Conferences in DBLP
Kai Rannenberg IT Security Certification and Criteria. Progress, Problems and Perspectives. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:1-10 [Conf ] Mariki M. Eloff , Sebastiaan H. von Solms Information Security: Process Evaluation and Product Evaluation. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:11-18 [Conf ] Helen L. Armstrong Managing Information Security in Healthcare - an Action Research Experience. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:19-28 [Conf ] Rossouw von Solms , Helen van de Haar From Trusted Information Security Controls to a Trusted Information Security Environment. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:29-36 [Conf ] Theodore Tryfonas , Dimitris Gritzalis , Spyros Kokolakis A Qualitative Approach to Information Availability. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:37-48 [Conf ] Sokratis K. Katsikas A Postgraduate Programme on Information and Communication Systems Security. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:49-58 [Conf ] Elmarie von Solms , Sebastiaan H. von Solms Information Security Management Through Measurement. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:59-68 [Conf ] Jianchun Jiang , Weifeng Chen , Sihan Qing , Dengguo Feng The Defense Framework for Large-scale Computer Network System. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:69-78 [Conf ] Wolfgang Eßmayr , Edgar Weippl Identity Mapping: An Approach to Unravel Enterprise Security Management Policies. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:79-88 [Conf ] Herbert Leitold , Peter Lipp , Andreas Sterbenz Independent Policy Oriented Layering of Security Services. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:89-98 [Conf ] Robert Willison Reducing Computer Fraud Through Situational Crime Prevention. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:99-109 [Conf ] Mikko T. Siponen Policies for Construction of Information Systems' Security Guidelines: Five Approaches. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:111-120 [Conf ] C. P. Louwrens , Sebastiaan H. von Solms "DNA-proofing" for Computer Systems - A New Approach to Computer Security? [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:121-129 [Conf ] Costas Lambrinoudakis Using Smart Cards in an Educational Environment: Services and Security Features. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:131-140 [Conf ] Alida Liebenberg , Jan H. P. Eloff MASS: Model for an Auditing Security System. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:141-150 [Conf ] Steven Dawson , Sabrina De Capitani di Vimercati , Patrick Lincoln , Pierangela Samarati Classifying Information for External Release. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:151-160 [Conf ] Yongge Wang Using Mobile Agent Results to Create Hard-to-Detect Computer Viruses. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:161-170 [Conf ] Jiahai Yang , Peng Ning , Xiaoyang Sean Wang , Sushil Jajodia CARDS: A Distributed System for Detecting Coordinated Attacks. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:171-180 [Conf ] Petar Horvatic , Jian Zhao , Niels J. Thorwirth Robust Audio Watermarking Based on Secure Spread Spectrum and Auditory Perception Model. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:181-190 [Conf ] Sun Yongxing , Wang Xinmei A Simple and Efficient Approach to Verfying Cryptographic Protocols. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:191-199 [Conf ] Wenling Wu , Dengguo Feng , Sihan Qing Power Analysis of RC6 and Serpent. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:201-209 [Conf ] Wang Mingsheng , Sihan Qing , Dengguo Feng A Simple Algorithm for Computing Several Sequences Synthesis. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:211-220 [Conf ] Claudia Eckert , Florian Erhard , Johannes Geiger GSFS - A New Group-Aware Cryptographic File System. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:221-230 [Conf ] Herbert Leitold , Wolfgang Mayerwieser , Udo Payer , Karl C. Posch , Reinhard Posch , Johannes Wolkerstorfer Robustness-Agile Encryptor for ATM Networks. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:231-240 [Conf ] Jinhui Chao , Kazuto Matsuo , Shigeo Tsujii Fast Construction of Secure Discrete Logarithm Problems over Jacobian Varieties. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:241-250 [Conf ] Johann Großschädl A New Serial/Parallel Architecture for a Low Power Modular Multiplier. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:251-260 [Conf ] Haizhi Xu , Changwei Cui , Ying Lin , Tiejian Luo , Zhanqiu Dong Defending Against Null Calls Stream Attacks by Using a Double-Threshold Dynamic Filter. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:261-270 [Conf ] Steve Kremer , Olivier Markowitch A Multi-Party Non-Repudiation Protocol. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:271-280 [Conf ] Shaoquan Jiang , Dengguo Feng , Sihan Qing Analysis and Design of E-voting Protocol. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:281-290 [Conf ] Vladimir I. Gorodetski , Igor V. Kotenko , Victor A. Skormin Integrated Multi-Agent Approach to Network Security Assurance: Models of Agents' Community. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:291-300 [Conf ] Jussipekka Leiwo , Tuomas Aura , Pekka Nikander Towards Network Denial of Service Resistant Protocols. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:301-310 [Conf ] Elton Saul , Andrew Hutchison A Generic Graphical Specification Environment for Security Protocol Modelling. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:311-320 [Conf ] Rosanna Y. Chan , Jonathan C. Wong , Alex C. Chan Anonymous Electronic Voting System with Non-Transferable Voting Passes. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:321-330 [Conf ] Olivier Paul , Maryline Laurent Improving Packet Filters Management through Automatic and Dynamic Schemes. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:331-340 [Conf ] Damian G. Cholewka , Reinhardt A. Botha , Jan H. P. Eloff A Context-Sensitive Access Control Model and Prototype Implementation. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:341-350 [Conf ] Ernesto Damiani , Sabrina De Capitani di Vimercati , Stefano Paraboschi , Pierangela Samarati Regulating Access To Semistructured Information on the Web. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:351-360 [Conf ] Gregory Neven , Frank Piessens , Bart De Decker On the Practical Feasibiltiy of Secure Distributed Computing: A Case Study. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:361-370 [Conf ] Michael Hitchens , Vijay Varadharajan Elements of a Language for Role-Based Access Control. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:371-380 [Conf ] Jussipekka Leiwo , Christoph Hänle , Philip Homburg , Andrew S. Tanenbaum Disallowing Unauthorized State Changes of Distributed Shared Objects. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:381-390 [Conf ] Ian R. Greenshields , Zhihong Yang Framework for Security Analysis and Access Control in a Distributed Service Medical Imaging Network. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:391-400 [Conf ] Mikko T. Siponen On the Role of Human Morality in Information System Security: The Problems of Descriptivism and Non-descriptive Foundations. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:401-410 [Conf ] Matthew J. Warren , William Hutchinson Information Warfare: Fact or Fiction? [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:411-420 [Conf ] Frans A. Lategan , Martin S. Olivier Enforcing Privacy by Withholding Private Information. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:421-430 [Conf ] Gregory J. Kirsch , Tim Tingkang Xia The Changing Roles of Patent and Copyright Protection for Software and Communication Technology in the Internet Age. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:431-440 [Conf ] Les Labuschagne A Framework for Electronic Commerce Security. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:441-450 [Conf ] Feng Bao , Robert H. Deng , Jianying Zhou Electronic Payment Systems with Fair On-line Verification. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:451-460 [Conf ] Fangguo Zhang , Futai Zhang , Yumin Wang Fair Electronic Cash Systems with Multiple Banks. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:461-470 [Conf ] Anthony H. W. Chan , Caris K. M. Wong , Tsz Yeung Wong , Michael R. Lyu Securing Mobile Agents for Electronic Commerce: An Experiment. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:471-480 [Conf ] Antonio Corradi , Rebecca Montanari , Cesare Stefanelli , Diana Berbecaru , Antonio Lioy , Fabio Maino A Flexible Management Framework for Certificate Status Validation. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:481-490 [Conf ] Bart De Win , Jan Van den Bergh 0002 , Frank Matthijs , Bart De Decker , Wouter Joosen A Security Architecture for Electronic Commerce Applications. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:491-500 [Conf ] Yiqun Lisa Yin On the Development of the Advanced Encryption Standard. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:503-504 [Conf ] Xuejia Lai Public Key Infrastructure: Managing the e-Business Security. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:505-505 [Conf ]