Conferences in DBLP
Ruth Breu , Klaus Burger , Michael Hafner , Gerhard Popp Towards a Systematic Development of Secure Systems. [Citation Graph (0, 0)][DBLP ] WOSIS, 2004, pp:1-12 [Conf ] Gail-Joon Ahn , Seng-Phil Hong Group Hierarchies with Constrained User Assignment in Linux. [Citation Graph (0, 0)][DBLP ] WOSIS, 2004, pp:13-22 [Conf ] Christos K. Dimitriadis , Despina Polemi Risk Analysis of Biometric Systems. [Citation Graph (0, 0)][DBLP ] WOSIS, 2004, pp:23-32 [Conf ] Jan Guynes Clark , Nicole Beebe , Andrew G. Kotulic Integrating Security and Privacy Issues in System Design. [Citation Graph (0, 0)][DBLP ] WOSIS, 2004, pp:33-46 [Conf ] Juan Manuel Garcia Garcia Intrusion Risk Analysis and the Power Law Distribution of Attacks. [Citation Graph (0, 0)][DBLP ] WOSIS, 2004, pp:47-52 [Conf ] Roslan Ismail , Colin Boyd , Audun Jøsang , Selwyn Russell An Efficient Off-Line Reputation Scheme Using Articulated Certificates. [Citation Graph (0, 0)][DBLP ] WOSIS, 2004, pp:53-62 [Conf ] Javier Herranz A formal proof of security of Zhang and Kim's ID-based ring signature scheme. [Citation Graph (0, 0)][DBLP ] WOSIS, 2004, pp:63-72 [Conf ] Marino Tapiador , Juan A. Sigüenza B2C Internet Authentication method using Statistical Keystroke Biometrics. [Citation Graph (0, 0)][DBLP ] WOSIS, 2004, pp:73-78 [Conf ] Vasilios Katos Diffusion Behaviour of Cryptographic Primitives in Feistel Networks. [Citation Graph (0, 0)][DBLP ] WOSIS, 2004, pp:79-87 [Conf ] Dorgham Sisalem , Jiri Kuthan Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments. [Citation Graph (0, 0)][DBLP ] WOSIS, 2004, pp:88-98 [Conf ] Farookh Khadeer Hussain , Elizabeth Chang , Tharam S. Dillon Taxonomy of Trust Relationships in Peer-to-Peer (P2P) Communication. [Citation Graph (0, 0)][DBLP ] WOSIS, 2004, pp:99-103 [Conf ] Supakorn Kungpisdan , Bala Srinivasan , Phu Dung Le A Secure Prepaid Wireless Micropayment Protocol. [Citation Graph (0, 0)][DBLP ] WOSIS, 2004, pp:104-113 [Conf ] Ulf T. Mattsson A Practical Implementation of a Real-time Intrusion Prevention System for Commercial Enterprise Databases. [Citation Graph (0, 0)][DBLP ] WOSIS, 2004, pp:114-125 [Conf ] Richard Brinkman , Ling Feng , Jeroen Doumen , Pieter H. Hartel , Willem Jonker Efficient Tree Search in Encrypted Data. [Citation Graph (0, 0)][DBLP ] WOSIS, 2004, pp:126-135 [Conf ] Yibing Kong , Janusz R. Getta , Ping Yu , Jennifer Seberry A Generalized Policy Support System and Its Hierarchy Semantics. [Citation Graph (0, 0)][DBLP ] WOSIS, 2004, pp:136-145 [Conf ] Anat Hovav , John D'Arcy The Impact of Virus Attack Announcements on the Market Value of Firms. [Citation Graph (0, 0)][DBLP ] WOSIS, 2004, pp:146-156 [Conf ] Salem Aljareh , B. Nick Rossiter , Michael A. Heather A Formal Security Model for Collaboration in Multi-agency Networks. [Citation Graph (0, 0)][DBLP ] WOSIS, 2004, pp:157-169 [Conf ] Christian Tobias Security Analysis of MOR using GL(2, R) xTheta Zn . [Citation Graph (0, 0)][DBLP ] WOSIS, 2004, pp:170-179 [Conf ] Carlos Serrão , Gregor Siegert Open Secure Infrastructure to control User Access to multimedia content. [Citation Graph (0, 0)][DBLP ] WOSIS, 2004, pp:180-185 [Conf ] Weiliang Zhao , Vijay Varadharajan , George Bryan Fair Trading Protocol With Off-line Anonymous Credit Card Payment. [Citation Graph (0, 0)][DBLP ] WOSIS, 2004, pp:186-195 [Conf ] Roslan Ismail , Colin Boyd , Audun Jøsang , Selwyn Russell Private Reputation Schemes for P2P systems. [Citation Graph (0, 0)][DBLP ] WOSIS, 2004, pp:196-206 [Conf ] Víctor Méndez Muñoz , Julio César Hernández Castro , Jesús Carretero , Félix García Filtering spam at e-mail server level with improved CRM114. [Citation Graph (0, 0)][DBLP ] WOSIS, 2004, pp:207-216 [Conf ] Souhila Kaci , Abdeslam Ali-Laouar , Frédéric Cuppens Health care and social inference systems: An unauthorized inference control based on fuzzy logic. [Citation Graph (0, 0)][DBLP ] WOSIS, 2004, pp:217-226 [Conf ] Ioannis Priggouris , Stathes Hadjiefthymiades , Lazaros F. Merakos An XML framework for multi-level access control in the enterprise domain. [Citation Graph (0, 0)][DBLP ] WOSIS, 2004, pp:227-236 [Conf ] Erik Zenner On the Role of the Inner State Size in Stream Ciphers. [Citation Graph (0, 0)][DBLP ] WOSIS, 2004, pp:237-250 [Conf ] Bat-Odon Purevjii , Toshiyuki Amagasa , Sayaka Imai , Yoshinari Kanamori An Access Control Model for Geographic Data in an XML -based Framework. [Citation Graph (0, 0)][DBLP ] WOSIS, 2004, pp:251-260 [Conf ] Vipul Goyal Certificate Revocation Lists or Online Mechanisms. [Citation Graph (0, 0)][DBLP ] WOSIS, 2004, pp:261-268 [Conf ] Mariemma Inmaculada Yagüe del Valle , Antonio Mana , Francisco Sanchez Semantic Interoperability of Authorizations. [Citation Graph (0, 0)][DBLP ] WOSIS, 2004, pp:269-278 [Conf ] Zouheir Trabelsi , Hamza Rahmani Promiscuous Mode Detection Platform. [Citation Graph (0, 0)][DBLP ] WOSIS, 2004, pp:279-292 [Conf ] Carlos Gutiérrez , Eduardo Fernández-Medina , Mario Piattini Web Services Security: is the problem solved? [Citation Graph (0, 0)][DBLP ] WOSIS, 2004, pp:293-304 [Conf ] José María Sierra , Julio César Hernández Castro , Antonio Izquierdo , Arturo Ribagorda Secure Communications in Multi-Agent Systems Protecting KQML. [Citation Graph (0, 0)][DBLP ] WOSIS, 2004, pp:305-313 [Conf ] Ping Lin , K. Selçuk Candan Hiding Traversal of Tree Structured Data from Untrusted Data Stores. [Citation Graph (0, 0)][DBLP ] WOSIS, 2004, pp:314-323 [Conf ] Arnulfo Ochoa Indart , Jesús Arturo Pérez Díaz Analysis of WEP Performance on Mobile Devices. [Citation Graph (0, 0)][DBLP ] WOSIS, 2004, pp:324-331 [Conf ] Nimal Nissanke , Etienne J. Khayat Risk Based Security Analysis of Permissions in RBAC. [Citation Graph (0, 0)][DBLP ] WOSIS, 2004, pp:332-341 [Conf ] Carlos Villarrubia , Eduardo Fernández-Medina , Mario Piattini Towards a Classification of Security Metrics. [Citation Graph (0, 0)][DBLP ] WOSIS, 2004, pp:342-350 [Conf ] L. Javier García-Villalba , J. Hamilton Ortiz Monedero , R. Paucar Curasma Security in the Management of Networks with SNMPv3. [Citation Graph (0, 0)][DBLP ] WOSIS, 2004, pp:351-360 [Conf ]