The SCEAS System
Navigation Menu

Conferences in DBLP

(etrics)
2006 (conf/etrics/2006)

  1. Andreas Pfitzmann
    Multilateral Security: Enabling Technologies and Their Evaluation. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:1-13 [Conf]
  2. Shyong K. Lam, Dan Frankowski, John Riedl
    Do You Trust Your Recommendations? An Exploration of Security and Privacy Issues in Recommender Systems. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:14-29 [Conf]
  3. Martin Wimmer, Martina-Cezara Albutiu, Alfons Kemper
    Optimized Workflow Authorization in Service Oriented Architectures. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:30-44 [Conf]
  4. Francesco Palmieri
    Dynamic Layer-2 VPN Services for Improving Security in the Grid Environment. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:45-59 [Conf]
  5. Esther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda
    A P2P Content Authentication Protocol Based on Byzantine Agreement. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:60-72 [Conf]
  6. Nicolai Kuntze, Andreas U. Schmidt
    Transitive Trust in Mobile Scenarios. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:73-85 [Conf]
  7. Marko Hassinen, Konstantin Hyppönen, Keijo Haataja
    An Open, PKI-Based Mobile Payment System. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:86-100 [Conf]
  8. Young-Sik Hwang, Seung Wan Han, Taek Yong Nam
    Secure Rejoining Scheme for Dynamic Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:101-114 [Conf]
  9. Holger Grandy, Dominik Haneberg, Wolfgang Reif, Kurt Stenzel
    Developing Provable Secure M-Commerce Applications. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:115-129 [Conf]
  10. Dominik Raub, Rainer Steinwandt
    An Algebra for Enterprise Privacy Policies Closed Under Composition and Conjunction. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:130-144 [Conf]
  11. Jim Dowd, Shouhuai Xu, Weining Zhang
    Privacy-Preserving Decision Tree Mining Based on Random Substitutions. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:145-159 [Conf]
  12. Wolfgang Hommel
    Policy-Based Integration of User and Provider-Sided Identity Management. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:160-174 [Conf]
  13. Sven Wohlgemuth, Günter Müller
    Privacy with Delegation of Rights by Identity Management. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:175-190 [Conf]
  14. Sebastian Clauß
    A Framework for Quantification of Linkability Within a Privacy-Enhancing Identity Management System. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:191-205 [Conf]
  15. Stefan Köpsell, Rolf Wendolsky, Hannes Federrath
    Revocable Anonymity. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:206-220 [Conf]
  16. Stefan Köpsell
    Low Latency Anonymous Communication - How Long Are Users Willing to Wait?. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:221-237 [Conf]
  17. Denis Hatebur, Maritta Heisel, Holger Schmidt
    Security Engineering Using Problem Frames. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:238-253 [Conf]
  18. Steffen Kolarczyk, Manuel Koch, Klaus-Peter Löhr, Karl Pauls
    SecTOOL - Supporting Requirements Engineering for Access Control. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:254-267 [Conf]
  19. Dieter Hutter
    Possibilistic Information Flow Control in MAKS and Action Refinement. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:268-281 [Conf]
  20. Ihab Hamadeh, George Kesidis
    Toward a Framework for Forensic Analysis of Scanning Worms. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:282-297 [Conf]
  21. Rainer Böhme
    A Comparison of Market Approaches to Software Vulnerability Disclosure. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:298-311 [Conf]
  22. Woojin Chang
    Reliable Keystroke Biometric System Based on a Small Number of Keystroke Samples. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:312-320 [Conf]
  23. Michael Barnett, David A. Naumann, Wolfram Schulte, Qi Sun
    Allowing State Changes in Specifications. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:321-336 [Conf]
  24. Kathrin Lehmann, Peter Thiemann
    Field Access Analysis for Enforcing Access Control Policies. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:337-351 [Conf]
  25. Paul E. Sevinç, David A. Basin, Ernst-Rüdiger Olderog
    Controlling Access to Documents: A Formal Access Control Model. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:352-367 [Conf]
  26. Jürgen Nützel, Anja Beyer
    How to Increase the Security of Digital Rights Management Systems Without Affecting Consumer's Security. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:368-380 [Conf]
  27. Carsten Hohendorf, Erwin P. Rathgeb, Esbold Unurkhaan, Michael Tüxen
    Secure End-to-End Transport over SCTP. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:381-395 [Conf]
  28. Almudena Alcaide, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda
    An Extended Model of Rational Exchange Based on Dynamic Games of Imperfect Information. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:396-408 [Conf]
  29. Florian Kerschbaum, Orestis Terzidis
    Filtering for Private Collaborative Benchmarking. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:409-422 [Conf]
  30. Fernando Godínez, Dieter Hutter, Raul Monroy
    On the Use of Word Networks to Mimicry Attack Detection. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:423-435 [Conf]
  31. Sebastian Schmerl, Hartmut König, Ulrich Flegel, Michael Meier
    Simplifying Signature Engineering by Reuse. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:436-450 [Conf]
  32. Jun Qian, Chao Xu, Meilin Shi
    Redesign and Implementation of Evaluation Dataset for Intrusion Detection System. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:451-465 [Conf]
  33. Ulrich Flegel, Joachim Biskup
    Requirements of Information Reductions for Cooperating Intrusion Detection Agents. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:466-480 [Conf]
  34. Arthur Schmidt
    Quantum Algorithm for Solving the Discrete Logarithm Problem in the Class Group of an Imaginary Quadratic Field and Security Comparison of Current Cryptosystems at the Beginning of Quantum Computer Age. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:481-493 [Conf]
  35. Marcin Gogolewski, Marek Klonowski, Przemyslaw Kubiak, Miroslaw Kutylowski, Anna Lauks, Filip Zagórski
    Kleptographic Attacks on E-Voting Schemes. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:494-508 [Conf]
  36. Igor Fischer, Thorsten Herfet
    Visual Document Authentication Using Human-Recognizable Watermarks. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:509-521 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002