Conferences in DBLP
Kulesh Shanmugasundaram , Nasir D. Memon , Anubhav Savant , Hervé Brönnimann ForNet: A Distributed Forensics Network. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:1-16 [Conf ] Ravi S. Sandhu , Jaehong Park Usage Control: A Vision for Next Generation Access Control. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:17-31 [Conf ] Thumrongsak Kosiyatrakul , Susan Older , Polar R. Humenn , Shiu-Kai Chin Implementing a Calculus for Distributed Access Control in Higher Order Logic and HOL. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:32-46 [Conf ] Anatol Slissenko Complexity Problems in the Analysis of Information Systems Security. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:47-56 [Conf ] Salvatore J. Stolfo , Shlomo Hershkop , Ke Wang , Olivier Nimeskern , Chia-Wei Hu A Behavior-Based Approach to Securing Email Systems. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:57-81 [Conf ] Shambhu J. Upadhyaya Real-Time Intrusion Detection with Emphasis on Insider Attacks. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:82-85 [Conf ] Stefano Bistarelli , Iliano Cervesato , Gabriele Lenzini , Fabio Martinelli Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:86-99 [Conf ] Lazaros Gymnopoulos , Stelios Dritsas , Stefanos Gritzalis , Costas Lambrinoudakis GRID Security Review. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:100-111 [Conf ] Spyros Kokolakis , Costas Lambrinoudakis , Dimitris Gritzalis A Knowledge-Based Repository Model for Security Policies Management. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:112-121 [Conf ] Fabio Martinelli Symbolic Partial Model Checking for Security Analysis. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:122-134 [Conf ] Michael Smirnov Rule-Based Systems Security Model. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:135-146 [Conf ] Peter D. Zegzhda , Dmitry P. Zegzhda , Maxim O. Kalinin Logical Resolving for Security Evaluation. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:147-156 [Conf ] Salem Benferhat , Fabien Autrel , Frédéric Cuppens Enhanced Correlation in an Intrusion Detection Process. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:157-170 [Conf ] John Bigham , David Gamez , Ning Lu Safeguarding SCADA Systems with Anomaly Detection. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:171-182 [Conf ] Igor V. Kotenko , Evgeny Man'kov Experiments with Simulation of Attacks against Computer Networks. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:183-194 [Conf ] Victor A. Skormin , Douglas H. Summerville , James Moronski Detecting Malicious Codes by the Presence of Their "Gene of Self-replication". [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:195-205 [Conf ] Kyubum Wee , Byungeun Moon Automatic Generation of Finite State Automata for Detecting Intrusions Using System Call Sequences. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:206-216 [Conf ] Steve Barker Distributed Access Control: A Logic-Based Approach. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:217-228 [Conf ] Dae Hyun Yum , Jae Eun Kang , Pil Joong Lee Advanced Certificate Status Protocol. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:229-240 [Conf ] Antonio Lain , Viacheslav Borisov Key History Tree: Efficient Group Key Management with Off-Line Members. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:241-254 [Conf ] Jose L. Muñoz , Jordi Forné , Oscar Esparza , Miguel Soriano A Certificate Status Checking Protocol for the Authenticated Dictionary. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:255-266 [Conf ] Ruben Wolf , Markus Schneider Context-Dependent Access Control for Web-Based Collaboration Environments with Role-based Approach. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:267-278 [Conf ] Mohamed Al-Ibrahim A Signcryption Scheme Based on Secret Sharing Technique. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:279-288 [Conf ] Pino Caballero-Gil , Candelaria Hernández-Goya A Zero-Knwoledge Identification Scheme. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:289-297 [Conf ] Youngdai Ko , Deukjo Hong , Seokhie Hong , Sangjin Lee , Jongin Lim Linear Cryptanalysis of SPECTR-H64 with Higher Order Differential Property. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:298-307 [Conf ] Valery I. Korzhik , Viktor Yakovlev , Alexander Sinuk Achievability of the Key-Capacity in a Scenario of Key Sharing. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:308-315 [Conf ] Nick A. Moldovyan On Cipher Design Based on Switchable Controlled Operations. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:316-327 [Conf ] Alexander Rostovtsev , Elena Makhovenko Elliptic Curve Point Multiplication. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:328-336 [Conf ] Nicolas Sklavos , Alexander A. Moldovyan , Odysseas G. Koufopavlou Encryption and Data Dependent Permutations: Implementation Cost and Performance Evaluation. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:337-348 [Conf ] Vladimir Gorodetsky , Vladimir Samoilov Simulation-Based Exploration of SVD-Based Technique for Hidden Communication by Image Steganography Channel. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:349-359 [Conf ] Kaiwen Zhang , Shuozhong Wang , Xinpeng Zhang Detection and Removal of Hidden Data in Images Embedded with Quantization Index Modulation. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:360-370 [Conf ] Valery I. Korzhik , Guillermo Morales-Luna , Irina Marakova , Carlos Patiño-Ruvalcaba Digital Watermarking under a Filtering and Additive Noise Attack Condition. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:371-382 [Conf ] Shuozhong Wang , Xinpeng Zhang , Kaiwen Zhang Data Hiding in Digital Audio by Frequency Domain Dithering. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:383-394 [Conf ] Xinpeng Zhang , Shuozhong Wang , Kaiwen Zhang Steganography with Least Histogram Abnormality. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:395-406 [Conf ] Xinpeng Zhang , Shuozhong Wang , Kaiwen Zhang Multi-bit Watermarking Scheme Based on Addition of Orthogonal Sequences. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:407-418 [Conf ] Mohamed Al-Ibrahim , Anton Cerný Authentication of Anycast Communication. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:419-423 [Conf ] Ruo Ando , Yoshiyasu Takefuji Two-Stage Orthogonal Network Incident Detection for the Adaptive Coordination with SMTP Proxy. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:424-427 [Conf ] Alexander Grusho , Elena Timonina Construction of the Covert Channels. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:428-431 [Conf ] Mitrou Lilian , Konstantinos Moulinos Privacy and Data Protection in Electronic Communications. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:432-435 [Conf ] Hyun-Sung Kim , Sung-Ho Hwang Multiplier for Public-Key Cryptosystem Based on Cellular Automata. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:436-439 [Conf ] Sri Kumar , Vladimir Marbukh A Game Theoretic Approach to Analysis and Design of Survivable and Secure Systems and Protocols. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:440-443 [Conf ] Francisco J. Martín , Enric Plaza Alert Triage on the ROC. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:444-448 [Conf ] Nick D. Goots , Boris V. Izotov , Alexander A. Moldovyan , Nick A. Moldovyan Fast Ciphers for Cheap Hardware: Differential Analysis of SPECTR-H64. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:449-452 [Conf ] Yuri Melnikov , Alexander O. Tarakanov Immunocomputing Model of Intrusion Detection. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:453-456 [Conf ] Gustavo Santana , Leonid Sheremetov , Miguel Contreras Agent Platform Security Architecture. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:457-460 [Conf ] Taeshik Shon , Taewoo Noh , Jongsub Moon Support Vector Machine Based ICMP Covert Channel Attack Detection. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:461-464 [Conf ] Svetlana P. Sokolova , Ruslan S. Ivlev Computer Immunology System with Variable Configuration. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:465-468 [Conf ]