The SCEAS System
Navigation Menu

Conferences in DBLP

Information Security (sec)
2006 (conf/sec/2006)

  1. Inger Anne Tøndel
    Improving Availability of Emergency Health Information without Sacrificing Patient Privacy. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:1-12 [Conf]
  2. George Yee, Larry Korba, Ronggong Song
    Ensuring Privacy for Buyer-Seller E-Commerce. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:13-24 [Conf]
  3. Jan Camenisch, Dieter Sommer, Roger Zimmermann
    A General Certification Framework with Applications to Privacy-Enhancing Certificate Infrastructures. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:25-37 [Conf]
  4. Zinaida Benenson, Felix C. Freiling, Ernest Hammerschmidt, Stefan Lucks, Lexi Pimenidis
    Authenticated Query Flooding in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:38-49 [Conf]
  5. Pietro Michiardi, Refik Molva
    Identity Based Message Authentication for Dynamic Networks. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:50-61 [Conf]
  6. Hasnaa Moustafa, Gilles Bourdon, Yvon Gourhant
    Providing Authentication and Access Control in Vehicular Network Environment. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:62-73 [Conf]
  7. Marijke Coetzee, Jan H. P. Eloff
    A Framework for Web Services Trust. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:74-86 [Conf]
  8. Stephen Flowerday, Rossouw von Solms
    Trust: An Element of Information Security. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:87-98 [Conf]
  9. Bill Tsoumas, Panagiotis Papagiannakopoulos, Stelios Dritsas, Dimitris Gritzalis
    Security-by-Ontology: A Knowledge-Centric Approach. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:99-110 [Conf]
  10. Vincent Naessens, Bart De Decker
    A Methodology for Designing Controlled Anonymous Applications. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:111-122 [Conf]
  11. Sandra Steinbrecher
    Design Options for Privacy-Respecting Reputation Systems within Centralised Internet Communities. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:123-134 [Conf]
  12. Jan Camenisch
    Protecting (Anonymous) Credentials with the Trusted Computing Group's TPM V1.2. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:135-147 [Conf]
  13. Dinei A. F. Florêncio, Cormac Herley
    Analysis and Improvement of Anti-Phishing Schemes. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:148-157 [Conf]
  14. Kameswari Kotapati, Peng Liu, Thomas F. LaPorta
    CAT - A Practical Graph & SDL Based Toolkit for Vulnerability Assessment of 3G Networks. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:158-170 [Conf]
  15. Nils Gruschka, Norbert Luttenberger
    Protecting Web Services from DoS Attacks by SOAP Message Validation. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:171-182 [Conf]
  16. Thierry Sans, Frédéric Cuppens, Nora Cuppens-Boulahia
    A Flexible and Distributed Architecture to Enforce Dynamic Access Control. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:183-195 [Conf]
  17. Andreas K. Mattas, Ioannis Mavridis, Iason Pagkalos
    A Paradigm for Dynamic and Decentralized Administration of Access Control in Workflow Applications. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:196-207 [Conf]
  18. Claudio Agostino Ardagna, Ernesto Damiani, Sabrina De Capitani di Vimercati, Fulvio Frati, Pierangela Samarati
    CAS++: An Open Source Single Sign-On Solution for Secure e-Services. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:208-220 [Conf]
  19. Jianying Zhou, Jose Antonio Onieva, Javier Lopez
    A Synchronous Multi-Party Contract Signing Protocol Improving Lower Bound of Steps. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:221-232 [Conf]
  20. Michael Backes, Birgit Pfitzmann
    On the Cryptographic Key Secrecy of the Strengthened Yahalom Protocol. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:233-245 [Conf]
  21. Kun Peng, Colin Boyd, Ed Dawson
    Sealed-Bid Micro Auctions. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:246-257 [Conf]
  22. Yacine Bouzida, Frédéric Cuppens
    Detecting Known and Novel Network Intrusions. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:258-270 [Conf]
  23. Oleksiy Mazhelis, Seppo Puuronen, Mika Raento
    Evaluating Classifiers for Mobile-Masquerader Detection. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:271-283 [Conf]
  24. Xiaoxin Yin, William Yurcik, Adam J. Slagell
    VisFlowCluster-IP: Connectivity-Based Visual Clustering of Network Hosts. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:284-295 [Conf]
  25. Almut Herzog, Nahid Shahmehri
    A Usability Study of Security Policy Management. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:296-306 [Conf]
  26. Steven Furnell, Adila Jusoh, Dimitris Katsabas, Paul Dowland
    Considering the Usability of End-User Security Software. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:307-316 [Conf]
  27. Thuy D. Nguyen, Cynthia E. Irvine
    Utilizing the Common Criteria for Advanced Student Research Projects. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:317-328 [Conf]
  28. Rafael Accorsi
    On the Relationship of Privacy and Secure Remote Logging in Dynamic Systems. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:329-339 [Conf]
  29. Huafei Zhu, Tieyan Li, Feng Bao
    Privacy-Preserving Shared-Additive-Inverse Protocols and Their Applications. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:340-350 [Conf]
  30. Darko Kirovski, Nebojsa Jojic, Paul Roberts
    Click Passwords. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:351-363 [Conf]
  31. Milan Petkovic, Claudine Conrado, Malik Hammoutène
    Cryptographically Enforced Personalized Role-Based Access Control. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:364-376 [Conf]
  32. Yuri Demchenko, Leon Gommans, Cees de Laat
    Using VO Concept for Managing Dynamic Security Associations. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:377-388 [Conf]
  33. Martin Gilje Jaatun, Inger Anne Tøndel, Frédéric Paint, Tor Hjalmar Johannessen, John Charles Francis, Claire Duranton
    Secure Fast Handover in an Open Broadband Access Network using Kerberos-style Tickets. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:389-400 [Conf]
  34. Chia Yuan Cho, Sin Yeung Lee, Chung Pheng Tan, Yong Tai Tan
    Network Forensics on Packet Fingerprints. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:401-412 [Conf]
  35. Martin Karresand, Nahid Shahmehri
    Oscar - File Type Identification of Binary Data in Disk Clusters and RAM Pages. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:413-424 [Conf]
  36. Anthonie B. Ruighaver, Sean B. Maynard
    Organizational Security Culture: More Than Just an End-User Phenomenon. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:425-430 [Conf]
  37. Benjamin D. Cone, Michael F. Thompson, Cynthia E. Irvine, Thuy D. Nguyen
    Cyber Security Training and Awareness Through Game Play. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:431-436 [Conf]
  38. Omar Zakaria
    Internalisation of Information Security Culture amongst Employees through Basic Security Knowledge. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:437-441 [Conf]
  39. Jabiri Kuwe Bakari, Charles N. Tarimo, Christer Magnusson, Louise Yngström
    Bridging the Gap between General Management and Technicians - A Case Study in ICT Security. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:442-447 [Conf]
  40. Lynette Drevin, Hennie Kruger, Tjaart Steyn
    Value-Focused Assessment of Information Communication and Technology Security Awareness in an Academic Environment. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:448-453 [Conf]
  41. Ronald C. Dodge, Aaron J. Ferguson
    Using Phishing for User Email Security Awareness. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:454-459 [Conf]
  42. Jan Camenisch
    Anonymous Credentials: Opportunities and Challenges. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:460- [Conf]
  43. Florian Kerschbaum
    Practical Private Regular Expression Matching. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:461-470 [Conf]
  44. Siani Pearson, Marco Casassa Mont
    A System for Privacy-Aware Resource Allocation and Data Processing in Dynamic Environments. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:471-482 [Conf]
  45. Gergely Tóth, Zoltán Hornák
    The APROB Channel: Adaptive Semi-Real-Time Anonymous Communication. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:483-492 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002