Conferences in DBLP
Inger Anne Tøndel Improving Availability of Emergency Health Information without Sacrificing Patient Privacy. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:1-12 [Conf ] George Yee , Larry Korba , Ronggong Song Ensuring Privacy for Buyer-Seller E-Commerce. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:13-24 [Conf ] Jan Camenisch , Dieter Sommer , Roger Zimmermann A General Certification Framework with Applications to Privacy-Enhancing Certificate Infrastructures. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:25-37 [Conf ] Zinaida Benenson , Felix C. Freiling , Ernest Hammerschmidt , Stefan Lucks , Lexi Pimenidis Authenticated Query Flooding in Sensor Networks. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:38-49 [Conf ] Pietro Michiardi , Refik Molva Identity Based Message Authentication for Dynamic Networks. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:50-61 [Conf ] Hasnaa Moustafa , Gilles Bourdon , Yvon Gourhant Providing Authentication and Access Control in Vehicular Network Environment. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:62-73 [Conf ] Marijke Coetzee , Jan H. P. Eloff A Framework for Web Services Trust. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:74-86 [Conf ] Stephen Flowerday , Rossouw von Solms Trust: An Element of Information Security. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:87-98 [Conf ] Bill Tsoumas , Panagiotis Papagiannakopoulos , Stelios Dritsas , Dimitris Gritzalis Security-by-Ontology: A Knowledge-Centric Approach. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:99-110 [Conf ] Vincent Naessens , Bart De Decker A Methodology for Designing Controlled Anonymous Applications. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:111-122 [Conf ] Sandra Steinbrecher Design Options for Privacy-Respecting Reputation Systems within Centralised Internet Communities. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:123-134 [Conf ] Jan Camenisch Protecting (Anonymous) Credentials with the Trusted Computing Group's TPM V1.2. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:135-147 [Conf ] Dinei A. F. Florêncio , Cormac Herley Analysis and Improvement of Anti-Phishing Schemes. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:148-157 [Conf ] Kameswari Kotapati , Peng Liu , Thomas F. LaPorta CAT - A Practical Graph & SDL Based Toolkit for Vulnerability Assessment of 3G Networks. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:158-170 [Conf ] Nils Gruschka , Norbert Luttenberger Protecting Web Services from DoS Attacks by SOAP Message Validation. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:171-182 [Conf ] Thierry Sans , Frédéric Cuppens , Nora Cuppens-Boulahia A Flexible and Distributed Architecture to Enforce Dynamic Access Control. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:183-195 [Conf ] Andreas K. Mattas , Ioannis Mavridis , Iason Pagkalos A Paradigm for Dynamic and Decentralized Administration of Access Control in Workflow Applications. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:196-207 [Conf ] Claudio Agostino Ardagna , Ernesto Damiani , Sabrina De Capitani di Vimercati , Fulvio Frati , Pierangela Samarati CAS++: An Open Source Single Sign-On Solution for Secure e-Services. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:208-220 [Conf ] Jianying Zhou , Jose Antonio Onieva , Javier Lopez A Synchronous Multi-Party Contract Signing Protocol Improving Lower Bound of Steps. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:221-232 [Conf ] Michael Backes , Birgit Pfitzmann On the Cryptographic Key Secrecy of the Strengthened Yahalom Protocol. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:233-245 [Conf ] Kun Peng , Colin Boyd , Ed Dawson Sealed-Bid Micro Auctions. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:246-257 [Conf ] Yacine Bouzida , Frédéric Cuppens Detecting Known and Novel Network Intrusions. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:258-270 [Conf ] Oleksiy Mazhelis , Seppo Puuronen , Mika Raento Evaluating Classifiers for Mobile-Masquerader Detection. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:271-283 [Conf ] Xiaoxin Yin , William Yurcik , Adam J. Slagell VisFlowCluster-IP : Connectivity-Based Visual Clustering of Network Hosts. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:284-295 [Conf ] Almut Herzog , Nahid Shahmehri A Usability Study of Security Policy Management. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:296-306 [Conf ] Steven Furnell , Adila Jusoh , Dimitris Katsabas , Paul Dowland Considering the Usability of End-User Security Software. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:307-316 [Conf ] Thuy D. Nguyen , Cynthia E. Irvine Utilizing the Common Criteria for Advanced Student Research Projects. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:317-328 [Conf ] Rafael Accorsi On the Relationship of Privacy and Secure Remote Logging in Dynamic Systems. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:329-339 [Conf ] Huafei Zhu , Tieyan Li , Feng Bao Privacy-Preserving Shared-Additive-Inverse Protocols and Their Applications. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:340-350 [Conf ] Darko Kirovski , Nebojsa Jojic , Paul Roberts Click Passwords. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:351-363 [Conf ] Milan Petkovic , Claudine Conrado , Malik Hammoutène Cryptographically Enforced Personalized Role-Based Access Control. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:364-376 [Conf ] Yuri Demchenko , Leon Gommans , Cees de Laat Using VO Concept for Managing Dynamic Security Associations. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:377-388 [Conf ] Martin Gilje Jaatun , Inger Anne Tøndel , Frédéric Paint , Tor Hjalmar Johannessen , John Charles Francis , Claire Duranton Secure Fast Handover in an Open Broadband Access Network using Kerberos-style Tickets. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:389-400 [Conf ] Chia Yuan Cho , Sin Yeung Lee , Chung Pheng Tan , Yong Tai Tan Network Forensics on Packet Fingerprints. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:401-412 [Conf ] Martin Karresand , Nahid Shahmehri Oscar - File Type Identification of Binary Data in Disk Clusters and RAM Pages. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:413-424 [Conf ] Anthonie B. Ruighaver , Sean B. Maynard Organizational Security Culture: More Than Just an End-User Phenomenon. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:425-430 [Conf ] Benjamin D. Cone , Michael F. Thompson , Cynthia E. Irvine , Thuy D. Nguyen Cyber Security Training and Awareness Through Game Play. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:431-436 [Conf ] Omar Zakaria Internalisation of Information Security Culture amongst Employees through Basic Security Knowledge. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:437-441 [Conf ] Jabiri Kuwe Bakari , Charles N. Tarimo , Christer Magnusson , Louise Yngström Bridging the Gap between General Management and Technicians - A Case Study in ICT Security. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:442-447 [Conf ] Lynette Drevin , Hennie Kruger , Tjaart Steyn Value-Focused Assessment of Information Communication and Technology Security Awareness in an Academic Environment. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:448-453 [Conf ] Ronald C. Dodge , Aaron J. Ferguson Using Phishing for User Email Security Awareness. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:454-459 [Conf ] Jan Camenisch Anonymous Credentials: Opportunities and Challenges. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:460- [Conf ] Florian Kerschbaum Practical Private Regular Expression Matching. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:461-470 [Conf ] Siani Pearson , Marco Casassa Mont A System for Privacy-Aware Resource Allocation and Data Processing in Dynamic Environments. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:471-482 [Conf ] Gergely Tóth , Zoltán Hornák The APROB Channel: Adaptive Semi-Real-Time Anonymous Communication. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:483-492 [Conf ]