The SCEAS System
Navigation Menu

Conferences in DBLP

Information Security (sec)
2003 (conf/sec/2003)

  1. Brian Toone, Michael Gertz, Premkumar T. Devanbu
    Trust Mediation for Distributed Information Systems. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:1-12 [Conf]
  2. Constantine Daicos, Scott Knight
    Concerning Enterprise Network Vulnerability to HTTP Tunneling. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:13-24 [Conf]
  3. Mohamed Sharif, Duminda Wijesekera
    Providing Voice Privacy Over Public Switched Telephone Networks. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:25-36 [Conf]
  4. Jose Antonio Onieva, Jianying Zhou, Mildrey Carbonell, Javier Lopez
    A Multi-Party Non-Repudiation Protocol for Exchange of Different Messages. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:37-48 [Conf]
  5. Jing-Jang Hwang, Min-Hua Shao, Soushan Wu
    Establishing Chain of Evidence as a Base for Non-Repudiation Services. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:49-60 [Conf]
  6. Ernesto Damiani, Sabrina De Capitani di Vimercati
    Securing XML-based Multimedia Content. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:61-72 [Conf]
  7. Cheun Ngen Chong, Zhonghong Peng, Pieter H. Hartel
    Secure Audit Logging with Tamper-Resistant Hardware. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:73-84 [Conf]
  8. Heejae Park, Jong Kim
    PCMHoDC. A Scheme to Protect Copyright & Modification History of Digital Contents. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:85-96 [Conf]
  9. Nathan L. Clarke, Steven Furnell, Benn Lines, Paul L. Reynolds
    Using Keystroke Analysis as a Mechanism for Subscriber Authentication on Mobile Handsets. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:97-108 [Conf]
  10. Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis
    Introducing PKI to Enhance Security in Future Mobile Networks. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:109-120 [Conf]
  11. Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei
    A Time Driven Methodology for Key Dimensioning in Multicast Communications. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:121-132 [Conf]
  12. Claudiu Duma, Nahid Shahmehri, Patrick Lambrix
    A Flexible Category-Based Collusion-Restistant Key Management Scheme for Multicast. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:133-144 [Conf]
  13. Maria Karyda, Spyros Kokolakis, Evangelos A. Kiountouzis
    Content, Context, Process Analysis of IS Security Policy Formation. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:145-156 [Conf]
  14. Ulrika Evertsson, Urban Örthberg, Louise Yngström
    Integrating Security into Systems Development. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:157-168 [Conf]
  15. Kerry-Lynn Thomson, Rossouw von Solms
    Integrating Information Security into Corporate Governance. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:169-180 [Conf]
  16. Meletis A. Belsis, Leonid Smalov
    Building an Enterprise IT Security Management System. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:181-192 [Conf]
  17. Mariki M. Eloff, Jan H. P. Eloff
    Information Security Management System: Processes and Products. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:193-204 [Conf]
  18. Scott Knight, Luciano Carosielli
    Detecting Malicious Use with Unlabelled Data Using Clustering and Outlier Analysis. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:205-216 [Conf]
  19. Kostas G. Anagnostakis, Spyros Antonatos, Evangelos P. Markatos, Michalis Polychronakis
    E2xB: A Domain-Specific String Matching Algorithm for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:217-228 [Conf]
  20. Meng Yu, Peng Liu, Wanyu Zang
    Intrusion Masking for Distributed Atomic Operations. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:229-240 [Conf]
  21. Mehdi Shajari, Ali A. Ghorbani
    Using Fuzzy System to Manage False Alarms in Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:241-252 [Conf]
  22. James Bret Michael, Georgios Fragkos, Mikhail Auguston
    An Experiment in Software Decoy Design. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:253-264 [Conf]
  23. Douglas E. Williams, Amgad Fayad, Sushil Jajodia, Daniel Calle
    A User Friendly Guard with Mobile Post-Release Access Control Policy. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:265-276 [Conf]
  24. Anas Abou El Kalam, Yves Deswarte
    Security Model for Health Care Computing and Communication Systems. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:277-288 [Conf]
  25. Longhua Zhang, Gail-Joon Ahn
    Constrained Role-based Delegation. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:289-300 [Conf]
  26. Fredj Dridi, Michael Fischer, Günther Pernul
    CSAP - An Adaptable Security Module for the E-Government System Webocrat. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:301-312 [Conf]
  27. Theodore Tryfonas, Evangelos A. Kiountouzis
    Perceptions of Security Contributing to the Implementation of Secure IS. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:313-324 [Conf]
  28. Mikko T. Siponen
    New Directions on IS Security Methods. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:325-336 [Conf]
  29. Bart De Decker, Gregory Neven, Frank Piessens
    Secure Vickrey Auctions without a Trusted Third Party. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:337-348 [Conf]
  30. Mauricio Papa, Oliver Bremer, John Hale, Sujeet Shenoi
    Integrating Logics and Process Calculi for Cryptographic Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:349-360 [Conf]
  31. Georgios Kalogridis, Chan Yeob Yeun, Gary Clemo
    Flexible Delegation Security for Improved Distribution in Ubiquitous Environments. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:361-372 [Conf]
  32. Magdi M. S. El-Soudani, Mohamed A. Eissa
    Cooperative Defense Firewall Protocol. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:373-384 [Conf]
  33. Stefan Lucks, Rüdiger Weis
    How to turn a PIN into an Iron Beam. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:385-396 [Conf]
  34. Lech J. Janczewski, Andrew M. Colarik
    World Framework for Security Benchmark Changes. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:397-400 [Conf]
  35. Cheryl Vroom, Rossouw von Solms
    Information Security: Auditing the Behaviour of the Employee. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:401-404 [Conf]
  36. Marcin Dobrucki, Teemupekka Virtanen
    Priorities in the Development of Network Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:405-408 [Conf]
  37. Paul Gaunard, Eric Dubois
    Bridging the Gap between Risk Analysis and Security Policies. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:409-412 [Conf]
  38. Jochen Haller, Philip Robinson, Thomas Walter, Roger Kilian-Kehr
    Framework and Architecture for Secure Mobile Business Applications. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:413-416 [Conf]
  39. W. J. Brooks, Matthew J. Warren, William Hutchinson
    ISO 17799 and Australian Healthcare Organisations. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:417-420 [Conf]
  40. George Danezis
    Statistical Disclosure Attacks. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:421-426 [Conf]
  41. Andrei Serjantov, Richard E. Newman
    On the Anonymity of Timed Pool Mixes. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:427-434 [Conf]
  42. R. J. Hulsebosch
    Privacy in Content Distribution Networks. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:435-440 [Conf]
  43. Jaap-Henk Hoepman
    Security, Fault-Tolerance and their Verification for Ambient Systems. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:441-446 [Conf]
  44. Giannis Pikrammenos, Ghassan Sarkis, John Soldatos, Vasilios Anagnostopoulos
    Hidden Layer Authentication using Smart Card for WEP-based WLANS. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:447-451 [Conf]
  45. Jerry den Hartog, Jan Verschuren, Erik P. de Vink, Jaap de Vos, W. Wiersma
    PINPAS: A Tool for Power Analysis of Smartcards. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:453-457 [Conf]
  46. Yee Wei Law, Sandro Etalle, Pieter H. Hartel
    Assessing Security in Energy-Efficient Sensor Networks. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:459-463 [Conf]
  47. Engelbert Hubbers, Martijn Oostdijk, Erik Poll
    From Finite State Machines to Provably Correct Java Card Applets. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:465-470 [Conf]
  48. Bob Hulsebosch, Ernst-Jan Goedvolk, Wil Janssen
    Security Characteristics of E-Collaboration Environments. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:471-475 [Conf]
  49. Preetida Vinayakray-Jani
    Roadmap for Securing Handheld Devices. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:477-482 [Conf]
  50. James Bret Michael, Thomas C. Wingfield
    Lawful Cyber Decoy Policy. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:483-488 [Conf]
  51. Juhani Paavilainen, Suzana Stojakovic-Celustka, Dagmar Brechlerova
    Electronic Signature as a part of Information Society Infrastructure. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:489-494 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002