Conferences in DBLP
John Armington , Purdy Ho , Paul Koznek , Richard Martinez Biometric Authentication in Infrastructure Security. [Citation Graph (0, 0)][DBLP ] InfraSec, 2002, pp:1-18 [Conf ] Luciano Rila Denial of Access in Biometrics-Based Authentication Systems. [Citation Graph (0, 0)][DBLP ] InfraSec, 2002, pp:19-29 [Conf ] Carlo Blundo , Paolo D'Arco , Alfredo De Santis , Clemente Galdi A Novel Approach to Proactive Password Checking. [Citation Graph (0, 0)][DBLP ] InfraSec, 2002, pp:30-39 [Conf ] Jan De Clercq Single Sign-On Architectures. [Citation Graph (0, 0)][DBLP ] InfraSec, 2002, pp:40-58 [Conf ] Marco Casassa Mont , Richard Brown Active Digital Credentials: Dynamic Provision of Up-to-Date Identity Information. [Citation Graph (0, 0)][DBLP ] InfraSec, 2002, pp:59-72 [Conf ] Stuart E. Schechter How to Buy Better Testing. [Citation Graph (0, 0)][DBLP ] InfraSec, 2002, pp:73-87 [Conf ] Neil A. McEvoy , Andrew Whitcombe Structured Risk Analysis. [Citation Graph (0, 0)][DBLP ] InfraSec, 2002, pp:88-103 [Conf ] E. S. Siougle , V. C. Zorkadis A Model Enabling Law Compliant Privacy Protection through the Selection and Evaluation of Appropriate Security Controls. [Citation Graph (0, 0)][DBLP ] InfraSec, 2002, pp:104-114 [Conf ] Prakash Reddy , Venky Krishnan , Kan Zhang , Devaraj Das Authentication and Authorization of Mobile Clients in Public Data Networks. [Citation Graph (0, 0)][DBLP ] InfraSec, 2002, pp:115-128 [Conf ] Paulo S. Pagliusi A Contemporary Foreword on GSM Security. [Citation Graph (0, 0)][DBLP ] InfraSec, 2002, pp:129-144 [Conf ] Hyungjong Kim , KyungHee Koh , DongHoon Shin , HongGeun Kim Vulnerability Assessment Simulation for Information Infrastructure Protection. [Citation Graph (0, 0)][DBLP ] InfraSec, 2002, pp:145-161 [Conf ] Ulrich Flegel Pseudonymizing Unix Log Files. [Citation Graph (0, 0)][DBLP ] InfraSec, 2002, pp:162-179 [Conf ] Pascal Fenkam , Harald Gall , Mehdi Jazayeri , Christopher Krügel DPS : An Architectural Style for Development of Secure Software. [Citation Graph (0, 0)][DBLP ] InfraSec, 2002, pp:180-198 [Conf ] Matthias Enzmann , Thomas Kunz , Markus Schneider 0002 A New Infrastructure for User Tracking Prevention and Privacy Protection in Internet Shopping. [Citation Graph (0, 0)][DBLP ] InfraSec, 2002, pp:199-213 [Conf ] Óscar Cánovas Reverte , Antonio F. Gómez-Skarmeta , Humberto Martínez Barberá , Gregorio Martínez Pérez Different Smartcard-Based Approaches to Physical Access Control. [Citation Graph (0, 0)][DBLP ] InfraSec, 2002, pp:214-226 [Conf ] Sigrid Gürgens , Peter Ochsenschläger , Carsten Rudolph Authenticity and Provability - A Formal Framework. [Citation Graph (0, 0)][DBLP ] InfraSec, 2002, pp:227-245 [Conf ] Javier Lopez , Juan J. Ortega , José M. Troya Protocol Engineering Applied to Formal Analysis of Security Systems. [Citation Graph (0, 0)][DBLP ] InfraSec, 2002, pp:246-259 [Conf ] L. Chen , Keith Harrison , David Soldera , Nigel P. Smart Applications of Multiple Trust Authorities in Pairing Based Cryptosystems. [Citation Graph (0, 0)][DBLP ] InfraSec, 2002, pp:260-275 [Conf ] Mark Chapman , George I. Davida Plausible Deniability Using Automated Linguistic Stegonagraphy. [Citation Graph (0, 0)][DBLP ] InfraSec, 2002, pp:276-287 [Conf ] Taekyoung Kwon Virtual Software Tokens - A Practical Way to Secure PKI Roaming. [Citation Graph (0, 0)][DBLP ] InfraSec, 2002, pp:288-302 [Conf ] Hyun-Sung Kim , Kee-Young Yoo Bit-Serial AOP Arithmetic Architectures over GF (2m ). [Citation Graph (0, 0)][DBLP ] InfraSec, 2002, pp:303-313 [Conf ] William A. Adamson , Olga Kornievskaia A Practical Distributed Authorization System for GARA. [Citation Graph (0, 0)][DBLP ] InfraSec, 2002, pp:314-324 [Conf ] Javier Lopez , José A. Montenegro , Rodrigo Roman , Jorge Davila Design of a VPN Software Solution Integrating TCP and UDP Services. [Citation Graph (0, 0)][DBLP ] InfraSec, 2002, pp:325-338 [Conf ]