|
Conferences in DBLP
- Brian Toone, Michael Gertz, Premkumar T. Devanbu
Trust Mediation for Distributed Information Systems. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:1-12 [Conf]
- Constantine Daicos, Scott Knight
Concerning Enterprise Network Vulnerability to HTTP Tunneling. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:13-24 [Conf]
- Mohamed Sharif, Duminda Wijesekera
Providing Voice Privacy Over Public Switched Telephone Networks. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:25-36 [Conf]
- Jose Antonio Onieva, Jianying Zhou, Mildrey Carbonell, Javier Lopez
A Multi-Party Non-Repudiation Protocol for Exchange of Different Messages. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:37-48 [Conf]
- Jing-Jang Hwang, Min-Hua Shao, Soushan Wu
Establishing Chain of Evidence as a Base for Non-Repudiation Services. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:49-60 [Conf]
- Ernesto Damiani, Sabrina De Capitani di Vimercati
Securing XML-based Multimedia Content. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:61-72 [Conf]
- Cheun Ngen Chong, Zhonghong Peng, Pieter H. Hartel
Secure Audit Logging with Tamper-Resistant Hardware. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:73-84 [Conf]
- Heejae Park, Jong Kim
PCMHoDC. A Scheme to Protect Copyright & Modification History of Digital Contents. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:85-96 [Conf]
- Nathan L. Clarke, Steven Furnell, Benn Lines, Paul L. Reynolds
Using Keystroke Analysis as a Mechanism for Subscriber Authentication on Mobile Handsets. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:97-108 [Conf]
- Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis
Introducing PKI to Enhance Security in Future Mobile Networks. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:109-120 [Conf]
- Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei
A Time Driven Methodology for Key Dimensioning in Multicast Communications. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:121-132 [Conf]
- Claudiu Duma, Nahid Shahmehri, Patrick Lambrix
A Flexible Category-Based Collusion-Restistant Key Management Scheme for Multicast. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:133-144 [Conf]
- Maria Karyda, Spyros Kokolakis, Evangelos A. Kiountouzis
Content, Context, Process Analysis of IS Security Policy Formation. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:145-156 [Conf]
- Ulrika Evertsson, Urban Örthberg, Louise Yngström
Integrating Security into Systems Development. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:157-168 [Conf]
- Kerry-Lynn Thomson, Rossouw von Solms
Integrating Information Security into Corporate Governance. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:169-180 [Conf]
- Meletis A. Belsis, Leonid Smalov
Building an Enterprise IT Security Management System. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:181-192 [Conf]
- Mariki M. Eloff, Jan H. P. Eloff
Information Security Management System: Processes and Products. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:193-204 [Conf]
- Scott Knight, Luciano Carosielli
Detecting Malicious Use with Unlabelled Data Using Clustering and Outlier Analysis. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:205-216 [Conf]
- Kostas G. Anagnostakis, Spyros Antonatos, Evangelos P. Markatos, Michalis Polychronakis
E2xB: A Domain-Specific String Matching Algorithm for Intrusion Detection. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:217-228 [Conf]
- Meng Yu, Peng Liu, Wanyu Zang
Intrusion Masking for Distributed Atomic Operations. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:229-240 [Conf]
- Mehdi Shajari, Ali A. Ghorbani
Using Fuzzy System to Manage False Alarms in Intrusion Detection. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:241-252 [Conf]
- James Bret Michael, Georgios Fragkos, Mikhail Auguston
An Experiment in Software Decoy Design. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:253-264 [Conf]
- Douglas E. Williams, Amgad Fayad, Sushil Jajodia, Daniel Calle
A User Friendly Guard with Mobile Post-Release Access Control Policy. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:265-276 [Conf]
- Anas Abou El Kalam, Yves Deswarte
Security Model for Health Care Computing and Communication Systems. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:277-288 [Conf]
- Longhua Zhang, Gail-Joon Ahn
Constrained Role-based Delegation. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:289-300 [Conf]
- Fredj Dridi, Michael Fischer, Günther Pernul
CSAP - An Adaptable Security Module for the E-Government System Webocrat. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:301-312 [Conf]
- Theodore Tryfonas, Evangelos A. Kiountouzis
Perceptions of Security Contributing to the Implementation of Secure IS. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:313-324 [Conf]
- Mikko T. Siponen
New Directions on IS Security Methods. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:325-336 [Conf]
- Bart De Decker, Gregory Neven, Frank Piessens
Secure Vickrey Auctions without a Trusted Third Party. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:337-348 [Conf]
- Mauricio Papa, Oliver Bremer, John Hale, Sujeet Shenoi
Integrating Logics and Process Calculi for Cryptographic Protocol Analysis. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:349-360 [Conf]
- Georgios Kalogridis, Chan Yeob Yeun, Gary Clemo
Flexible Delegation Security for Improved Distribution in Ubiquitous Environments. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:361-372 [Conf]
- Magdi M. S. El-Soudani, Mohamed A. Eissa
Cooperative Defense Firewall Protocol. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:373-384 [Conf]
- Stefan Lucks, Rüdiger Weis
How to turn a PIN into an Iron Beam. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:385-396 [Conf]
- Lech J. Janczewski, Andrew M. Colarik
World Framework for Security Benchmark Changes. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:397-400 [Conf]
- Cheryl Vroom, Rossouw von Solms
Information Security: Auditing the Behaviour of the Employee. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:401-404 [Conf]
- Marcin Dobrucki, Teemupekka Virtanen
Priorities in the Development of Network Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:405-408 [Conf]
- Paul Gaunard, Eric Dubois
Bridging the Gap between Risk Analysis and Security Policies. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:409-412 [Conf]
- Jochen Haller, Philip Robinson, Thomas Walter, Roger Kilian-Kehr
Framework and Architecture for Secure Mobile Business Applications. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:413-416 [Conf]
- W. J. Brooks, Matthew J. Warren, William Hutchinson
ISO 17799 and Australian Healthcare Organisations. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:417-420 [Conf]
- George Danezis
Statistical Disclosure Attacks. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:421-426 [Conf]
- Andrei Serjantov, Richard E. Newman
On the Anonymity of Timed Pool Mixes. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:427-434 [Conf]
- R. J. Hulsebosch
Privacy in Content Distribution Networks. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:435-440 [Conf]
- Jaap-Henk Hoepman
Security, Fault-Tolerance and their Verification for Ambient Systems. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:441-446 [Conf]
- Giannis Pikrammenos, Ghassan Sarkis, John Soldatos, Vasilios Anagnostopoulos
Hidden Layer Authentication using Smart Card for WEP-based WLANS. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:447-451 [Conf]
- Jerry den Hartog, Jan Verschuren, Erik P. de Vink, Jaap de Vos, W. Wiersma
PINPAS: A Tool for Power Analysis of Smartcards. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:453-457 [Conf]
- Yee Wei Law, Sandro Etalle, Pieter H. Hartel
Assessing Security in Energy-Efficient Sensor Networks. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:459-463 [Conf]
- Engelbert Hubbers, Martijn Oostdijk, Erik Poll
From Finite State Machines to Provably Correct Java Card Applets. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:465-470 [Conf]
- Bob Hulsebosch, Ernst-Jan Goedvolk, Wil Janssen
Security Characteristics of E-Collaboration Environments. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:471-475 [Conf]
- Preetida Vinayakray-Jani
Roadmap for Securing Handheld Devices. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:477-482 [Conf]
- James Bret Michael, Thomas C. Wingfield
Lawful Cyber Decoy Policy. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:483-488 [Conf]
- Juhani Paavilainen, Suzana Stojakovic-Celustka, Dagmar Brechlerova
Electronic Signature as a part of Information Society Infrastructure. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:489-494 [Conf]
|