|
Conferences in DBLP
- Sabrina De Capitani di Vimercati, Pierangela Samarati
Privacy in the Electronic Society. [Citation Graph (0, 0)][DBLP] ICISS, 2006, pp:1-21 [Conf]
- Vipin Swarup, Len Seligman, Arnon Rosenthal
A Data Sharing Agreement Framework. [Citation Graph (0, 0)][DBLP] ICISS, 2006, pp:22-36 [Conf]
- Luke St. Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel, Trent Jaeger
Password Exhaustion: Predicting the End of Password Usefulness. [Citation Graph (0, 0)][DBLP] ICISS, 2006, pp:37-55 [Conf]
- Kulesh Shanmugasundaram, Nasir D. Memon
Network Monitoring for Security and Forensics. [Citation Graph (0, 0)][DBLP] ICISS, 2006, pp:56-70 [Conf]
- Navdeep Kaur, Rajwinder Singh, Manoj Misra, Anil Kumar Sarje
Fairness Strategy for Multilevel Secure Concurrency Control Protocol. [Citation Graph (0, 0)][DBLP] ICISS, 2006, pp:71-85 [Conf]
- Joachim Biskup, Joerg Parthe
Optimistic Anonymous Participation in Inter-organizational Workflow Instances. [Citation Graph (0, 0)][DBLP] ICISS, 2006, pp:86-100 [Conf]
- Frédéric Cuppens, Nora Cuppens-Boulahia, Céline Coma
O2O: Virtual Private Organizations to Manage Security Policy Interoperability. [Citation Graph (0, 0)][DBLP] ICISS, 2006, pp:101-115 [Conf]
- Kevin R. B. Butler, William Enck, Jennifer Plasterr, Patrick Traynor, Patrick McDaniel
Privacy Preserving Web-Based Email. [Citation Graph (0, 0)][DBLP] ICISS, 2006, pp:116-131 [Conf]
- Amir Reza Masoumzadeh, Morteza Amini, Rasool Jalili
Context-Aware Provisional Access Control. [Citation Graph (0, 0)][DBLP] ICISS, 2006, pp:132-146 [Conf]
- Indrakshi Ray, Mahendra Kumar, Lijun Yu
LRBAC: A Location-Aware Role-Based Access Control Model. [Citation Graph (0, 0)][DBLP] ICISS, 2006, pp:147-161 [Conf]
- Ernesto Damiani, Sabrina De Capitani di Vimercati, Cristiano Fugazza, Pierangela Samarati
Extending Context Descriptions in Semantics-Aware Access Control. [Citation Graph (0, 0)][DBLP] ICISS, 2006, pp:162-176 [Conf]
- N. V. Narendra Kumar, R. K. Shyamasundar
Specification and Realization of Access Control in SPKI/SDSI. [Citation Graph (0, 0)][DBLP] ICISS, 2006, pp:177-193 [Conf]
- Mounita Saha, Dipanwita Roy Chowdhury
Design of Key Establishment Protocol Using One-Way Functions to Avert insider-replay Attack. [Citation Graph (0, 0)][DBLP] ICISS, 2006, pp:194-204 [Conf]
- Praveen Kumar Vadnala, Anish Mathuria
An Efficient Key Assignment Scheme for Access Control in a Hierarchy. [Citation Graph (0, 0)][DBLP] ICISS, 2006, pp:205-219 [Conf]
- Purificación Sáiz, Jon Matías, Eduardo Jacob, Javier Bustamante, Armando Astarloa
Adaptation of IEEE 802.1X for Secure Session Establishment Between Ethernet Peers. [Citation Graph (0, 0)][DBLP] ICISS, 2006, pp:220-234 [Conf]
- L. Chaithanya, M. P. Singh, M. M. Gore
Secure Data Management in Reactive Sensor Networks. [Citation Graph (0, 0)][DBLP] ICISS, 2006, pp:235-248 [Conf]
- Andreas Ekelhart, Stefan Fenz, Markus D. Klemen, Edgar R. Weippl
Security Ontology: Simulating Threats to Corporate Assets. [Citation Graph (0, 0)][DBLP] ICISS, 2006, pp:249-259 [Conf]
- Amlan Kundu, Shamik Sural, Arun K. Majumdar
Two-Stage Credit Card Fraud Detection Using Sequence Alignment. [Citation Graph (0, 0)][DBLP] ICISS, 2006, pp:260-275 [Conf]
- D. Krishna Sandeep Reddy, Subrat Kumar Dash, Arun K. Pujari
New Malicious Code Detection Using Variable Length n-grams. [Citation Graph (0, 0)][DBLP] ICISS, 2006, pp:276-288 [Conf]
- Wanyu Zang, Meng Yu
A Dead-Lock Free Self-healing Algorithm for Distributed Transactional Processes. [Citation Graph (0, 0)][DBLP] ICISS, 2006, pp:289-302 [Conf]
- Hossein Ghodosi
An Efficient Public Key Cryptosystem Secure Against Chosen Ciphertext Attack. [Citation Graph (0, 0)][DBLP] ICISS, 2006, pp:303-314 [Conf]
- Y. V. Subba Rao, Abhijit Mitra, S. R. Mahadeva Prasanna
A Partial Image Encryption Method with Pseudo Random Sequences. [Citation Graph (0, 0)][DBLP] ICISS, 2006, pp:315-325 [Conf]
- Hyeran Lee, Kyung Hyune Rhee
High Capacity Lossless Data Hiding. [Citation Graph (0, 0)][DBLP] ICISS, 2006, pp:326-336 [Conf]
- Vartika Singh, D. R. Lakshminarasimhaiah, Yogesh Mishra, Chitra Viswanathan, G. Athithan
An Implementation and Evaluation of Online Disk Encryption for Windows Systems. [Citation Graph (0, 0)][DBLP] ICISS, 2006, pp:337-348 [Conf]
- Haibing Lu, Yingjiu Li, Xintao Wu
Disclosure Risk in Dynamic Two-Dimensional Contingency Tables (Extended Abstract). [Citation Graph (0, 0)][DBLP] ICISS, 2006, pp:349-352 [Conf]
- Anirban Majumdar, Clark D. Thomborson, Stephen Drape
A Survey of Control-Flow Obfuscations. [Citation Graph (0, 0)][DBLP] ICISS, 2006, pp:353-356 [Conf]
- Weiwei Yuan, Donghai Guan, Sungyoung Lee, Young-Koo Lee, Heejo Lee
Filtering Out Unfair Recommendations for Trust Model in Ubiquitous Environments. [Citation Graph (0, 0)][DBLP] ICISS, 2006, pp:357-360 [Conf]
- Rajwinder Singh, Navdeep Kaur, Anil Kumar Sarje
Secure Itineraries Framework for Mobile Agent Systems. [Citation Graph (0, 0)][DBLP] ICISS, 2006, pp:361-364 [Conf]
- Shyam K. Gupta, Vikram Goyal, Anand Gupta
Malafide Intension Based Detection of Privacy Violation in Information System. [Citation Graph (0, 0)][DBLP] ICISS, 2006, pp:365-368 [Conf]
- Shyam K. Gupta, Vikram Goyal, Bholi Patra, Sankalp Dubey, Anand Gupta
Design and Development of Malafide Intension Based Privacy Violation Detection System (An Ongoing Research Report). [Citation Graph (0, 0)][DBLP] ICISS, 2006, pp:369-372 [Conf]
- Anirban Sengupta, Mridul Sankar Barik
Towards a Formal Specification Method for Enterprise Information System Security. [Citation Graph (0, 0)][DBLP] ICISS, 2006, pp:373-376 [Conf]
- Alex Gurevich, Ehud Gudes
Recent Research on Privacy Preserving Data Mining. [Citation Graph (0, 0)][DBLP] ICISS, 2006, pp:377-380 [Conf]
|