The SCEAS System
Navigation Menu

Conferences in DBLP

Information Security (sec)
2000 (conf/sec/2000)

  1. Kai Rannenberg
    IT Security Certification and Criteria. Progress, Problems and Perspectives. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:1-10 [Conf]
  2. Mariki M. Eloff, Sebastiaan H. von Solms
    Information Security: Process Evaluation and Product Evaluation. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:11-18 [Conf]
  3. Helen L. Armstrong
    Managing Information Security in Healthcare - an Action Research Experience. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:19-28 [Conf]
  4. Rossouw von Solms, Helen van de Haar
    From Trusted Information Security Controls to a Trusted Information Security Environment. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:29-36 [Conf]
  5. Theodore Tryfonas, Dimitris Gritzalis, Spyros Kokolakis
    A Qualitative Approach to Information Availability. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:37-48 [Conf]
  6. Sokratis K. Katsikas
    A Postgraduate Programme on Information and Communication Systems Security. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:49-58 [Conf]
  7. Elmarie von Solms, Sebastiaan H. von Solms
    Information Security Management Through Measurement. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:59-68 [Conf]
  8. Jianchun Jiang, Weifeng Chen, Sihan Qing, Dengguo Feng
    The Defense Framework for Large-scale Computer Network System. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:69-78 [Conf]
  9. Wolfgang Eßmayr, Edgar Weippl
    Identity Mapping: An Approach to Unravel Enterprise Security Management Policies. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:79-88 [Conf]
  10. Herbert Leitold, Peter Lipp, Andreas Sterbenz
    Independent Policy Oriented Layering of Security Services. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:89-98 [Conf]
  11. Robert Willison
    Reducing Computer Fraud Through Situational Crime Prevention. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:99-109 [Conf]
  12. Mikko T. Siponen
    Policies for Construction of Information Systems' Security Guidelines: Five Approaches. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:111-120 [Conf]
  13. C. P. Louwrens, Sebastiaan H. von Solms
    "DNA-proofing" for Computer Systems - A New Approach to Computer Security? [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:121-129 [Conf]
  14. Costas Lambrinoudakis
    Using Smart Cards in an Educational Environment: Services and Security Features. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:131-140 [Conf]
  15. Alida Liebenberg, Jan H. P. Eloff
    MASS: Model for an Auditing Security System. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:141-150 [Conf]
  16. Steven Dawson, Sabrina De Capitani di Vimercati, Patrick Lincoln, Pierangela Samarati
    Classifying Information for External Release. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:151-160 [Conf]
  17. Yongge Wang
    Using Mobile Agent Results to Create Hard-to-Detect Computer Viruses. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:161-170 [Conf]
  18. Jiahai Yang, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia
    CARDS: A Distributed System for Detecting Coordinated Attacks. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:171-180 [Conf]
  19. Petar Horvatic, Jian Zhao, Niels J. Thorwirth
    Robust Audio Watermarking Based on Secure Spread Spectrum and Auditory Perception Model. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:181-190 [Conf]
  20. Sun Yongxing, Wang Xinmei
    A Simple and Efficient Approach to Verfying Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:191-199 [Conf]
  21. Wenling Wu, Dengguo Feng, Sihan Qing
    Power Analysis of RC6 and Serpent. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:201-209 [Conf]
  22. Wang Mingsheng, Sihan Qing, Dengguo Feng
    A Simple Algorithm for Computing Several Sequences Synthesis. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:211-220 [Conf]
  23. Claudia Eckert, Florian Erhard, Johannes Geiger
    GSFS - A New Group-Aware Cryptographic File System. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:221-230 [Conf]
  24. Herbert Leitold, Wolfgang Mayerwieser, Udo Payer, Karl C. Posch, Reinhard Posch, Johannes Wolkerstorfer
    Robustness-Agile Encryptor for ATM Networks. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:231-240 [Conf]
  25. Jinhui Chao, Kazuto Matsuo, Shigeo Tsujii
    Fast Construction of Secure Discrete Logarithm Problems over Jacobian Varieties. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:241-250 [Conf]
  26. Johann Großschädl
    A New Serial/Parallel Architecture for a Low Power Modular Multiplier. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:251-260 [Conf]
  27. Haizhi Xu, Changwei Cui, Ying Lin, Tiejian Luo, Zhanqiu Dong
    Defending Against Null Calls Stream Attacks by Using a Double-Threshold Dynamic Filter. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:261-270 [Conf]
  28. Steve Kremer, Olivier Markowitch
    A Multi-Party Non-Repudiation Protocol. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:271-280 [Conf]
  29. Shaoquan Jiang, Dengguo Feng, Sihan Qing
    Analysis and Design of E-voting Protocol. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:281-290 [Conf]
  30. Vladimir I. Gorodetski, Igor V. Kotenko, Victor A. Skormin
    Integrated Multi-Agent Approach to Network Security Assurance: Models of Agents' Community. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:291-300 [Conf]
  31. Jussipekka Leiwo, Tuomas Aura, Pekka Nikander
    Towards Network Denial of Service Resistant Protocols. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:301-310 [Conf]
  32. Elton Saul, Andrew Hutchison
    A Generic Graphical Specification Environment for Security Protocol Modelling. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:311-320 [Conf]
  33. Rosanna Y. Chan, Jonathan C. Wong, Alex C. Chan
    Anonymous Electronic Voting System with Non-Transferable Voting Passes. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:321-330 [Conf]
  34. Olivier Paul, Maryline Laurent
    Improving Packet Filters Management through Automatic and Dynamic Schemes. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:331-340 [Conf]
  35. Damian G. Cholewka, Reinhardt A. Botha, Jan H. P. Eloff
    A Context-Sensitive Access Control Model and Prototype Implementation. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:341-350 [Conf]
  36. Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati
    Regulating Access To Semistructured Information on the Web. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:351-360 [Conf]
  37. Gregory Neven, Frank Piessens, Bart De Decker
    On the Practical Feasibiltiy of Secure Distributed Computing: A Case Study. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:361-370 [Conf]
  38. Michael Hitchens, Vijay Varadharajan
    Elements of a Language for Role-Based Access Control. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:371-380 [Conf]
  39. Jussipekka Leiwo, Christoph Hänle, Philip Homburg, Andrew S. Tanenbaum
    Disallowing Unauthorized State Changes of Distributed Shared Objects. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:381-390 [Conf]
  40. Ian R. Greenshields, Zhihong Yang
    Framework for Security Analysis and Access Control in a Distributed Service Medical Imaging Network. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:391-400 [Conf]
  41. Mikko T. Siponen
    On the Role of Human Morality in Information System Security: The Problems of Descriptivism and Non-descriptive Foundations. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:401-410 [Conf]
  42. Matthew J. Warren, William Hutchinson
    Information Warfare: Fact or Fiction? [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:411-420 [Conf]
  43. Frans A. Lategan, Martin S. Olivier
    Enforcing Privacy by Withholding Private Information. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:421-430 [Conf]
  44. Gregory J. Kirsch, Tim Tingkang Xia
    The Changing Roles of Patent and Copyright Protection for Software and Communication Technology in the Internet Age. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:431-440 [Conf]
  45. Les Labuschagne
    A Framework for Electronic Commerce Security. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:441-450 [Conf]
  46. Feng Bao, Robert H. Deng, Jianying Zhou
    Electronic Payment Systems with Fair On-line Verification. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:451-460 [Conf]
  47. Fangguo Zhang, Futai Zhang, Yumin Wang
    Fair Electronic Cash Systems with Multiple Banks. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:461-470 [Conf]
  48. Anthony H. W. Chan, Caris K. M. Wong, Tsz Yeung Wong, Michael R. Lyu
    Securing Mobile Agents for Electronic Commerce: An Experiment. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:471-480 [Conf]
  49. Antonio Corradi, Rebecca Montanari, Cesare Stefanelli, Diana Berbecaru, Antonio Lioy, Fabio Maino
    A Flexible Management Framework for Certificate Status Validation. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:481-490 [Conf]
  50. Bart De Win, Jan Van den Bergh 0002, Frank Matthijs, Bart De Decker, Wouter Joosen
    A Security Architecture for Electronic Commerce Applications. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:491-500 [Conf]
  51. Yiqun Lisa Yin
    On the Development of the Advanced Encryption Standard. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:503-504 [Conf]
  52. Xuejia Lai
    Public Key Infrastructure: Managing the e-Business Security. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:505-505 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002