The SCEAS System
Navigation Menu

Conferences in DBLP

Infrastructure Security (infrasec)
2002 (conf/infrasec/2002)

  1. John Armington, Purdy Ho, Paul Koznek, Richard Martinez
    Biometric Authentication in Infrastructure Security. [Citation Graph (0, 0)][DBLP]
    InfraSec, 2002, pp:1-18 [Conf]
  2. Luciano Rila
    Denial of Access in Biometrics-Based Authentication Systems. [Citation Graph (0, 0)][DBLP]
    InfraSec, 2002, pp:19-29 [Conf]
  3. Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Clemente Galdi
    A Novel Approach to Proactive Password Checking. [Citation Graph (0, 0)][DBLP]
    InfraSec, 2002, pp:30-39 [Conf]
  4. Jan De Clercq
    Single Sign-On Architectures. [Citation Graph (0, 0)][DBLP]
    InfraSec, 2002, pp:40-58 [Conf]
  5. Marco Casassa Mont, Richard Brown
    Active Digital Credentials: Dynamic Provision of Up-to-Date Identity Information. [Citation Graph (0, 0)][DBLP]
    InfraSec, 2002, pp:59-72 [Conf]
  6. Stuart E. Schechter
    How to Buy Better Testing. [Citation Graph (0, 0)][DBLP]
    InfraSec, 2002, pp:73-87 [Conf]
  7. Neil A. McEvoy, Andrew Whitcombe
    Structured Risk Analysis. [Citation Graph (0, 0)][DBLP]
    InfraSec, 2002, pp:88-103 [Conf]
  8. E. S. Siougle, V. C. Zorkadis
    A Model Enabling Law Compliant Privacy Protection through the Selection and Evaluation of Appropriate Security Controls. [Citation Graph (0, 0)][DBLP]
    InfraSec, 2002, pp:104-114 [Conf]
  9. Prakash Reddy, Venky Krishnan, Kan Zhang, Devaraj Das
    Authentication and Authorization of Mobile Clients in Public Data Networks. [Citation Graph (0, 0)][DBLP]
    InfraSec, 2002, pp:115-128 [Conf]
  10. Paulo S. Pagliusi
    A Contemporary Foreword on GSM Security. [Citation Graph (0, 0)][DBLP]
    InfraSec, 2002, pp:129-144 [Conf]
  11. Hyungjong Kim, KyungHee Koh, DongHoon Shin, HongGeun Kim
    Vulnerability Assessment Simulation for Information Infrastructure Protection. [Citation Graph (0, 0)][DBLP]
    InfraSec, 2002, pp:145-161 [Conf]
  12. Ulrich Flegel
    Pseudonymizing Unix Log Files. [Citation Graph (0, 0)][DBLP]
    InfraSec, 2002, pp:162-179 [Conf]
  13. Pascal Fenkam, Harald Gall, Mehdi Jazayeri, Christopher Krügel
    DPS : An Architectural Style for Development of Secure Software. [Citation Graph (0, 0)][DBLP]
    InfraSec, 2002, pp:180-198 [Conf]
  14. Matthias Enzmann, Thomas Kunz, Markus Schneider 0002
    A New Infrastructure for User Tracking Prevention and Privacy Protection in Internet Shopping. [Citation Graph (0, 0)][DBLP]
    InfraSec, 2002, pp:199-213 [Conf]
  15. Óscar Cánovas Reverte, Antonio F. Gómez-Skarmeta, Humberto Martínez Barberá, Gregorio Martínez Pérez
    Different Smartcard-Based Approaches to Physical Access Control. [Citation Graph (0, 0)][DBLP]
    InfraSec, 2002, pp:214-226 [Conf]
  16. Sigrid Gürgens, Peter Ochsenschläger, Carsten Rudolph
    Authenticity and Provability - A Formal Framework. [Citation Graph (0, 0)][DBLP]
    InfraSec, 2002, pp:227-245 [Conf]
  17. Javier Lopez, Juan J. Ortega, José M. Troya
    Protocol Engineering Applied to Formal Analysis of Security Systems. [Citation Graph (0, 0)][DBLP]
    InfraSec, 2002, pp:246-259 [Conf]
  18. L. Chen, Keith Harrison, David Soldera, Nigel P. Smart
    Applications of Multiple Trust Authorities in Pairing Based Cryptosystems. [Citation Graph (0, 0)][DBLP]
    InfraSec, 2002, pp:260-275 [Conf]
  19. Mark Chapman, George I. Davida
    Plausible Deniability Using Automated Linguistic Stegonagraphy. [Citation Graph (0, 0)][DBLP]
    InfraSec, 2002, pp:276-287 [Conf]
  20. Taekyoung Kwon
    Virtual Software Tokens - A Practical Way to Secure PKI Roaming. [Citation Graph (0, 0)][DBLP]
    InfraSec, 2002, pp:288-302 [Conf]
  21. Hyun-Sung Kim, Kee-Young Yoo
    Bit-Serial AOP Arithmetic Architectures over GF (2m). [Citation Graph (0, 0)][DBLP]
    InfraSec, 2002, pp:303-313 [Conf]
  22. William A. Adamson, Olga Kornievskaia
    A Practical Distributed Authorization System for GARA. [Citation Graph (0, 0)][DBLP]
    InfraSec, 2002, pp:314-324 [Conf]
  23. Javier Lopez, José A. Montenegro, Rodrigo Roman, Jorge Davila
    Design of a VPN Software Solution Integrating TCP and UDP Services. [Citation Graph (0, 0)][DBLP]
    InfraSec, 2002, pp:325-338 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002