The SCEAS System
Navigation Menu

Conferences in DBLP

(secrypt)
2006 (conf/secrypt/2006)

  1. Jan Jürjens
    Model-Based Security Engineering. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:- [Conf]
  2. Thomas Greene
    Redefining the Market Place: Only the Numbers are Different? [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:- [Conf]
  3. Anisse Taleb
    Advances in Speech and Audio Coding and its Applications for Mobile Multimedia. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:- [Conf]
  4. Manu Malek
    IT Security Forensics: Promises and Shortcomings. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:- [Conf]
  5. David A. Marca
    E-Business Strategy - Charting a Way through Uncertain Waters of Electronic Commerce. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:- [Conf]
  6. Fernando Pereira
    Multimedia Representation in MPEG Standards: Achievements and Challenges. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:- [Conf]
  7. David A. Marca
    Project Management for E-Business Initiatives . Project Framework, Proven Practices, Coordinated Work, Focused Sub-Teams. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:- [Conf]
  8. Les Barclay
    Wireless Communications, a new Emphasis for Effective Use of the Radio Spectrum. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:- [Conf]
  9. Behnam Sattarzadeh, Mahdi Asadpour, Rasool Jalili
    Security Enhancement for a Low Computation Cost User Authentication Scheme. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:5-8 [Conf]
  10. R. Ricci, Gérard Chollet, M. V. Crispino, S. Jassim, Jacques Koreman, Andrew C. Morris, M. Olivar-Dimas, Sonia Garcia-Salicetti, Pedro Soria-Rodriguez
    The "SECUREPHONE" - A Mobile Phone with Biometric Authentication and e-Signature Support for Dealing Secure Transactions on the Fly. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:9-16 [Conf]
  11. Javier Hernando, Mireia Farrús, Pascual Ejarque, Ainara Garde, Jordi Luque
    Person Verification by Fusion of Prosodic, Voice Spectral and Facial Parameters. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:17-23 [Conf]
  12. Najla Arfaoui, Farah Jemili, Montaceur Zaghdoud, Mohamed Ben Ahmed
    Comparative Study between Bayesian Network and Possibilistic Network in Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:24-31 [Conf]
  13. Nathalie Dagorn
    Intrusion Detection for Web Applications (Short Version). [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:32-39 [Conf]
  14. Zouheir Trabelsi, Khaled Shuaib
    Spoofed ARP Packets Detection in Switched LAN Networks. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:40-47 [Conf]
  15. Abdoul Karim Ganame, Julien Bourgeois, Renaud Bidou, François Spies
    Evaluation of the Intrusion Detection Capabilities and Performance of a Security Operation Center. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:48-55 [Conf]
  16. Juan Manuel García, Tomás Navarrete, Carlos Orozco
    Workload Hidden Markov Model for Anomaly Detection. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:56-59 [Conf]
  17. Marianne Azer, Sherif El-Kassas, Magdi M. S. El-Soudani
    Using Attack Graphs in Ad Hoc Networks - For Intrusion Prediction Correlation and Detection. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:63-68 [Conf]
  18. Chunren Lai, Chang N. Zhang
    Quantitative Analysis and Enforcement of the Principle of Least Privilege in Role-Based. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:69-74 [Conf]
  19. Kun Huang, Dafang Zhang
    On the Self-Similarity of the 1999 DARPA/Lincoln Laboratory Evaluation Data. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:75-79 [Conf]
  20. Wenhua Qi
    Access Control and Joint Management for Collaborative Peer Groups. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:83-86 [Conf]
  21. Ahmed Reda Kaced, Jean-Claude Moissinac
    Protecting Adaptive Multimedia Delivery and Adaptation Using Proxy Based Approach. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:87-90 [Conf]
  22. Rafael Martínez-Peláez, Francisco Rico-Novella, Luis A. Zarza-López
    Digital Pseudonym Identity for E-Commerce. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:91-94 [Conf]
  23. Gregory V. Bard
    A Challenging but Feasible Blockwise-Adaptive Chosen-Plaintext Attack on SSL. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:99-109 [Conf]
  24. Ines Feki, Xiaoli Zheng, Mohammed Achemlal, Ahmed Serhrouchni
    Internet Routing Security: An Approach to Detect and to React to Incorrect Advertisements. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:110-117 [Conf]
  25. Amir Herzberg, Igal Yoffe
    Layered Architecture for Secure E-Commerce Applications. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:118-125 [Conf]
  26. Adam Wierzbicki
    Trust Management without Reputation in P2P Games. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:126-134 [Conf]
  27. Chuan-Wen Loe, Khoongming Khoo
    Protecting Cipher Block Chaining Against Adaptive Chosen Plaintext Attack. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:135-140 [Conf]
  28. Kan Yasuda, Kazumaro Aoki, Eiichiro Fujisaki, Atsushi Fujioka
    Forward-Secure Authenticated-Encryption in Multi-Receiver Setting. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:141-148 [Conf]
  29. Gabriel Maciá-Fernández, Jesús E. Díaz-Verdejo, Pedro Garcia-Teodoro
    On the Design of a Low-Rate DoS Attack Against Iterative Servers. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:149-156 [Conf]
  30. Pascal Urien, Mohamad Badra
    Secure Access Modules for Identity Protection over the EAP-TLS - Smartcard Benefits for User Anonymity in Wireless Infrastructures. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:157-163 [Conf]
  31. Adrian Leung, Chris J. Mitchell
    A Service Discovery Threat Model for Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:167-174 [Conf]
  32. Rehab K. El Nemr, Imane Aly Saroit Ismail, S. H. Ahmed
    Action-Triggered Public-Key System for GSM Using RSA with Phone-Dependent Encryption. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:175-182 [Conf]
  33. Steffen Fries
    Security Considerations in Current VoIP Protocols. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:183-191 [Conf]
  34. Ventzislav Nikov
    A DoS Attack Against the Integrity-Less ESP (IPSEC). [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:192-199 [Conf]
  35. Antonio Ruiz-Martínez, Antonio F. Gómez-Skarmeta, Óscar Cánovas Reverte
    Combination of a Smartcard E-Purse and E-Coin to Make Electronic Payments on the Internet. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:203-206 [Conf]
  36. Stefan Rass, Mohamed Ali Sfaxi, Solange Ghernaouti-Helie
    Achieving Unconditional Security in Existing Networks Using Quantum Cryptography. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:207-210 [Conf]
  37. M. Amaç Güvensan, A. Gökhan Yavuz
    Protocol Independent Lightweight Secure Communication. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:211-217 [Conf]
  38. Hongxia Jin, Jeffory B. Lotspiech, Mario Blaum
    Traitor Tracing for Subscription-Based Systems. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:223-228 [Conf]
  39. Carlos Serrão, Miguel Dias, Jaime Delgado
    Digital Object Rights Management - Interoperable Client-side DRM Middleware. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:229-236 [Conf]
  40. Robert P. McEvoy, Colin C. Murphy
    Efficient All-or-Nothing Encryption Using CTR Mode. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:237-245 [Conf]
  41. Lars R. Knudsen, Søren S. Thomsen
    Proposals for Iterated Hash Functions. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:246-253 [Conf]
  42. Christophe Nègre
    Parallel Multiplication in F2n Using Condensed Matrix Representation. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:254-259 [Conf]
  43. Markku-Juhani Olavi Saarinen
    Chosen-IV Statistical Attacks on eStream Ciphers. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:260-266 [Conf]
  44. Wang Lianhai, Manu Malek
    Digital Contract Signature Scheme Based on Multiple Cryptosystem. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:267-274 [Conf]
  45. Bartek Gedrojc, Kathy Cartrysse, Jan C. A. van der Lubbe
    Private Bidding for Mobile Agents. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:277-282 [Conf]
  46. Hiroshi Toyoizumi
    An Infinite Phase-Size BMAP/M/1 Queue and its Application to Secure Group Communication. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:283-288 [Conf]
  47. Christian Veigner, Chunming Rong
    On Use of Identity-Based Encryption for Secure Emailing. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:289-296 [Conf]
  48. Chun-Hua Chen, Gwoboa Horng
    More Robust Private Information. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:297-302 [Conf]
  49. Dumitru Dan Burdescu, Liana Stanescu
    An Algorithm for Authentication of Digital Images. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:303-308 [Conf]
  50. Francisco Pimenta, Carlos Serrão
    Using OMA DRM 2.0 Protected Content - Ogg Vorbis Protected Audio under Symbian OS. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:311-315 [Conf]
  51. Luis Zarza, Josep Pegueroles, Miguel Soriano, Rafael Martínez
    Design of Cryptographic Protocols by Means of Genetic Algorithms Techniques. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:316-319 [Conf]
  52. Christophe Nègre
    Finite Field Multiplication in Lagrange Representation Using Fast Fourrier Transform. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:320-323 [Conf]
  53. Domenico Introna, Francescomaria Marino
    JASTEG2000 - Steganography for JPEG2000 Coded Images. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:329-336 [Conf]
  54. Igor V. Kotenko, Mikhail Stepashkin
    Network Security Evaluation Based on Simulation of Malfactor's Behavior. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:339-344 [Conf]
  55. Chun Qi, Haitao Zhou, Bin Long
    Smooth Blocks-Based Blind Watermarking Algorithm in Compressed DCT Domain. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:347-350 [Conf]
  56. Timothy E. Levin, Cynthia E. Irvine, Thuy D. Nguyen
    Least Privilege in Separation Kernels. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:355-362 [Conf]
  57. Richard Whittaker, Gonzalo Argote-Garcia, Peter J. Clarke, Raimund K. Ege
    Collaboration Security for Modern Information Systems. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:363-370 [Conf]
  58. Zheng Zhang, Walid Rjaibi
    Inter-Node Relationship Labeling: A Fine-Grained XML Access Control Implementation Using Generic Security Labels. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:371-378 [Conf]
  59. Manuel Sánchez, Gabriel López, Antonio F. Gómez-Skarmeta, Óscar Cánovas Reverte
    Using Microsoft Office Infopath to Generate XACML Policies. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:379-386 [Conf]
  60. Jarrod Trevathan, Wayne Read
    Secure Online English Auctions. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:387-396 [Conf]
  61. Masaki Inamura, Toshiaki Tanaka, Toshiyuki Fujisawa, Kazuto Ogawa, Takeshi Kimura
    Flexible License Transfer System Using Mobile Terminal. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:397-404 [Conf]
  62. Takahito Tsukuba, Kenichiro Noguchi
    Extending XML Signature and Applying it to Web Page Signing. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:407-412 [Conf]
  63. Kari Anne Haaland, Chunming Rong
    Securing Web Services Using Identity-Based Encryption (IBE). [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:413-418 [Conf]
  64. David G. Rosado, Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini
    Defining Viewpoints for Security Architectural Patterns. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:419-424 [Conf]
  65. Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini
    Security Risk Analysis in Web Services Systems. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:425-430 [Conf]
  66. Zaobin Gan, Vijay Varadharajan
    Design and Implementation of a Practical Secure Distributed Healthcare Application. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:431-436 [Conf]
  67. Zaobin Gan, Dengwei Wei, Vijay Varadharajan
    Improving Software Security Through an Integrated Approach. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:437-442 [Conf]
  68. Seyed Hamed Hassani, Mohammad Reza Aref
    A New (t, n) Multi-Secret Sharing Scheme Based on Linear Algebra. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:443-449 [Conf]
  69. Jarrod Trevathan, Wayne Read
    Undesirable and Fraudulent Behaviour in Online Auctions. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:450-458 [Conf]
  70. Sharon Nachtigal, Chris J. Mitchell
    Modelling E-Business Security Using Business Processes. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:459-464 [Conf]
  71. Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini
    Secure Information Systems Development - Based on a Security Requirements Engineering Process. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:467-470 [Conf]
  72. Yi-qun Zhu, Jianhua Li, Quan-hai Zhang
    An Extended Role-Based Access Control for Web Services. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:471-474 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002