The SCEAS System
Navigation Menu

Conferences in DBLP

Security and Management (SAM) (csreaSAM)
2005 (conf/csreaSAM/2005)

  1. Hua Wang, Zhongwei Zhang, David Lai
    Towards an Authentication Protocol for Service Outsourcing Over IP Networks. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:3-9 [Conf]
  2. Jiwei Wei, Zhixin Sun
    On Intelligent Agent-based Decoy Systems. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:10-16 [Conf]
  3. Michihiro Aoki, Takafumi Hamano, Takeshi Miyasaka, Kentaro Ogawa, Masaaki Inami, Keishi Habara, Shinichiro Chaki
    Enhancing Security Functionality on Open Router Architecture. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:17-23 [Conf]
  4. Ed Kirkham, Paul Botham
    redAlert: Data-Mining and Visualisation for IP Data Analysis. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:24-32 [Conf]
  5. Soon Hwa Sung, Eunbae Kong
    A Distributed Certificate Status Verification Using Mobile Code PSTU(Proactive Self Transaction Unit) of Secure Mobile Agent in PKI(Public Key Infrastructure). [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:33-39 [Conf]
  6. Himanshu Thapliyal, M. B. Srinivas, Hamid R. Arabnia
    Faster RSA Encryption/Decryption Architecture Using an Efficient High Speed Overlay Multiplier. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:40-44 [Conf]
  7. HyunHee Choi, InJung Kim, Jeong Ryou
    A Study on Variable Modulo Number Based Public Key Cryptosystem in Mobile Network. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:45-50 [Conf]
  8. Wei-Bin Lee, Jia-Hong Li, Chyi-Ren Dow
    Efficient Date-Constraint Hierarchical Key Assignment Scheme. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:51-57 [Conf]
  9. Ying Wu, Yongping Zhang, Tianjie Cao
    Security Analysis of A Proxy Signature Scheme Based on the Elliptic Curve Cryptosystem. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:58-64 [Conf]
  10. Eun-Jun Yoon, Jae-Hyung Jung, Woo-Hun Kim, Kee-Young Yoo
    A Secret Key Based Authentication Scheme Using Smart Cards. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:65-71 [Conf]
  11. Eun-Jun Yoon, Eun-Kyung Ryu, Woo-Hun Kim, Kee-Young Yoo
    Cryptanalysis of A Key Authentication Scheme Based on Discrete Logarithms. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:72-78 [Conf]
  12. Karin Sallhammar, Bjarne E. Helvik, Svein J. Knapskog
    Incorporating Attacker Behavior in Stochastic Models of Security. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:79-85 [Conf]
  13. Guangsen Zhang, Manish Parashar
    Cooperative Mechanism Against DDoS Attacks. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:86-96 [Conf]
  14. Sergio Caltagirone, Paul Ortman, Sean Melton, David Manz, Kyle King, Paul W. Oman
    RADICL: A Reconfigurable Attack-Defend Instructional Computing Laboratory. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:97-103 [Conf]
  15. Jin Shu, Liu Fengyu, Xu Manwu
    Baseline - A Passive Approach to Tolerate and Detect DoS/DDoS Attacks. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:104-110 [Conf]
  16. Henghui Zou, Hengming Zou
    A Prediction and Early Warning Model for Hacker Attacks. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:111-118 [Conf]
  17. Jonathan Wong, Duncan S. Wong
    Known Session Key Attack Against a Collection of Signcryption Schemes. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:119-126 [Conf]
  18. HamidReza Haydari, Ali Moeini, MahdiReza Mohajerani
    An Approach to Reduce False Alarms in an Intrusion Detection System. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:127-132 [Conf]
  19. Brian J. d'Auriol, Afolami Akinsanmi
    A Conceptual Space Model for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:133-139 [Conf]
  20. Brian J. d'Auriol, Kishore Surapaneni
    A Computation-Communication Sequencing Model for Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:140-143 [Conf]
  21. Riaz Ahmed Shaikh, Saeed Rajput, S. M. H. Zaidi, Kashif Shairf
    Enterprise Wide Centralized Logging Mechanism for Application Level Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:144-148 [Conf]
  22. Richard A. Wasniowski
    Intrusion Detection with Agent-Based System. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:149-154 [Conf]
  23. Ramzi El-Haddadeh, Gareth Taylor
    Novel Congestion-Based Pricing Scheme for QoS-Enabled Networks. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:155-162 [Conf]
  24. Yuqing Zhang, Xiuying Liu, Dengguo Feng
    An approach to the formal verification of the three-principal security protocols. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:163-169 [Conf]
  25. Gagneja Kanwalinder Jit Kaur
    Privacy Protocol for Quantum Channel. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:170-175 [Conf]
  26. Brian J. d'Auriol
    Network Vertical Intrusion Model (NetVIM). [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:176-179 [Conf]
  27. M. D. Kesari, S. D. Sudarsan, T. Velayutham, Manisha Jagadhane, U. Sailaja
    Information Assurance Security Frameworkfor Enterprise Networks. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:180-186 [Conf]
  28. Dennis Heimbigner
    Client-Side Deception Using Architectural Degradation. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:187-193 [Conf]
  29. Jinqiao Yu, Y. V. Ramana Reddy, Sentil Selliah, Sumitra Reddy
    A Knowledge-Based Alert Evaluation and Security Decision Support Framework. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:194-200 [Conf]
  30. Kibaya Erisania, Xie DongQing
    Designing a Secure Trust Intermediary Service (STIS) for Web Services: a WS-Trust Approach. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:201-207 [Conf]
  31. Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu, Yan Woo
    A model to support fine-grained delegation of authorization. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:208-212 [Conf]
  32. Youngho Kim, Jeongnyeo Kim
    Design of Packet Filtering on Network Processor. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:213-220 [Conf]
  33. Jan vom Brocke, Christian Buddendick
    Security Awareness Management - Foundations and Implementation of Security Awareness. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:221-227 [Conf]
  34. Robert F. Erbacher, Menashe Garber
    Real-Time Interactive Visual Port Monitoring and Analysis. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:228-234 [Conf]
  35. Chlotia Posey Garrison
    Computer Security Awareness of College Students. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:235-240 [Conf]
  36. John Gathegi, Michael Workman
    Observance and Contravention of Information Security Measures. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:241-247 [Conf]
  37. Guillermo A. Francia III, Keion Clinton
    Computer Forensic Tools and Techniques. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:248-252 [Conf]
  38. Brian Brammeier, Eltayeb Abuelyaman
    On The Improvement of XML Web Services Security. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:253-259 [Conf]
  39. Zubair A. Baig
    Preventing Service Flooding on Internet DNS Servers thru an Application-Level Mechanism: A Performance Analysis. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:260-268 [Conf]
  40. Ganesh Godavari, C. Edward Chow
    Secure Information Sharing Using Attribute Certificates and Role Based Access Control. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:269-276 [Conf]
  41. Jianwu Zheng, Mingsheng Liu
    Establishing Trustworthy Terminal with Smart Card. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:277-282 [Conf]
  42. Alexander Bahrushin, Kiseon Kim
    Rotation and Scaling Invariant Watermarking on Base of a Linear Polar Grid Representation. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:283-289 [Conf]
  43. Hesham Elzouka
    A Secure and Robust Algorithm for Exchanging Secret Messages. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:290-296 [Conf]
  44. Patrick George, Gérald Maunier
    Combining User and Platform Trust Properties to Enhance VPN Client Authentication. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:297-303 [Conf]
  45. Dugyu Ryoo, Seonho Kim, Moonseog Jun
    Role Authentication for Secure DBMS. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:304-312 [Conf]
  46. Alexander Wiesmaier, Mike Fisher, Marcus Lippert, Johannes Buchmann
    Ouflanking and Securely Using the PIN/TAN-System. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:313-319 [Conf]
  47. Lawrence Chung, Nary Subramanian
    Reconfirming Change in Secure Software Systems: An Adaptable Security Approach. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:320-326 [Conf]
  48. Yan Woo, Lucas Chi Kwong Hui, K. P. Chow, Siu-Ming Yiu
    Dynamic Integrity Verification for Software Self-defense. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:327-333 [Conf]
  49. Bogdan Hoanca, Kenrick J. Mock
    Screen oriented technique for reducing the incidence of shoulder surfing. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:334-340 [Conf]
  50. Ihor V. Vasyltsov, Hee-Kwan Son
    Redundancy of Check-Point Unit as a Method to Increase the Resistance to Fault Influence in ECC. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:341-347 [Conf]
  51. Eui-nam Huh, Seung-Yeon Lee, Youngsong Mun, Hyunseung Choo
    An Efficient Authentication Mechanism on Ad-Hoc Telematics Environment. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:348-356 [Conf]
  52. Teik Guan Tan
    An Enhanced One-Time Password Implementation. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:357-363 [Conf]
  53. Jianyun Xu, Andrew H. Sung, Qingzhong Liu
    Online Fraud Detection System Based on Non-Stationery Anomaly Detection. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:364-370 [Conf]
  54. Himanshu Thapliyal, M. B. Srinivas, Hamid R. Arabnia
    Implementation of A Fast Square In RSA Encryption/Decryption Architecture. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:371-374 [Conf]
  55. Jianming Yu, Jun Li
    A Parallel NIDS Pattern Matching Engine and Its Implementation on Network Processor. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:375-384 [Conf]
  56. Miss Laiha Mat Kiah, Keith M. Martin
    Group Communication: Design Challenges in the Development of Key Management Frameworks in Wireless Mobile Environments. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:385-391 [Conf]
  57. Tarek K. Alameldin, Saeed Iqbal, Vishal Saberwal
    Steganography Analysis on Mobile Devices. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:392-397 [Conf]
  58. Wayne A. Jansen, Serban I. Gavrila, Vlad Korolev
    Proximity-Based Authentication for Mobile Devices. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:398-404 [Conf]
  59. Georgios Kalogridis, Chris J. Mitchell, Gary Clemo
    Spy Agents: Evaluating Trust in Remote Environments. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:405-411 [Conf]
  60. Wei-Bin Lee, Hsing-Bai Chen, Chyi-Ren Dow
    Remote User Authentication Scheme with User Anonymity. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:412-420 [Conf]
  61. Zong Chen, Michael Recce
    Verification of Fingertip Pattern on Gun Handle. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:421-424 [Conf]
  62. Yuan Luo, Marina L. Gavrilova
    Coarse Fingerprint Matching Based on Singular Points. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:425-433 [Conf]
  63. Zong Chen, Michael Recce
    Dynamic Handgrip Recognition. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:434-439 [Conf]
  64. Hiroshi Dozono, Daichi Takata, Masanori Nakakuni, Yoshio Noguchi
    The Analysis of Pen Pressures of Handwritten Symbols on PDA Touch Panel using Self Orgazining Maps. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:440-445 [Conf]
  65. Chikara Ohkubo, Yoichi Muraoka
    Biometric Authentication Using PKI. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:446-452 [Conf]
  66. Jiann-Liang Chen, Shih-Feng Sun
    Design of IPv6-Based Mobile Routers for Network Mobility Applications. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:453-459 [Conf]
  67. Fu-Shing Sun, Chun-Hung Tzeng
    A Learning Model for Intrusion Detection Using Tolerance Relation. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:460-466 [Conf]
  68. Nitin Gupta
    The changing face of application security: A look at the evolving security infrastructure. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:467-472 [Conf]
  69. Janusz Stoklosa, Jaroslaw Bubicz
    Compound inversive congruential generator as a source of keys for stream ciphers. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:473-478 [Conf]
  70. Eunjin Ko, Boosun Jeon, Nosam Park, Gilhaeng Lee
    The Data Handling Method of a Data Dispatcher Module in Web-Based SLA Monitoring and Reporting (WSMR) System. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:479-483 [Conf]
  71. Goo Yeon Lee, Yong Lee, Hwa Jong Kim, Choong Kyo Jeong, Dong Eun Lee
    Design and Implementation of a Data Sharing Scheme with Security and Flexibility Applicable to Extended P2P Systems. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:484-490 [Conf]
  72. Alexandre Fernandes de Moraes, João Batista Camargo Jr.
    Biometrics - Evaluating Security Technologies for Brazilian Airports. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:491-496 [Conf]
  73. Ching-Tang Hsieh, Chu-Sheng Cheng, Chih-Hsu Hsu
    AC/V Segmentation Approach for Mandarin Speech Based on Wavelet Transform. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:497-501 [Conf]
  74. Andrzej Bialas
    IT Security Modeling. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:502-505 [Conf]
  75. Brian P. Briammeier, Eltayeb Salih Abuelyaman
    A Spyware Prevention Model: A Proactive Approach. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:506-511 [Conf]
  76. Sung-Yeal Im, Ki-Dong Chung
    A Study on the Data Encipherment Equipment with Rijndael Algorithm in ATM Network. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:512-517 [Conf]
  77. Mira Kwak, Dong-Sub Cho
    Host State Representation for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:518-523 [Conf]
  78. Muhammad Almas, Muhammad Younus, Abdul Basit
    A Linear Dimension Reduction Technique For Face Recognition. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:524-0 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002