The SCEAS System
Navigation Menu

Conferences in DBLP

Information Security (sec)
2004 (conf/sec/2004)

  1. Mohamed Hamdi, Noureddine Boudriga
    An Abstract Reduction Model for Computer Security Risk. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:1-16 [Conf]
  2. Vipin Swarup
    Remediation Graphs for Security Patch Management. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:17-28 [Conf]
  3. Lam-for Kwok, Dennis Longley
    Security Modelling for Risk Analysis. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:29-46 [Conf]
  4. Vincenzo Ciaschini, Roberto Gorrieri
    Contrasting Malicious Java Applets by Modifying the Java Virtual Machine. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:47-64 [Conf]
  5. Gerrit Rothmaier, Andre Pohl, Heiko Krumm
    Analyzing Network Management Effects with SPIN and cTLA. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:65-82 [Conf]
  6. Shuo Chen, Karthik Pattabiraman, Zbigniew Kalbarczyk, Ravishankar K. Iyer
    Formal Reasoning of Various Categories of Widely Exploited Security Vulnerabilities by Pointer Taintedness Semantics. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:83-100 [Conf]
  7. Vijay Masurkar, Simone Fischer-Hübner, Morton Swimmer
    Meeting the Global Challenges of Security Incident Response. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:101-118 [Conf]
  8. Petri Saloma, Ronja Addams-Moring, Teemupekka Virtanen
    Security in Globally Distributed Industrial Information Systems. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:119-134 [Conf]
  9. Sebastiaan H. von Solms, M. P. Hertenberger
    A Case For Information Ownership in ERP Systems. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:135-150 [Conf]
  10. Hristo Koshutanski, Fabio Massacci
    Interactive Access Control for Web Services. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:151-166 [Conf]
  11. Yvo Desmedt, Mike Burmester
    Identity-based Key Infrastructures (IKI). [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:167-176 [Conf]
  12. Hiroaki Kikuchi, Junji Nakazato
    ModInt: Compact Modular Arithmatic Class Library Available on Cellular Phone and its Application to Secure Electronic Voting System. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:177-192 [Conf]
  13. Semir Daskapan
    Dependable Security by Twisted Secret Sharing. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:193-208 [Conf]
  14. Eric Totel, Bernard Vivinis, Ludovic Mé
    A Language Driven IDS for Event and Alert Correlation. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:209-224 [Conf]
  15. Danny Nebenzahl, Avishai Wool
    Install-time Vaccination of Windows Executables to Defend Against Stack Smashing Attacks. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:225-240 [Conf]
  16. Yacine Bouzida, Sylvain Gombault
    Eigenconnections to Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:241-258 [Conf]
  17. Stefan Axelsson
    Visualising Intrusions: Watching the Webserver. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:259-274 [Conf]
  18. Paul Dowland, Steven Furnell
    A Long-term Trial of Keystroke Profiling using Digraph, Trigraph and Keyword Latencies. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:275-290 [Conf]
  19. Martín Abadi
    Trusted Computing, Trusted Third Parties, and Verified Communications. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:291-308 [Conf]
  20. Andrew Fritz, Jehan-François Pâris
    Maille Authentication - A Novel Protocol for Distributed Authentication. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:309-322 [Conf]
  21. Yong Song, Victor C. M. Leung, Konstantin Beznosov
    Supporting End-to-end Security across Proxies with Multiple-Channel SSL. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:323-338 [Conf]
  22. Pei-Ling Yu, Pan-Lung Tsai, Chin-Laung Lei
    A Content-Protection Scheme for Multi-Layered Reselling Structure. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:339-350 [Conf]
  23. Konstantinos Rantos, Constantinos Markantonakis
    An Asymmetric Cryptography Secure Channel Protocol for Smart Cards. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:351-366 [Conf]
  24. Antti Nuopponen, Sami Vaarala, Teemupekka Virtanen
    IPsec Clustering. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:367-380 [Conf]
  25. Olivier Heen, Jean-Pierre Andreaux, Nicolas Prigent
    Improving Secure Device Insertion in Home Ad-hoc Networks Keyword Latencies. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:381-394 [Conf]
  26. Flavio D. Garcia, Jaap-Henk Hoepman, Jeroen van Nieuwenhuizen
    Spam Filter Analysis. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:395-410 [Conf]
  27. Indrajit Ray, Eunjong Kim
    Collective Signature for Efficient Authentication of XML Documents. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:411-424 [Conf]
  28. Prakash Reddy, Robert N. Mayo, Eamonn O'Brien-Strain, Jim Rowson, Yuhong Xiong
    Updating Encrypted XML Documents on Untrusted Machines. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:425-440 [Conf]
  29. Lubica Liskova, Martin Stanek
    Efficient Simultaneous Contract Signing. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:441-456 [Conf]
  30. Jacques Demerjian, Ahmed Serhrouchni
    DHCP Authentication Using Certificates. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:457-472 [Conf]
  31. Aleksey Kurchuk, Angelos D. Keromytis
    Recursive Sandboxes: Extending Systrace To Empower Applications. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:473-488 [Conf]
  32. Vipul Goyal
    Fast Digital Certificate Revocation. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:489-500 [Conf]
  33. Robert Pinto, Lucila Ishitani, Virgilio Almeida, Wagner Meira Jr., Fabiano A. Fonseca, Fernando D. O. Castro
    MASKS: Managing Anonymity while Sharing Knowledge to Servers. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:501-516 [Conf]
  34. Idir Fodil, Vincent Jardin
    Security and Differentiated Hotspot Services Through Policy-based Management Architecture. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:517-532 [Conf]
  35. Ayan Roy Chowdhury, John S. Baras
    Key Management for Secure Multicast in Hybrid Satellite Networks. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:533-548 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002