|
Conferences in DBLP
- Stephan Riebach, Erwin P. Rathgeb, Birger Tödtmann
Risk Assessment of Production Networks Using Honeynets - Some Practical Experience. [Citation Graph (0, 0)][DBLP] ISPEC, 2005, pp:1-12 [Conf]
- Philip Robinson, Christian Schaefer, Thomas Walter
POSSET - Policy-Driven Secure Session Transfer. [Citation Graph (0, 0)][DBLP] ISPEC, 2005, pp:13-24 [Conf]
- Debabrata Nayak, Deepak B. Phatak, Ved Prakash Gulati
Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Method: A Novel Approach. [Citation Graph (0, 0)][DBLP] ISPEC, 2005, pp:25-35 [Conf]
- Zhongchao Yu, Chuk-Yang Seng, Tao Jiang, Xue Wu, William A. Arbaugh
Robust Routing in Malicious Environment for Ad Hoc Networks. [Citation Graph (0, 0)][DBLP] ISPEC, 2005, pp:36-47 [Conf]
- Patrick P. Tsang, Victor K. Wei
Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation. [Citation Graph (0, 0)][DBLP] ISPEC, 2005, pp:48-60 [Conf]
- Marcel Fernandez, Miguel Soriano, Josep Cotrina Navau
Tracing Traitors by Guessing Secrets. The q-Ary Case. [Citation Graph (0, 0)][DBLP] ISPEC, 2005, pp:61-73 [Conf]
- Heejin Park, Sang-Kil Park, Ki-Ryong Kwon, Dong Kyue Kim
Probabilistic Analyses on Finding Optimal Combinations of Primality Tests in Real Applications. [Citation Graph (0, 0)][DBLP] ISPEC, 2005, pp:74-84 [Conf]
- Mustapha Hedabou, Pierre Pinel, Lucien Bénéteau
Countermeasures for Preventing Comb Method Against SCA Attacks. [Citation Graph (0, 0)][DBLP] ISPEC, 2005, pp:85-96 [Conf]
- Stelios Sidiroglou, John Ioannidis, Angelos D. Keromytis, Salvatore J. Stolfo
An Email Worm Vaccine Architecture. [Citation Graph (0, 0)][DBLP] ISPEC, 2005, pp:97-108 [Conf]
- Bin Liang, Heng Liu, Wenchang Shi, Yanjun Wu
Enforcing the Principle of Least Privilege with a State-Based Privilege Control Model. [Citation Graph (0, 0)][DBLP] ISPEC, 2005, pp:109-120 [Conf]
- Yanjun Wu, Wenchang Shi, Hongliang Liang, Qinghua Shang, Chunyang Yuan, Bin Liang
Security On-demand Architecture with Multiple Modules Support. [Citation Graph (0, 0)][DBLP] ISPEC, 2005, pp:121-131 [Conf]
- Hågen Hasle, Yngve Kristiansen, Ketil Kintel, Einar Snekkenes
Measuring Resistance to Social Engineering. [Citation Graph (0, 0)][DBLP] ISPEC, 2005, pp:132-143 [Conf]
- Frode Hansen, Vladimir A. Oleshchuk
Conformance Checking of RBAC Policy and its Implementation. [Citation Graph (0, 0)][DBLP] ISPEC, 2005, pp:144-155 [Conf]
- Kung Chen, Chih-Mao Huang
A Practical Aspect Framework for Enforcing Fine-Grained Access Control in Web Applications. [Citation Graph (0, 0)][DBLP] ISPEC, 2005, pp:156-167 [Conf]
- Xu Liao, Li Zhang, Stephen Chi-fai Chan
A Task-Oriented Access Control Model for WfMS. [Citation Graph (0, 0)][DBLP] ISPEC, 2005, pp:168-177 [Conf]
- Zonghua Zhang, Hong Shen
A Brief Observation-Centric Analysis on Anomaly-Based Intrusion Detection. [Citation Graph (0, 0)][DBLP] ISPEC, 2005, pp:178-191 [Conf]
- Rasool Jalili, Fatemeh Imani-Mehr, Morteza Amini, Hamid Reza Shahriari
Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks. [Citation Graph (0, 0)][DBLP] ISPEC, 2005, pp:192-203 [Conf]
- André Adelsbach, Sebastian Gajek, Jörg Schwenk
Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures. [Citation Graph (0, 0)][DBLP] ISPEC, 2005, pp:204-216 [Conf]
- Zhuowei Li, Amitabha Das, Sabu Emmanuel
Model Redundancy vs. Intrusion Detection. [Citation Graph (0, 0)][DBLP] ISPEC, 2005, pp:217-229 [Conf]
- Kerstin Lemke, Ahmad-Reza Sadeghi, Christian Stüble
An Open Approach for Designing Secure Electronic Immobilizers. [Citation Graph (0, 0)][DBLP] ISPEC, 2005, pp:230-242 [Conf]
- Mikael Linden, Inka Vilpola
An Empirical Study on the Usability of Logout in a Single Sign-on System. [Citation Graph (0, 0)][DBLP] ISPEC, 2005, pp:243-254 [Conf]
- André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi
Secure Software Delivery and Installation in Embedded Systems. [Citation Graph (0, 0)][DBLP] ISPEC, 2005, pp:255-267 [Conf]
- Joseph K. Liu, Duncan S. Wong
A Restricted Multi-show Credential System and Its Application on E-Voting. [Citation Graph (0, 0)][DBLP] ISPEC, 2005, pp:268-279 [Conf]
- Hany A. Samuel, Yasser H. Dakroury, Hussein I. Shahein
Recard: Using Recommendation Cards Approach for Building Trust in Peer-to-Peer Networks. [Citation Graph (0, 0)][DBLP] ISPEC, 2005, pp:280-292 [Conf]
- Wenbao Jiang, Chen Li, Shuang Hao, Yiqi Dai
Using Trust for Restricted Delegation in Grid Environments. [Citation Graph (0, 0)][DBLP] ISPEC, 2005, pp:293-301 [Conf]
- Tao Zhang, Mingzeng Hu, Xiao-chun Yun, Yongzheng Zhang
Computer Vulnerability Evaluation Using Fault Tree Analysis. [Citation Graph (0, 0)][DBLP] ISPEC, 2005, pp:302-313 [Conf]
- Xiaoqin Huang, Lin Chen, Linpeng Huang, Minglu Li
An Identity-Based Grid Security Infrastructure Model. [Citation Graph (0, 0)][DBLP] ISPEC, 2005, pp:314-325 [Conf]
- Ahmad-Reza Sadeghi, Christian Stüble
Towards Multilateral-Secure DRM Platforms. [Citation Graph (0, 0)][DBLP] ISPEC, 2005, pp:326-337 [Conf]
- Chin-Chen Chang, Chun-Sen Tseng, Chia-Chen Lin
Hiding Data in Binary Images. [Citation Graph (0, 0)][DBLP] ISPEC, 2005, pp:338-349 [Conf]
- Yanmei Fang, Limin Gu, Jiwu Huang
Performance Analysis of CDMA-Based Watermarking with Quantization Scheme. [Citation Graph (0, 0)][DBLP] ISPEC, 2005, pp:350-361 [Conf]
- Fangyong Hou, Zhiying Wang, Kui Dai, Yun Liu
Protecting Mass Data Basing on Small Trusted Agent. [Citation Graph (0, 0)][DBLP] ISPEC, 2005, pp:362-373 [Conf]
- Zuowen Tan, Zhuojun Liu, Wang Mingsheng
On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes. [Citation Graph (0, 0)][DBLP] ISPEC, 2005, pp:374-385 [Conf]
- Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
Token-Controlled Public Key Encryption. [Citation Graph (0, 0)][DBLP] ISPEC, 2005, pp:386-397 [Conf]
- Marcel Fernandez, Miguel Soriano, Josep Cotrina Navau
A New Class of Codes for Fingerprinting Schemes. [Citation Graph (0, 0)][DBLP] ISPEC, 2005, pp:398-409 [Conf]
- Qianhong Wu, Bo Qin, Changjie Wang, Xiaofeng Chen, Yumin Wang
t-Out-of-n String/Bit Oblivious Transfers Revisited. [Citation Graph (0, 0)][DBLP] ISPEC, 2005, pp:410-421 [Conf]
|