Conferences in DBLP
(secrypt) 2006 (conf/secrypt/2006)
Jan Jürjens Model-Based Security Engineering. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:- [Conf ] Thomas Greene Redefining the Market Place: Only the Numbers are Different? [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:- [Conf ] Anisse Taleb Advances in Speech and Audio Coding and its Applications for Mobile Multimedia. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:- [Conf ] Manu Malek IT Security Forensics: Promises and Shortcomings. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:- [Conf ] David A. Marca E-Business Strategy - Charting a Way through Uncertain Waters of Electronic Commerce. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:- [Conf ] Fernando Pereira Multimedia Representation in MPEG Standards: Achievements and Challenges. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:- [Conf ] David A. Marca Project Management for E-Business Initiatives . Project Framework, Proven Practices, Coordinated Work, Focused Sub-Teams. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:- [Conf ] Les Barclay Wireless Communications, a new Emphasis for Effective Use of the Radio Spectrum. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:- [Conf ] Behnam Sattarzadeh , Mahdi Asadpour , Rasool Jalili Security Enhancement for a Low Computation Cost User Authentication Scheme. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:5-8 [Conf ] R. Ricci , Gérard Chollet , M. V. Crispino , S. Jassim , Jacques Koreman , Andrew C. Morris , M. Olivar-Dimas , Sonia Garcia-Salicetti , Pedro Soria-Rodriguez The "SECUREPHONE" - A Mobile Phone with Biometric Authentication and e-Signature Support for Dealing Secure Transactions on the Fly. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:9-16 [Conf ] Javier Hernando , Mireia Farrús , Pascual Ejarque , Ainara Garde , Jordi Luque Person Verification by Fusion of Prosodic, Voice Spectral and Facial Parameters. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:17-23 [Conf ] Najla Arfaoui , Farah Jemili , Montaceur Zaghdoud , Mohamed Ben Ahmed Comparative Study between Bayesian Network and Possibilistic Network in Intrusion Detection. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:24-31 [Conf ] Nathalie Dagorn Intrusion Detection for Web Applications (Short Version). [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:32-39 [Conf ] Zouheir Trabelsi , Khaled Shuaib Spoofed ARP Packets Detection in Switched LAN Networks. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:40-47 [Conf ] Abdoul Karim Ganame , Julien Bourgeois , Renaud Bidou , François Spies Evaluation of the Intrusion Detection Capabilities and Performance of a Security Operation Center. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:48-55 [Conf ] Juan Manuel García , Tomás Navarrete , Carlos Orozco Workload Hidden Markov Model for Anomaly Detection. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:56-59 [Conf ] Marianne Azer , Sherif El-Kassas , Magdi M. S. El-Soudani Using Attack Graphs in Ad Hoc Networks - For Intrusion Prediction Correlation and Detection. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:63-68 [Conf ] Chunren Lai , Chang N. Zhang Quantitative Analysis and Enforcement of the Principle of Least Privilege in Role-Based. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:69-74 [Conf ] Kun Huang , Dafang Zhang On the Self-Similarity of the 1999 DARPA/Lincoln Laboratory Evaluation Data. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:75-79 [Conf ] Wenhua Qi Access Control and Joint Management for Collaborative Peer Groups. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:83-86 [Conf ] Ahmed Reda Kaced , Jean-Claude Moissinac Protecting Adaptive Multimedia Delivery and Adaptation Using Proxy Based Approach. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:87-90 [Conf ] Rafael Martínez-Peláez , Francisco Rico-Novella , Luis A. Zarza-López Digital Pseudonym Identity for E-Commerce. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:91-94 [Conf ] Gregory V. Bard A Challenging but Feasible Blockwise-Adaptive Chosen-Plaintext Attack on SSL. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:99-109 [Conf ] Ines Feki , Xiaoli Zheng , Mohammed Achemlal , Ahmed Serhrouchni Internet Routing Security: An Approach to Detect and to React to Incorrect Advertisements. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:110-117 [Conf ] Amir Herzberg , Igal Yoffe Layered Architecture for Secure E-Commerce Applications. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:118-125 [Conf ] Adam Wierzbicki Trust Management without Reputation in P2P Games. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:126-134 [Conf ] Chuan-Wen Loe , Khoongming Khoo Protecting Cipher Block Chaining Against Adaptive Chosen Plaintext Attack. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:135-140 [Conf ] Kan Yasuda , Kazumaro Aoki , Eiichiro Fujisaki , Atsushi Fujioka Forward-Secure Authenticated-Encryption in Multi-Receiver Setting. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:141-148 [Conf ] Gabriel Maciá-Fernández , Jesús E. Díaz-Verdejo , Pedro Garcia-Teodoro On the Design of a Low-Rate DoS Attack Against Iterative Servers. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:149-156 [Conf ] Pascal Urien , Mohamad Badra Secure Access Modules for Identity Protection over the EAP-TLS - Smartcard Benefits for User Anonymity in Wireless Infrastructures. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:157-163 [Conf ] Adrian Leung , Chris J. Mitchell A Service Discovery Threat Model for Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:167-174 [Conf ] Rehab K. El Nemr , Imane Aly Saroit Ismail , S. H. Ahmed Action-Triggered Public-Key System for GSM Using RSA with Phone-Dependent Encryption. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:175-182 [Conf ] Steffen Fries Security Considerations in Current VoIP Protocols. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:183-191 [Conf ] Ventzislav Nikov A DoS Attack Against the Integrity-Less ESP (IPSEC). [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:192-199 [Conf ] Antonio Ruiz-Martínez , Antonio F. Gómez-Skarmeta , Óscar Cánovas Reverte Combination of a Smartcard E-Purse and E-Coin to Make Electronic Payments on the Internet. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:203-206 [Conf ] Stefan Rass , Mohamed Ali Sfaxi , Solange Ghernaouti-Helie Achieving Unconditional Security in Existing Networks Using Quantum Cryptography. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:207-210 [Conf ] M. Amaç Güvensan , A. Gökhan Yavuz Protocol Independent Lightweight Secure Communication. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:211-217 [Conf ] Hongxia Jin , Jeffory B. Lotspiech , Mario Blaum Traitor Tracing for Subscription-Based Systems. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:223-228 [Conf ] Carlos Serrão , Miguel Dias , Jaime Delgado Digital Object Rights Management - Interoperable Client-side DRM Middleware. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:229-236 [Conf ] Robert P. McEvoy , Colin C. Murphy Efficient All-or-Nothing Encryption Using CTR Mode. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:237-245 [Conf ] Lars R. Knudsen , Søren S. Thomsen Proposals for Iterated Hash Functions. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:246-253 [Conf ] Christophe Nègre Parallel Multiplication in F2n Using Condensed Matrix Representation. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:254-259 [Conf ] Markku-Juhani Olavi Saarinen Chosen-IV Statistical Attacks on eStream Ciphers. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:260-266 [Conf ] Wang Lianhai , Manu Malek Digital Contract Signature Scheme Based on Multiple Cryptosystem. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:267-274 [Conf ] Bartek Gedrojc , Kathy Cartrysse , Jan C. A. van der Lubbe Private Bidding for Mobile Agents. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:277-282 [Conf ] Hiroshi Toyoizumi An Infinite Phase-Size BMAP/M/1 Queue and its Application to Secure Group Communication. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:283-288 [Conf ] Christian Veigner , Chunming Rong On Use of Identity-Based Encryption for Secure Emailing. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:289-296 [Conf ] Chun-Hua Chen , Gwoboa Horng More Robust Private Information. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:297-302 [Conf ] Dumitru Dan Burdescu , Liana Stanescu An Algorithm for Authentication of Digital Images. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:303-308 [Conf ] Francisco Pimenta , Carlos Serrão Using OMA DRM 2.0 Protected Content - Ogg Vorbis Protected Audio under Symbian OS. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:311-315 [Conf ] Luis Zarza , Josep Pegueroles , Miguel Soriano , Rafael Martínez Design of Cryptographic Protocols by Means of Genetic Algorithms Techniques. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:316-319 [Conf ] Christophe Nègre Finite Field Multiplication in Lagrange Representation Using Fast Fourrier Transform. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:320-323 [Conf ] Domenico Introna , Francescomaria Marino JASTEG2000 - Steganography for JPEG2000 Coded Images. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:329-336 [Conf ] Igor V. Kotenko , Mikhail Stepashkin Network Security Evaluation Based on Simulation of Malfactor's Behavior. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:339-344 [Conf ] Chun Qi , Haitao Zhou , Bin Long Smooth Blocks-Based Blind Watermarking Algorithm in Compressed DCT Domain. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:347-350 [Conf ] Timothy E. Levin , Cynthia E. Irvine , Thuy D. Nguyen Least Privilege in Separation Kernels. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:355-362 [Conf ] Richard Whittaker , Gonzalo Argote-Garcia , Peter J. Clarke , Raimund K. Ege Collaboration Security for Modern Information Systems. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:363-370 [Conf ] Zheng Zhang , Walid Rjaibi Inter-Node Relationship Labeling: A Fine-Grained XML Access Control Implementation Using Generic Security Labels. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:371-378 [Conf ] Manuel Sánchez , Gabriel López , Antonio F. Gómez-Skarmeta , Óscar Cánovas Reverte Using Microsoft Office Infopath to Generate XACML Policies. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:379-386 [Conf ] Jarrod Trevathan , Wayne Read Secure Online English Auctions. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:387-396 [Conf ] Masaki Inamura , Toshiaki Tanaka , Toshiyuki Fujisawa , Kazuto Ogawa , Takeshi Kimura Flexible License Transfer System Using Mobile Terminal. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:397-404 [Conf ] Takahito Tsukuba , Kenichiro Noguchi Extending XML Signature and Applying it to Web Page Signing. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:407-412 [Conf ] Kari Anne Haaland , Chunming Rong Securing Web Services Using Identity-Based Encryption (IBE). [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:413-418 [Conf ] David G. Rosado , Carlos Gutiérrez , Eduardo Fernández-Medina , Mario Piattini Defining Viewpoints for Security Architectural Patterns. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:419-424 [Conf ] Carlos Gutiérrez , Eduardo Fernández-Medina , Mario Piattini Security Risk Analysis in Web Services Systems. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:425-430 [Conf ] Zaobin Gan , Vijay Varadharajan Design and Implementation of a Practical Secure Distributed Healthcare Application. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:431-436 [Conf ] Zaobin Gan , Dengwei Wei , Vijay Varadharajan Improving Software Security Through an Integrated Approach. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:437-442 [Conf ] Seyed Hamed Hassani , Mohammad Reza Aref A New (t, n) Multi-Secret Sharing Scheme Based on Linear Algebra. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:443-449 [Conf ] Jarrod Trevathan , Wayne Read Undesirable and Fraudulent Behaviour in Online Auctions. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:450-458 [Conf ] Sharon Nachtigal , Chris J. Mitchell Modelling E-Business Security Using Business Processes. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:459-464 [Conf ] Daniel Mellado , Eduardo Fernández-Medina , Mario Piattini Secure Information Systems Development - Based on a Security Requirements Engineering Process. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:467-470 [Conf ] Yi-qun Zhu , Jianhua Li , Quan-hai Zhang An Extended Role-Based Access Control for Web Services. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:471-474 [Conf ]