The SCEAS System
Navigation Menu

Conferences in DBLP

Security and Management (SAM) (csreaSAM)
2004 (conf/csreaSAM/2004)

  1. Binh Q. Nguyen
    A Security Architecture for a Web Portal of Sensitive Archival Records. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:3-8 [Conf]
  2. Wayne A. Jansen, Serban I. Gavrila, Vlad Korolev
    A Unified Framework for Mobile Device Security. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:9-14 [Conf]
  3. Hiep Pham, Zhuhan Jiang
    Ontology-Based Framework for E-Survivability Analysis. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:15-24 [Conf]
  4. Patrick George
    User Authentication with Smart Cards in Trusted Computing Architecture. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:25-31 [Conf]
  5. Anand R. Prasad, Hu Wang
    A Protocol for Secure Seamless Handover. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:32-40 [Conf]
  6. Mary Rossell, Alan D. Ross
    Machine Authentication and Security Compliance. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:41-45 [Conf]
  7. Alan D. Ross, Dennis Morgan
    Malware Mitigation Using Host Intrusion Prevention in the Enterprise. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:46-54 [Conf]
  8. Dennis Heimbigner
    Managing Access Rights for Terminated Employees. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:55-60 [Conf]
  9. Farhan A. Qazi
    A Survey of Biometric Authentication Systems. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:61-67 [Conf]
  10. Soon Hwa Sung, Eunbae Kong
    Byzantine Agreement with Threshold Cryptography in Unknown Networks. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:68-74 [Conf]
  11. M. Ammar Rayes, Michael Cheung
    User Isolation and Policy-Based Security Management. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:75-79 [Conf]
  12. Hiroshi Dozono, Hiroaki Sanada, Masanori Nakakuni, Yoshio Noguchi
    The Analysis of Graffiti Input and Its Application to Personal Identification. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:80-83 [Conf]
  13. Taesung Kim, Sangrae Cho, Seunghun Jin
    Authentication and Authorization for Network Security Service. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:84-88 [Conf]
  14. Alexander Wiesmaier, Marcus Lippert, Vangelis Karatsiolis
    The Key Authority - Secure Key Management in Hierarchical Public Key Infrastructures. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:89-93 [Conf]
  15. Dawei Hong, Shushuang Man, Barbra Hawes, Manton M. Matthews
    A Graphical Password Scheme Strongly Resistant to Spyware. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:94-100 [Conf]
  16. Raghavan Subramanian
    2 Channel Authentication. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:101-108 [Conf]
  17. Carlos Villarrubia, Eduardo Fernández-Medina, Mario Piattini
    Analysis of ISO/IEC 17799: 2000 to be Used in Security Metrics. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:109-117 [Conf]
  18. Jesús Arturo Pérez Díaz, Gerardo Del Valle Torres
    Vulnerabilities in 802.11b Wireless Local Area Networks. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:118-124 [Conf]
  19. Antonio Sarasa Cabezuelo, Daniel Ruiz-Zorrilla Gonzalo, Marcos Muiños Martín
    Secure Business Processes Optimization System. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:125-134 [Conf]
  20. Chunxiao Chigan, Rahul Bandaru
    Towards a Perfect Secure Routing Protocol for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:135-140 [Conf]
  21. Giancarlo Ruffo
    Legal File and Profit Sharing in a Peer to Peer Network. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:141-146 [Conf]
  22. Farookh Khadeer Hussain, Elizabeth Chang, Tharam S. Dillon
    Repute Relationships for Reputation Management in Peer-to-Peer Communication - I. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:147-153 [Conf]
  23. Craig Valli, Peter Wolski
    802.11b Wireless Networks Insecure at Any Speed. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:154-158 [Conf]
  24. Sirisha Medidi, Muralidhar Medidi, Sireesh Gavini, Richard L. Griswold
    Detecting Packet Mishandling in MANETs. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:159-162 [Conf]
  25. Jing Wu, Jennifer Seberry, Tianbing Xia
    Secure IP Multicast for DMS. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:163-167 [Conf]
  26. A. Maslov
    Scenarios for Hijacking Execution Flow of .NET Managed Code. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:168-172 [Conf]
  27. Wonjoon Choi, Byeong-hee Roh, Seung W. Yoo
    Measures for Detecting Network Attacks at the Aggregate Traffic Level on High-Speed Internet Backbone Links. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:173-178 [Conf]
  28. Robert F. Erbacher
    Analysis and Management of Intrusion Data Collection. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:179-185 [Conf]
  29. Brian J. d'Auriol, Kishore Surapaneni
    A State Transition Model Case Study for Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:186-192 [Conf]
  30. V. Chatzigiannakis, G. Androulidakis, Mary Grammatikou, Basil S. Maglaris
    An Architectural Framework for Distributed Intrusion Detection Using Smart Agents. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:193-199 [Conf]
  31. Hiep Pham, Zhuhan Jiang
    Intrusion-Based Survivability Architecture. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:200-206 [Conf]
  32. Luis Sardinha, Nuno Ferreira Neves, Paulo Veríssimo
    Tolerating Intrusions in Grid Systems. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:207-220 [Conf]
  33. Namho Yoo, Hwajung Lee, Hyeong-Ah Choi
    An XML-Based Impact Analysis Using Security Management with IAVN. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:217-220 [Conf]
  34. Regine Endsuleit, Arno Wagner
    Possible Attacks on and Countermeasures for Secure Multi-Agent Computation. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:221-227 [Conf]
  35. Myron Sheu, Le Tang, Ravi Mukkamala
    A Systematic Approach to Security Deployment in a Networking Environment. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:228-234 [Conf]
  36. Albert Ball, Donald G. Cole, Michael L. Nelson
    Testing IPv6 Security. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:235-241 [Conf]
  37. Rodolfo Villarroel, Eduardo Fernández-Medina, Mario Piattini
    General Considerations on Data Warehouse Security. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:242-248 [Conf]
  38. In-Jung Kim, Yoon-Jung Jung, JoongGil Park, Dongho Won
    A Study on Security Risk Modeling over Information and Communication Infrastructure. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:249-253 [Conf]
  39. Sung-Ock Hong, Kyoung-Ja Kim, Tae-Mu Chang
    A Study on CRL Distribution for Response Time Reduction in Distributed OCSP. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:254-257 [Conf]
  40. Yoon-Jung Jung, In-Jung Kim, Namhoon Lee, JoongGil Park
    The Development of Risk Analysis Methodology for Information Asset on Network. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:258-261 [Conf]
  41. Yuhei Kawakoya, Yoichi Muraoka
    Proposal and Implementation of Router-Based Traceback Technique. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:262-266 [Conf]
  42. Ajmal S. Mian, Raja Iqbal
    Experimental Analysis of the Arcanum Key Exchange Protocol. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:267-271 [Conf]
  43. Tarek K. Alameldin, Amitesh Sinha
    Web Spoofing Techniques, Implementation and Solutions. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:272-277 [Conf]
  44. Matt Benke, John Waite, Paul W. Oman, Ahmed Abdel-Rahim
    Survivable Systems Analysis for Real Time Control Systems in Critical Infrastructures. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:278-286 [Conf]
  45. Leon Pan, Chang N. Zhang
    Using Metadata to Protect the Audiovisual Contents in MPEG-7 Applications. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:287-293 [Conf]
  46. Tianbing Xia, Jennifer Seberry, Jing Wu
    Boolean Functions with Good Properties. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:294-299 [Conf]
  47. Yong-Seok Kim, Jun-Cheol Jeon, Jin-woo Jeon, Kee-Young Yoo
    An Efficient Access Control Model Based on User-Classification and Role-Division. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:300-304 [Conf]
  48. Jin Shu, Liu Fengyu, Xu Manwu
    NSPPM: A Node Sampling Approach to Probabilistic Packet Marking-Based IP Traceback. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:305-311 [Conf]
  49. Hee Bong Choi, Jong-Gil Kim, Sang-Yun Han, Mung-Gil Choi, Chun-Soo Kim, Hyoon Jae Lee
    DPA Methods of Smart Cards. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:312-317 [Conf]
  50. Yi-Jung Chen, Dyi-Rong Duh, Hun Yunghsiang Sam Han
    A New Modulo (2n+1) Multiplier for IDEA. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:318-324 [Conf]
  51. Kyoung-Ja Kim, Tae-Mu Chang
    A ZRP Based Reliable Route Discovery Scheme in Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:325-331 [Conf]
  52. Phen-Lan Lin, Juen-Lin Huang, Ting-Jung Chang
    CAPTCHA-Based Anti-Spam Mail Model. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:332-340 [Conf]
  53. Nick Antonopoulos, Tatjana Bitzakidis, Roger M. A. Peel
    ASAM: An Automated System for Authorisation Data Change Management in GRID Environments. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:341-347 [Conf]
  54. Jeff Adams, Ranjit Abbadasari, Ravi Mukkamala
    EZ-Park: An Innovative Secure M-Commerce Application. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:348-352 [Conf]
  55. Yongwha Chung, Byung-Hee Hwang, Woo-Yong Choi, Daesung Moon, Sung Bum Pan, Sang-Hwa Chung
    A Hardware Implementation of Speaker Verification Using Support Vector Machine. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:353-358 [Conf]
  56. Madiha Zafar, S. M. H. Zaidi
    TCP SYN Flood Sensor for Internet Backbone. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:359-364 [Conf]
  57. Vamshi Krishna Venapally, William S. Harrison, Nadine Hanebutte
    KLADS: Unix Based Kernel Level Anomaly Detection System. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:365-368 [Conf]
  58. Mathias Fonkam, Chamraj Bathirappan
    JxPS2 - An Intelligent, Portable and Pluggable Security Service for Web Applications Using Java, XML and JIProlog (Java Internet Prolog). [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:369-375 [Conf]
  59. Patrick R. Merry, Axel W. Krings, Paul W. Oman
    Survivable Systems Analysis of the North American Power Grid Communications Infrastructure. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:376-386 [Conf]
  60. Young-Jun Heo, Keol-Woo Ryu
    Abnormal Traffic Detection for Network Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:387-390 [Conf]
  61. Fariborz Farahmand, Shamkant B. Navathe, Gunter P. Sharp, Philip H. Enslow Jr.
    Data Confidentiality in E-Government and E-Commerce. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:391-394 [Conf]
  62. Ned M. Smith
    A Comparison of the trusted Computing Group Security Model with Clark-Wilson. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:395-401 [Conf]
  63. Najib Saylani
    A Proposal for an Automated Approach to Real Time Profiling of IT Security Compromises. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:402-407 [Conf]
  64. Mun-Kyu Lee, Dowon Hong
    An Efficient Protocol for Mutual Authentication and Key Agreement Using the Subscriber Identity Module. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:408-413 [Conf]
  65. Ghasem S. Alijani, Nam Tran, J. Steven Welsh
    Processing Biometric Information for Smart Cards Using a Dedicated Hash Function. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:414-420 [Conf]
  66. Mira Kwak, Dong-Sub Cho
    Modeling Host Status Transition for Network Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:421-426 [Conf]
  67. Shamila Makki, Niki Pissinou, Hui Huang
    The Security Issues in the Ad-Hoc on Demand Distance Vector Routing Protocol (AODV). [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:427-0 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002