    Semi-Fragile Image Watermarking Based on Block Mean Difference. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:577-583 [Conf]
  37. Simon McNicol, Serdar Boztas
    Randomized Traitor Tracing Algorithms for Broadcast Security. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:584-590 [Conf]
  38. Young-Ho Suh, Won Gyum Kim, Jong-Weon Kim, Chi-Jung Hwang
    Image Fingerprinting with Multi-Bits Watermark. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:591-594 [Conf]
  39. Han Ho Lee, Jung-Soo Lee, Nam Yong Lee, Jong-Weon Kim
    The Fingerprinting Algorithm for Digital Image and Video. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:595-600 [Conf]
  40. Young-Shil Kim, Young-Mi Kim, Seong-Jin Park, Doo-Kwon Baik
    Design and Implementation of Stego WaveK Through Improved Lowbit Encoding Method. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:601-606 [Conf]
  41. Sangwoo Lee, Yun-kyung Lee, Youngsae Kim, Youngsoo Park, Sung-Ik Jun, Kyo-Il Chung
    Implementation of an Elliptic Curve Cryptography Hardware Accelerator for Smart Cards. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:607-610 [Conf]
  42. Soon Hwa Sung, Eunbae Kong
    Efficient Electronic Voting System with Secure Multiparty Fault-Detection Protocol. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:611-617 [Conf]
  43. F. Sang-Ju Song, S. Doo-Sung Lee, T. Sun-Hyung Kim
    Development of Digital Content Viewer with Tracing Capability by Use of the Watermarking Technique. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:618-625 [Conf]
  44. Jong-Weon Kim, Jung-Soo Lee, Jong-Uk Choi
    A New Multi-Layer Copyright Protection by Using Digital Watermarking. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:626-632 [Conf]
  45. Wei-Kuei Chen
    Efficient On-Line Electronic Checks. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:633-636 [Conf]
  46. Tom Coffey, Reiner Dojen, Tomas Flanagan
    On Different Approaches to Establish the Security of Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:637-643 [Conf]
  47. Guillermo A. Francia III, Aditya Kilaru, Le Phuong, Mehul B. Vashi
    A Performance Comparison of Encryption Algorithms. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:644-649 [Conf]
  48. Randy Justice, Sumitra Mukherjee
    Inferential Disclosure Limitation in Multivariate Categorical Databases. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:650-653 [Conf]
  49. Tom Cribb, Asha Rao
    An Information Security Management Model. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:654-657 [Conf]
  50. Scott F. Smith
    Similarity Searches in Computer Security. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:658-662 [Conf]
  51. Willy Susilo, Yi Mu
    On Fail-Stop Verifiable Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:663-667 [Conf]
  52. Willy Susilo, Jianyong Huang, Jennifer Seberry
    On Using Fast Exponentiation Algorithm in PDAs (or: How Secure is the Discrete Logarithm Problem Assumption in PDAs?). [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:668-674 [Conf]
  53. Prashant Dewan, Partha Dasgupta, Vijay Karamcheti
    Defending Against Denial of Service Attacks Using Secure Name Resolution. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:675-681 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002