The SCEAS System
Navigation Menu

Conferences in DBLP

Information Security (sec)
2009 (conf/sec/2009)


  1. Flexible and Transparent User Authentication for Mobile Devices. [Citation Graph (, )][DBLP]


  2. Combining Authentication, Reputation and Classification to Make Phishing Unprofitable. [Citation Graph (, )][DBLP]


  3. Audio CAPTCHA for SIP-Based VoIP. [Citation Graph (, )][DBLP]


  4. Roving Bugnet: Distributed Surveillance Threat and Mitigation. [Citation Graph (, )][DBLP]


  5. On Robust Covert Channels Inside DNS. [Citation Graph (, )][DBLP]


  6. Discovering Application-Level Insider Attacks Using Symbolic Execution. [Citation Graph (, )][DBLP]


  7. Custom JPEG Quantization for Improved Iris Recognition Accuracy. [Citation Graph (, )][DBLP]


  8. On the IPP Properties of Reed-Solomon Codes. [Citation Graph (, )][DBLP]


  9. A Generic Authentication LoA Derivation Model. [Citation Graph (, )][DBLP]


  10. Media-Break Resistant eSignatures in eGovernment: An Austrian Experience. [Citation Graph (, )][DBLP]


  11. How to Bootstrap Security for Ad-Hoc Network: Revisited. [Citation Graph (, )][DBLP]


  12. Steganalysis of Hydan. [Citation Graph (, )][DBLP]


  13. On the Impossibility of Detecting Virtual Machine Monitors. [Citation Graph (, )][DBLP]


  14. Implementation of a Trusted Ticket System. [Citation Graph (, )][DBLP]


  15. A Policy Based Approach for the Management of Web Browser Resources to Prevent Anonymity Attacks in Tor. [Citation Graph (, )][DBLP]


  16. A Policy Language for Modelling Recommendations. [Citation Graph (, )][DBLP]


  17. On the Security Validation of Integrated Security Solutions. [Citation Graph (, )][DBLP]


  18. Verification of Security Policy Enforcement in Enterprise Systems. [Citation Graph (, )][DBLP]


  19. Optimization of the Controlled Evaluation of Closed Relational Queries. [Citation Graph (, )][DBLP]


  20. Collaborative Privacy - A Community-Based Privacy Infrastructure. [Citation Graph (, )][DBLP]


  21. Security and Privacy Improvements for the Belgian eID Technology. [Citation Graph (, )][DBLP]


  22. A Structured Security Assessment Methodology for Manufacturers of Critical Infrastructure Components. [Citation Graph (, )][DBLP]


  23. Mining Stable Roles in RBAC. [Citation Graph (, )][DBLP]


  24. Privacy-Preserving Content-Based Publish/Subscribe Networks. [Citation Graph (, )][DBLP]


  25. Broadcast Encryption for Differently Privileged. [Citation Graph (, )][DBLP]


  26. Ontology-Based Secure XML Content Distribution. [Citation Graph (, )][DBLP]


  27. NGBPA Next Generation BotNet Protocol Analysis. [Citation Graph (, )][DBLP]


  28. Non-repudiation Analysis with LySa. [Citation Graph (, )][DBLP]


  29. A Provably Secure Secret Handshake with Dynamic Controlled Matching. [Citation Graph (, )][DBLP]


  30. Towards a Theory of White-Box Security. [Citation Graph (, )][DBLP]


  31. On a Taxonomy of Delegation. [Citation Graph (, )][DBLP]


  32. Efficient Key Management for Enforcing Access Control in Outsourced Scenarios. [Citation Graph (, )][DBLP]


  33. A Probabilistic Bound on the Basic Role Mining Problem and Its Applications. [Citation Graph (, )][DBLP]


  34. Automating Access Control Logics in Simple Type Theory with LEO-II. [Citation Graph (, )][DBLP]


  35. In Law We Trust? Trusted Computing and Legal Responsibility for Internet Security. [Citation Graph (, )][DBLP]


  36. Persona: Network Layer Anonymity and Accountability for Next Generation Internet. [Citation Graph (, )][DBLP]


  37. Jason: A Scalable Reputation System for the Semantic Web. [Citation Graph (, )][DBLP]


  38. Which Web Browsers Process SSL Certificates in a Standardized Way? [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002