Conferences in DBLP
Hua Wang , Zhongwei Zhang , David Lai Towards an Authentication Protocol for Service Outsourcing Over IP Networks. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:3-9 [Conf ] Jiwei Wei , Zhixin Sun On Intelligent Agent-based Decoy Systems. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:10-16 [Conf ] Michihiro Aoki , Takafumi Hamano , Takeshi Miyasaka , Kentaro Ogawa , Masaaki Inami , Keishi Habara , Shinichiro Chaki Enhancing Security Functionality on Open Router Architecture. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:17-23 [Conf ] Ed Kirkham , Paul Botham redAlert: Data-Mining and Visualisation for IP Data Analysis. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:24-32 [Conf ] Soon Hwa Sung , Eunbae Kong A Distributed Certificate Status Verification Using Mobile Code PSTU(Proactive Self Transaction Unit) of Secure Mobile Agent in PKI(Public Key Infrastructure). [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:33-39 [Conf ] Himanshu Thapliyal , M. B. Srinivas , Hamid R. Arabnia Faster RSA Encryption/Decryption Architecture Using an Efficient High Speed Overlay Multiplier. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:40-44 [Conf ] HyunHee Choi , InJung Kim , Jeong Ryou A Study on Variable Modulo Number Based Public Key Cryptosystem in Mobile Network. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:45-50 [Conf ] Wei-Bin Lee , Jia-Hong Li , Chyi-Ren Dow Efficient Date-Constraint Hierarchical Key Assignment Scheme. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:51-57 [Conf ] Ying Wu , Yongping Zhang , Tianjie Cao Security Analysis of A Proxy Signature Scheme Based on the Elliptic Curve Cryptosystem. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:58-64 [Conf ] Eun-Jun Yoon , Jae-Hyung Jung , Woo-Hun Kim , Kee-Young Yoo A Secret Key Based Authentication Scheme Using Smart Cards. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:65-71 [Conf ] Eun-Jun Yoon , Eun-Kyung Ryu , Woo-Hun Kim , Kee-Young Yoo Cryptanalysis of A Key Authentication Scheme Based on Discrete Logarithms. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:72-78 [Conf ] Karin Sallhammar , Bjarne E. Helvik , Svein J. Knapskog Incorporating Attacker Behavior in Stochastic Models of Security. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:79-85 [Conf ] Guangsen Zhang , Manish Parashar Cooperative Mechanism Against DDoS Attacks. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:86-96 [Conf ] Sergio Caltagirone , Paul Ortman , Sean Melton , David Manz , Kyle King , Paul W. Oman RADICL: A Reconfigurable Attack-Defend Instructional Computing Laboratory. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:97-103 [Conf ] Jin Shu , Liu Fengyu , Xu Manwu Baseline - A Passive Approach to Tolerate and Detect DoS/DDoS Attacks. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:104-110 [Conf ] Henghui Zou , Hengming Zou A Prediction and Early Warning Model for Hacker Attacks. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:111-118 [Conf ] Jonathan Wong , Duncan S. Wong Known Session Key Attack Against a Collection of Signcryption Schemes. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:119-126 [Conf ] HamidReza Haydari , Ali Moeini , MahdiReza Mohajerani An Approach to Reduce False Alarms in an Intrusion Detection System. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:127-132 [Conf ] Brian J. d'Auriol , Afolami Akinsanmi A Conceptual Space Model for Intrusion Detection. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:133-139 [Conf ] Brian J. d'Auriol , Kishore Surapaneni A Computation-Communication Sequencing Model for Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:140-143 [Conf ] Riaz Ahmed Shaikh , Saeed Rajput , S. M. H. Zaidi , Kashif Shairf Enterprise Wide Centralized Logging Mechanism for Application Level Intrusion Detection. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:144-148 [Conf ] Richard A. Wasniowski Intrusion Detection with Agent-Based System. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:149-154 [Conf ] Ramzi El-Haddadeh , Gareth Taylor Novel Congestion-Based Pricing Scheme for QoS-Enabled Networks. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:155-162 [Conf ] Yuqing Zhang , Xiuying Liu , Dengguo Feng An approach to the formal verification of the three-principal security protocols. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:163-169 [Conf ] Gagneja Kanwalinder Jit Kaur Privacy Protocol for Quantum Channel. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:170-175 [Conf ] Brian J. d'Auriol Network Vertical Intrusion Model (NetVIM). [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:176-179 [Conf ] M. D. Kesari , S. D. Sudarsan , T. Velayutham , Manisha Jagadhane , U. Sailaja Information Assurance Security Frameworkfor Enterprise Networks. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:180-186 [Conf ] Dennis Heimbigner Client-Side Deception Using Architectural Degradation. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:187-193 [Conf ] Jinqiao Yu , Y. V. Ramana Reddy , Sentil Selliah , Sumitra Reddy A Knowledge-Based Alert Evaluation and Security Decision Support Framework. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:194-200 [Conf ] Kibaya Erisania , Xie DongQing Designing a Secure Trust Intermediary Service (STIS) for Web Services: a WS-Trust Approach. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:201-207 [Conf ] Richard W. C. Lui , Lucas Chi Kwong Hui , Siu-Ming Yiu , Yan Woo A model to support fine-grained delegation of authorization. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:208-212 [Conf ] Youngho Kim , Jeongnyeo Kim Design of Packet Filtering on Network Processor. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:213-220 [Conf ] Jan vom Brocke , Christian Buddendick Security Awareness Management - Foundations and Implementation of Security Awareness. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:221-227 [Conf ] Robert F. Erbacher , Menashe Garber Real-Time Interactive Visual Port Monitoring and Analysis. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:228-234 [Conf ] Chlotia Posey Garrison Computer Security Awareness of College Students. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:235-240 [Conf ] John Gathegi , Michael Workman Observance and Contravention of Information Security Measures. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:241-247 [Conf ] Guillermo A. Francia III , Keion Clinton Computer Forensic Tools and Techniques. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:248-252 [Conf ] Brian Brammeier , Eltayeb Abuelyaman On The Improvement of XML Web Services Security. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:253-259 [Conf ] Zubair A. Baig Preventing Service Flooding on Internet DNS Servers thru an Application-Level Mechanism: A Performance Analysis. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:260-268 [Conf ] Ganesh Godavari , C. Edward Chow Secure Information Sharing Using Attribute Certificates and Role Based Access Control. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:269-276 [Conf ] Jianwu Zheng , Mingsheng Liu Establishing Trustworthy Terminal with Smart Card. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:277-282 [Conf ] Alexander Bahrushin , Kiseon Kim Rotation and Scaling Invariant Watermarking on Base of a Linear Polar Grid Representation. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:283-289 [Conf ] Hesham Elzouka A Secure and Robust Algorithm for Exchanging Secret Messages. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:290-296 [Conf ] Patrick George , Gérald Maunier Combining User and Platform Trust Properties to Enhance VPN Client Authentication. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:297-303 [Conf ] Dugyu Ryoo , Seonho Kim , Moonseog Jun Role Authentication for Secure DBMS. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:304-312 [Conf ] Alexander Wiesmaier , Mike Fisher , Marcus Lippert , Johannes Buchmann Ouflanking and Securely Using the PIN/TAN-System. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:313-319 [Conf ] Lawrence Chung , Nary Subramanian Reconfirming Change in Secure Software Systems: An Adaptable Security Approach. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:320-326 [Conf ] Yan Woo , Lucas Chi Kwong Hui , K. P. Chow , Siu-Ming Yiu Dynamic Integrity Verification for Software Self-defense. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:327-333 [Conf ] Bogdan Hoanca , Kenrick J. Mock Screen oriented technique for reducing the incidence of shoulder surfing. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:334-340 [Conf ] Ihor V. Vasyltsov , Hee-Kwan Son Redundancy of Check-Point Unit as a Method to Increase the Resistance to Fault Influence in ECC. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:341-347 [Conf ] Eui-nam Huh , Seung-Yeon Lee , Youngsong Mun , Hyunseung Choo An Efficient Authentication Mechanism on Ad-Hoc Telematics Environment. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:348-356 [Conf ] Teik Guan Tan An Enhanced One-Time Password Implementation. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:357-363 [Conf ] Jianyun Xu , Andrew H. Sung , Qingzhong Liu Online Fraud Detection System Based on Non-Stationery Anomaly Detection. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:364-370 [Conf ] Himanshu Thapliyal , M. B. Srinivas , Hamid R. Arabnia Implementation of A Fast Square In RSA Encryption/Decryption Architecture. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:371-374 [Conf ] Jianming Yu , Jun Li A Parallel NIDS Pattern Matching Engine and Its Implementation on Network Processor. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:375-384 [Conf ] Miss Laiha Mat Kiah , Keith M. Martin Group Communication: Design Challenges in the Development of Key Management Frameworks in Wireless Mobile Environments. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:385-391 [Conf ] Tarek K. Alameldin , Saeed Iqbal , Vishal Saberwal Steganography Analysis on Mobile Devices. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:392-397 [Conf ] Wayne A. Jansen , Serban I. Gavrila , Vlad Korolev Proximity-Based Authentication for Mobile Devices. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:398-404 [Conf ] Georgios Kalogridis , Chris J. Mitchell , Gary Clemo Spy Agents: Evaluating Trust in Remote Environments. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:405-411 [Conf ] Wei-Bin Lee , Hsing-Bai Chen , Chyi-Ren Dow Remote User Authentication Scheme with User Anonymity. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:412-420 [Conf ] Zong Chen , Michael Recce Verification of Fingertip Pattern on Gun Handle. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:421-424 [Conf ] Yuan Luo , Marina L. Gavrilova Coarse Fingerprint Matching Based on Singular Points. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:425-433 [Conf ] Zong Chen , Michael Recce Dynamic Handgrip Recognition. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:434-439 [Conf ] Hiroshi Dozono , Daichi Takata , Masanori Nakakuni , Yoshio Noguchi The Analysis of Pen Pressures of Handwritten Symbols on PDA Touch Panel using Self Orgazining Maps. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:440-445 [Conf ] Chikara Ohkubo , Yoichi Muraoka Biometric Authentication Using PKI. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:446-452 [Conf ] Jiann-Liang Chen , Shih-Feng Sun Design of IPv6-Based Mobile Routers for Network Mobility Applications. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:453-459 [Conf ] Fu-Shing Sun , Chun-Hung Tzeng A Learning Model for Intrusion Detection Using Tolerance Relation. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:460-466 [Conf ] Nitin Gupta The changing face of application security: A look at the evolving security infrastructure. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:467-472 [Conf ] Janusz Stoklosa , Jaroslaw Bubicz Compound inversive congruential generator as a source of keys for stream ciphers. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:473-478 [Conf ] Eunjin Ko , Boosun Jeon , Nosam Park , Gilhaeng Lee The Data Handling Method of a Data Dispatcher Module in Web-Based SLA Monitoring and Reporting (WSMR) System. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:479-483 [Conf ] Goo Yeon Lee , Yong Lee , Hwa Jong Kim , Choong Kyo Jeong , Dong Eun Lee Design and Implementation of a Data Sharing Scheme with Security and Flexibility Applicable to Extended P2P Systems. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:484-490 [Conf ] Alexandre Fernandes de Moraes , João Batista Camargo Jr. Biometrics - Evaluating Security Technologies for Brazilian Airports. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:491-496 [Conf ] Ching-Tang Hsieh , Chu-Sheng Cheng , Chih-Hsu Hsu AC/V Segmentation Approach for Mandarin Speech Based on Wavelet Transform. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:497-501 [Conf ] Andrzej Bialas IT Security Modeling. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:502-505 [Conf ] Brian P. Briammeier , Eltayeb Salih Abuelyaman A Spyware Prevention Model: A Proactive Approach. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:506-511 [Conf ] Sung-Yeal Im , Ki-Dong Chung A Study on the Data Encipherment Equipment with Rijndael Algorithm in ATM Network. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:512-517 [Conf ] Mira Kwak , Dong-Sub Cho Host State Representation for Intrusion Detection. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:518-523 [Conf ] Muhammad Almas , Muhammad Younus , Abdul Basit A Linear Dimension Reduction Technique For Face Recognition. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:524-0 [Conf ]