The SCEAS System
Navigation Menu

Conferences in DBLP

Information Security (sec)
2001 (conf/sec/2001)

  1. Dimitris Gritzalis, Konstantinos Moulinos, John Iliadis, Costas Lambrinoudakis, S. Xarhoulacos
    Pythia: Towards Anonymity in Authentication. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:1-18 [Conf]
  2. K. M. Ang, William J. Caelli
    Certificate Based PKI and B2B E-Commerce: Suitable Match or Not? [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:19-34 [Conf]
  3. Claudia Eckert, A. Pircher
    Internet Anonymity: Problems and Solutions. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:35-50 [Conf]
  4. Albert Levi, Çetin Kaya Koç
    Reducing Certificate Revocating Cost using NPKI. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:51-60 [Conf]
  5. Bernd Blobel, Peter Pharow
    The Need and Practice of User Authentication and TTP Services in Distributed Health Information Systems. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:61-76 [Conf]
  6. Constantinos Markantonakis
    Is the Performance of Smart Card Cryptographic Functions the Real Bottleneck? [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:77-92 [Conf]
  7. Jan Jürjens
    Modelling Audit Security for Smart-Cart Payment Schemes with UML-SEC. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:93-108 [Conf]
  8. Mike Burmester, Vassilios Chrissikopoulos, Panayiotis Kotzanikolaou, Emmanouil Magkos
    Strong Forward Security. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:109-122 [Conf]
  9. Annalisa De Bonis, Alfredo De Santis
    Secret Sharing and Visual Cryptography Schemes. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:123-138 [Conf]
  10. Alban Gabillon, J. Byun
    A Two-level Time-Stamping System. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:139-150 [Conf]
  11. Olivier Pereira, Jean-Jacques Quisquater
    Security Analysis of the Cliques Protocols Suites: First Results. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:151-166 [Conf]
  12. Joon S. Park, Myong H. Kang, Judith N. Froscher
    A Secure Workflow System for Dynamic Collaboration. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:167-182 [Conf]
  13. T. Herlea, Joris Claessens, Bart Preneel, Gregory Neven, Frank Piessens, Bart De Decker
    On Securely Scheduling a Meeting. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:183-198 [Conf]
  14. Konstantin Knorr, Henrik Stormer
    Modeling and Analyzing Separation of Duties in Workflow Environments. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:199-212 [Conf]
  15. Thomas Hardjono, Mark Baugher, Hugh Harney
    Group Security Association (GSA) Management in IP Multicast. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:213-228 [Conf]
  16. Yongdae Kim, Adrian Perrig, Gene Tsudik
    Communication-Efficient Group Key Agreement. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:229-244 [Conf]
  17. Amgad Fayad, Sushil Jajodia, Donald B. Faatz, Vinti Doshi
    Going Beyond MAC and DAC Using Mobile Policies. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:245-260 [Conf]
  18. Piero A. Bonatti, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati
    An Access Control Model for Data Archives. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:261-276 [Conf]
  19. Sungbaek Cho, Zbigniew Ciechanowicz
    Checklist-Based Risk Analysis with Evidential Reasoning. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:277-292 [Conf]
  20. Ann Frisinger
    Improving the Protection of Assets in Open Distributed Systems by Use of X-ifying Risk Analysis. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:293-304 [Conf]
  21. Teemupekka Virtanen
    The Security Model to Combine the Corporate and Information Security. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:305-316 [Conf]
  22. Teemupekka Virtanen
    Design Criteria to Classified Information Systems Numerically. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:317-326 [Conf]
  23. Matthew J. Warren, William Hutchinson
    Deception: A Tool and Curse for Security Management. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:327-338 [Conf]
  24. Alexandr Seleznyov
    A Methodology to Detect Temporal Regularities in User Behavior for Anomaly Detection. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:339-352 [Conf]
  25. C. Michel, Ludovic Mé
    ADeLe: An Attack Description Language for Knowledge-Based Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:353-368 [Conf]
  26. Xinyuan Wang, Douglas S. Reeves, Shyhtsun Felix Wu, Jim Yuill
    Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:369-384 [Conf]
  27. Antonio Mana, Ernesto Pimentel
    An Efficient Software Protection Scheme. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:385-402 [Conf]
  28. Adrian Spalka, Armin B. Cremers, Hanno Langweg
    Protecting the Creation of Digital Signatures with Trusted Computing Platform Technology Against Attacks by Trojan Horse Programs. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:403-420 [Conf]
  29. Theodore Tryfonas, Evangelos A. Kiountouzis
    Security Concerns for Contemporary Development Practices: A Case Study. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:421-436 [Conf]
  30. Mikko T. Siponen
    A Paradigmatic Analysis of Conventional Approaches for Developing and Managing Secure IS. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:437-452 [Conf]
  31. Maria Karyda, Spyros Kokolakis, Evangelos A. Kiountouzis
    Redefining Information Systems Security: Viable Information Systems. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:453-468 [Conf]
  32. Guido Wimmel, Alexander K. Wißpeintner
    Extended Description Techniques for Security Engineering. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:469-0 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002