The SCEAS System
Navigation Menu

Conferences in DBLP

Information Security Practice and Experience (ispec)
2005 (conf/ispec/2005)

  1. Stephan Riebach, Erwin P. Rathgeb, Birger Tödtmann
    Risk Assessment of Production Networks Using Honeynets - Some Practical Experience. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:1-12 [Conf]
  2. Philip Robinson, Christian Schaefer, Thomas Walter
    POSSET - Policy-Driven Secure Session Transfer. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:13-24 [Conf]
  3. Debabrata Nayak, Deepak B. Phatak, Ved Prakash Gulati
    Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Method: A Novel Approach. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:25-35 [Conf]
  4. Zhongchao Yu, Chuk-Yang Seng, Tao Jiang, Xue Wu, William A. Arbaugh
    Robust Routing in Malicious Environment for Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:36-47 [Conf]
  5. Patrick P. Tsang, Victor K. Wei
    Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:48-60 [Conf]
  6. Marcel Fernandez, Miguel Soriano, Josep Cotrina Navau
    Tracing Traitors by Guessing Secrets. The q-Ary Case. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:61-73 [Conf]
  7. Heejin Park, Sang-Kil Park, Ki-Ryong Kwon, Dong Kyue Kim
    Probabilistic Analyses on Finding Optimal Combinations of Primality Tests in Real Applications. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:74-84 [Conf]
  8. Mustapha Hedabou, Pierre Pinel, Lucien Bénéteau
    Countermeasures for Preventing Comb Method Against SCA Attacks. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:85-96 [Conf]
  9. Stelios Sidiroglou, John Ioannidis, Angelos D. Keromytis, Salvatore J. Stolfo
    An Email Worm Vaccine Architecture. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:97-108 [Conf]
  10. Bin Liang, Heng Liu, Wenchang Shi, Yanjun Wu
    Enforcing the Principle of Least Privilege with a State-Based Privilege Control Model. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:109-120 [Conf]
  11. Yanjun Wu, Wenchang Shi, Hongliang Liang, Qinghua Shang, Chunyang Yuan, Bin Liang
    Security On-demand Architecture with Multiple Modules Support. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:121-131 [Conf]
  12. Hågen Hasle, Yngve Kristiansen, Ketil Kintel, Einar Snekkenes
    Measuring Resistance to Social Engineering. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:132-143 [Conf]
  13. Frode Hansen, Vladimir A. Oleshchuk
    Conformance Checking of RBAC Policy and its Implementation. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:144-155 [Conf]
  14. Kung Chen, Chih-Mao Huang
    A Practical Aspect Framework for Enforcing Fine-Grained Access Control in Web Applications. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:156-167 [Conf]
  15. Xu Liao, Li Zhang, Stephen Chi-fai Chan
    A Task-Oriented Access Control Model for WfMS. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:168-177 [Conf]
  16. Zonghua Zhang, Hong Shen
    A Brief Observation-Centric Analysis on Anomaly-Based Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:178-191 [Conf]
  17. Rasool Jalili, Fatemeh Imani-Mehr, Morteza Amini, Hamid Reza Shahriari
    Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:192-203 [Conf]
  18. André Adelsbach, Sebastian Gajek, Jörg Schwenk
    Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:204-216 [Conf]
  19. Zhuowei Li, Amitabha Das, Sabu Emmanuel
    Model Redundancy vs. Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:217-229 [Conf]
  20. Kerstin Lemke, Ahmad-Reza Sadeghi, Christian Stüble
    An Open Approach for Designing Secure Electronic Immobilizers. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:230-242 [Conf]
  21. Mikael Linden, Inka Vilpola
    An Empirical Study on the Usability of Logout in a Single Sign-on System. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:243-254 [Conf]
  22. André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi
    Secure Software Delivery and Installation in Embedded Systems. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:255-267 [Conf]
  23. Joseph K. Liu, Duncan S. Wong
    A Restricted Multi-show Credential System and Its Application on E-Voting. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:268-279 [Conf]
  24. Hany A. Samuel, Yasser H. Dakroury, Hussein I. Shahein
    Recard: Using Recommendation Cards Approach for Building Trust in Peer-to-Peer Networks. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:280-292 [Conf]
  25. Wenbao Jiang, Chen Li, Shuang Hao, Yiqi Dai
    Using Trust for Restricted Delegation in Grid Environments. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:293-301 [Conf]
  26. Tao Zhang, Mingzeng Hu, Xiao-chun Yun, Yongzheng Zhang
    Computer Vulnerability Evaluation Using Fault Tree Analysis. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:302-313 [Conf]
  27. Xiaoqin Huang, Lin Chen, Linpeng Huang, Minglu Li
    An Identity-Based Grid Security Infrastructure Model. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:314-325 [Conf]
  28. Ahmad-Reza Sadeghi, Christian Stüble
    Towards Multilateral-Secure DRM Platforms. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:326-337 [Conf]
  29. Chin-Chen Chang, Chun-Sen Tseng, Chia-Chen Lin
    Hiding Data in Binary Images. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:338-349 [Conf]
  30. Yanmei Fang, Limin Gu, Jiwu Huang
    Performance Analysis of CDMA-Based Watermarking with Quantization Scheme. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:350-361 [Conf]
  31. Fangyong Hou, Zhiying Wang, Kui Dai, Yun Liu
    Protecting Mass Data Basing on Small Trusted Agent. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:362-373 [Conf]
  32. Zuowen Tan, Zhuojun Liu, Wang Mingsheng
    On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:374-385 [Conf]
  33. Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
    Token-Controlled Public Key Encryption. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:386-397 [Conf]
  34. Marcel Fernandez, Miguel Soriano, Josep Cotrina Navau
    A New Class of Codes for Fingerprinting Schemes. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:398-409 [Conf]
  35. Qianhong Wu, Bo Qin, Changjie Wang, Xiaofeng Chen, Yumin Wang
    t-Out-of-n String/Bit Oblivious Transfers Revisited. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:410-421 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002