The SCEAS System
Navigation Menu

Conferences in DBLP

Mathematical Methods, Models, and Architectures for Network Security Systems (MMM-ACNS) (mmmacns)
2003 (conf/mmmacns/2003)

  1. Kulesh Shanmugasundaram, Nasir D. Memon, Anubhav Savant, Hervé Brönnimann
    ForNet: A Distributed Forensics Network. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:1-16 [Conf]
  2. Ravi S. Sandhu, Jaehong Park
    Usage Control: A Vision for Next Generation Access Control. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:17-31 [Conf]
  3. Thumrongsak Kosiyatrakul, Susan Older, Polar R. Humenn, Shiu-Kai Chin
    Implementing a Calculus for Distributed Access Control in Higher Order Logic and HOL. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:32-46 [Conf]
  4. Anatol Slissenko
    Complexity Problems in the Analysis of Information Systems Security. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:47-56 [Conf]
  5. Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu
    A Behavior-Based Approach to Securing Email Systems. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:57-81 [Conf]
  6. Shambhu J. Upadhyaya
    Real-Time Intrusion Detection with Emphasis on Insider Attacks. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:82-85 [Conf]
  7. Stefano Bistarelli, Iliano Cervesato, Gabriele Lenzini, Fabio Martinelli
    Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:86-99 [Conf]
  8. Lazaros Gymnopoulos, Stelios Dritsas, Stefanos Gritzalis, Costas Lambrinoudakis
    GRID Security Review. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:100-111 [Conf]
  9. Spyros Kokolakis, Costas Lambrinoudakis, Dimitris Gritzalis
    A Knowledge-Based Repository Model for Security Policies Management. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:112-121 [Conf]
  10. Fabio Martinelli
    Symbolic Partial Model Checking for Security Analysis. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:122-134 [Conf]
  11. Michael Smirnov
    Rule-Based Systems Security Model. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:135-146 [Conf]
  12. Peter D. Zegzhda, Dmitry P. Zegzhda, Maxim O. Kalinin
    Logical Resolving for Security Evaluation. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:147-156 [Conf]
  13. Salem Benferhat, Fabien Autrel, Frédéric Cuppens
    Enhanced Correlation in an Intrusion Detection Process. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:157-170 [Conf]
  14. John Bigham, David Gamez, Ning Lu
    Safeguarding SCADA Systems with Anomaly Detection. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:171-182 [Conf]
  15. Igor V. Kotenko, Evgeny Man'kov
    Experiments with Simulation of Attacks against Computer Networks. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:183-194 [Conf]
  16. Victor A. Skormin, Douglas H. Summerville, James Moronski
    Detecting Malicious Codes by the Presence of Their "Gene of Self-replication". [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:195-205 [Conf]
  17. Kyubum Wee, Byungeun Moon
    Automatic Generation of Finite State Automata for Detecting Intrusions Using System Call Sequences. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:206-216 [Conf]
  18. Steve Barker
    Distributed Access Control: A Logic-Based Approach. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:217-228 [Conf]
  19. Dae Hyun Yum, Jae Eun Kang, Pil Joong Lee
    Advanced Certificate Status Protocol. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:229-240 [Conf]
  20. Antonio Lain, Viacheslav Borisov
    Key History Tree: Efficient Group Key Management with Off-Line Members. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:241-254 [Conf]
  21. Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano
    A Certificate Status Checking Protocol for the Authenticated Dictionary. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:255-266 [Conf]
  22. Ruben Wolf, Markus Schneider
    Context-Dependent Access Control for Web-Based Collaboration Environments with Role-based Approach. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:267-278 [Conf]
  23. Mohamed Al-Ibrahim
    A Signcryption Scheme Based on Secret Sharing Technique. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:279-288 [Conf]
  24. Pino Caballero-Gil, Candelaria Hernández-Goya
    A Zero-Knwoledge Identification Scheme. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:289-297 [Conf]
  25. Youngdai Ko, Deukjo Hong, Seokhie Hong, Sangjin Lee, Jongin Lim
    Linear Cryptanalysis of SPECTR-H64 with Higher Order Differential Property. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:298-307 [Conf]
  26. Valery I. Korzhik, Viktor Yakovlev, Alexander Sinuk
    Achievability of the Key-Capacity in a Scenario of Key Sharing. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:308-315 [Conf]
  27. Nick A. Moldovyan
    On Cipher Design Based on Switchable Controlled Operations. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:316-327 [Conf]
  28. Alexander Rostovtsev, Elena Makhovenko
    Elliptic Curve Point Multiplication. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:328-336 [Conf]
  29. Nicolas Sklavos, Alexander A. Moldovyan, Odysseas G. Koufopavlou
    Encryption and Data Dependent Permutations: Implementation Cost and Performance Evaluation. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:337-348 [Conf]
  30. Vladimir Gorodetsky, Vladimir Samoilov
    Simulation-Based Exploration of SVD-Based Technique for Hidden Communication by Image Steganography Channel. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:349-359 [Conf]
  31. Kaiwen Zhang, Shuozhong Wang, Xinpeng Zhang
    Detection and Removal of Hidden Data in Images Embedded with Quantization Index Modulation. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:360-370 [Conf]
  32. Valery I. Korzhik, Guillermo Morales-Luna, Irina Marakova, Carlos Patiño-Ruvalcaba
    Digital Watermarking under a Filtering and Additive Noise Attack Condition. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:371-382 [Conf]
  33. Shuozhong Wang, Xinpeng Zhang, Kaiwen Zhang
    Data Hiding in Digital Audio by Frequency Domain Dithering. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:383-394 [Conf]
  34. Xinpeng Zhang, Shuozhong Wang, Kaiwen Zhang
    Steganography with Least Histogram Abnormality. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:395-406 [Conf]
  35. Xinpeng Zhang, Shuozhong Wang, Kaiwen Zhang
    Multi-bit Watermarking Scheme Based on Addition of Orthogonal Sequences. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:407-418 [Conf]
  36. Mohamed Al-Ibrahim, Anton Cerný
    Authentication of Anycast Communication. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:419-423 [Conf]
  37. Ruo Ando, Yoshiyasu Takefuji
    Two-Stage Orthogonal Network Incident Detection for the Adaptive Coordination with SMTP Proxy. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:424-427 [Conf]
  38. Alexander Grusho, Elena Timonina
    Construction of the Covert Channels. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:428-431 [Conf]
  39. Mitrou Lilian, Konstantinos Moulinos
    Privacy and Data Protection in Electronic Communications. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:432-435 [Conf]
  40. Hyun-Sung Kim, Sung-Ho Hwang
    Multiplier for Public-Key Cryptosystem Based on Cellular Automata. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:436-439 [Conf]
  41. Sri Kumar, Vladimir Marbukh
    A Game Theoretic Approach to Analysis and Design of Survivable and Secure Systems and Protocols. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:440-443 [Conf]
  42. Francisco J. Martín, Enric Plaza
    Alert Triage on the ROC. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:444-448 [Conf]
  43. Nick D. Goots, Boris V. Izotov, Alexander A. Moldovyan, Nick A. Moldovyan
    Fast Ciphers for Cheap Hardware: Differential Analysis of SPECTR-H64. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:449-452 [Conf]
  44. Yuri Melnikov, Alexander O. Tarakanov
    Immunocomputing Model of Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:453-456 [Conf]
  45. Gustavo Santana, Leonid Sheremetov, Miguel Contreras
    Agent Platform Security Architecture. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:457-460 [Conf]
  46. Taeshik Shon, Taewoo Noh, Jongsub Moon
    Support Vector Machine Based ICMP Covert Channel Attack Detection. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:461-464 [Conf]
  47. Svetlana P. Sokolova, Ruslan S. Ivlev
    Computer Immunology System with Variable Configuration. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:465-468 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002