|
Conferences in DBLP
(securware) 2008 (conf/securware/2008)
Enhancing Trusted Platform Modules with Hardware-Based Virtualization Techniques. [Citation Graph (, )][DBLP]
A Secure Task Delegation Model for Workflows. [Citation Graph (, )][DBLP]
Formal Modeling of Authentication in SIP Registration. [Citation Graph (, )][DBLP]
Controlling Access to Location-Based Services in Vehicular Mobile Pervasive Environments. [Citation Graph (, )][DBLP]
A New Approach for Secure and Portable OS. [Citation Graph (, )][DBLP]
Distack -- A Framework for Anomaly-Based Large-Scale Attack Detection. [Citation Graph (, )][DBLP]
Team--Based MAC Policy over Security--Enhanced Linux. [Citation Graph (, )][DBLP]
Prototyping a New Identity Authentication Framework for IP Telephony. [Citation Graph (, )][DBLP]
Polynomial Heuristic Algorithms for Inconsistency Characterization in Firewall Rule Sets. [Citation Graph (, )][DBLP]
Security Patterns for Capturing Encryption-Based Access Control to Sensor Data. [Citation Graph (, )][DBLP]
Security Policy Management for Peer Group Meetings. [Citation Graph (, )][DBLP]
FEEPVR: First End-to-End Protocol to Secure Ad Hoc Networks with Variable Ranges against Wormhole Attacks. [Citation Graph (, )][DBLP]
Proving Trust Locally. [Citation Graph (, )][DBLP]
A Security Framework for Input Validation. [Citation Graph (, )][DBLP]
Defending E-Banking Services: Antiphishing Approach. [Citation Graph (, )][DBLP]
Preventing Insider Information Leakage for Enterprises. [Citation Graph (, )][DBLP]
Analysis of the Impact of Intensive Attacks on the Self-Similarity Degree of the Network Traffic. [Citation Graph (, )][DBLP]
Scalable Detection of SIP Fuzzing Attacks. [Citation Graph (, )][DBLP]
Authentication Mechanisms for Mobile Ad-Hoc Networks and Resistance to Sybil Attack. [Citation Graph (, )][DBLP]
The Automatic Discovery, Identification and Measurement of Botnets. [Citation Graph (, )][DBLP]
A Protection Scheme against the Attacks Deployed by Hiding the Violation of the Same Origin Policy. [Citation Graph (, )][DBLP]
Email Worm Mitigation by Controlling the Name Server Response Rate. [Citation Graph (, )][DBLP]
Anti-counterfeiting with a Random Pattern. [Citation Graph (, )][DBLP]
Efficient Anomaly Detection System for Mobile Handsets. [Citation Graph (, )][DBLP]
Providing Secure Access to Unsecure Web Services. [Citation Graph (, )][DBLP]
Towards Decentralised Security Policies for e-Health Collaborations. [Citation Graph (, )][DBLP]
Rating Agencies Interoperation for Peer-to-Peer Online Transactions. [Citation Graph (, )][DBLP]
Optimal Trust Network Analysis with Subjective Logic. [Citation Graph (, )][DBLP]
From Monitoring Templates to Security Monitoring and Threat Detection. [Citation Graph (, )][DBLP]
A Body-Centered Cubic Method for Key Agreement in Dynamic Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]
Family of Parameterized Hash Algorithms. [Citation Graph (, )][DBLP]
Public Key Cryptography: A Dynamical Systems Perspective. [Citation Graph (, )][DBLP]
A Related-Key Attack on TREYFER. [Citation Graph (, )][DBLP]
Security and Adoption of Internet Payment. [Citation Graph (, )][DBLP]
Appraisal of the Effectiveness and Efficiency of an Information Security Management System Based on ISO 27001. [Citation Graph (, )][DBLP]
Generic and Complete Three-Level Identity Management Model. [Citation Graph (, )][DBLP]
A Novel Approach against DoS Attacks in WiMAX Authentication Using Visual Cryptography. [Citation Graph (, )][DBLP]
A New Anti-phishing Method in OpenID. [Citation Graph (, )][DBLP]
Toward the Engineering of Security of Information Systems (ESIS): UML and the IS Confidentiality. [Citation Graph (, )][DBLP]
Designing an Undergraduate Software Security Course. [Citation Graph (, )][DBLP]
High-Speed Private Information Retrieval Computation on GPU. [Citation Graph (, )][DBLP]
Vulnerability Dependencies in Antivirus Software. [Citation Graph (, )][DBLP]
Security Governance for Enterprise VoIP Communication. [Citation Graph (, )][DBLP]
ToLeRating UR-STD. [Citation Graph (, )][DBLP]
Collaborative Approach to Automatic Classification of Heterogeneous Information Security. [Citation Graph (, )][DBLP]
Infusing Information Assurance into an Undergraduate CS Curriculum. [Citation Graph (, )][DBLP]
On the Portability of Trained Machine Learning Classifiers for Early Application Identification. [Citation Graph (, )][DBLP]
Activity- and Inactivity-BasedApproaches to Analyze an Assisted Living Environment. [Citation Graph (, )][DBLP]
Analysis of Computer Infection Risk Factors Based on Customer Network Usage. [Citation Graph (, )][DBLP]
Design-Time Learning for Operational Planning Improvement. [Citation Graph (, )][DBLP]
Molecular Approach Paves the Way towards High Resilience for Large Mission-Critical Information Systems. [Citation Graph (, )][DBLP]
Heuristics to Perform Molecular Decomposition of Large Mission-Critical Information Systems. [Citation Graph (, )][DBLP]
Generation of Diagnostic Plans for Large ICT Systems. [Citation Graph (, )][DBLP]
Dependability Analysis of Information Systems with Hierarchical Reconfiguration of Services. [Citation Graph (, )][DBLP]
Hierarchical Approach to Dependability Analysis of Information Systems by Modeling and Simulation. [Citation Graph (, )][DBLP]
Towards the Definition of a Web Service Based Management Framework. [Citation Graph (, )][DBLP]
Dependability and Security Metrics in Controlling Infrastructure. [Citation Graph (, )][DBLP]
Advanced Rule-Based Techniques in Mission Critical Systems. [Citation Graph (, )][DBLP]
Fast Algorithms for Local Inconsistency Detection in Firewall ACL Updates. [Citation Graph (, )][DBLP]
Event-Driven Architecture for Intrusion Detection Systems Based on Patterns. [Citation Graph (, )][DBLP]
Agent Based Approach to Events Monitoring in Complex Information Systems. [Citation Graph (, )][DBLP]
A Synchronization Attack and Defense in Energy-Efficient Listen-Sleep Slotted MAC Protocols. [Citation Graph (, )][DBLP]
On System Security Metrics and the Definition Approaches. [Citation Graph (, )][DBLP]
Policy-Driven System Configuration for Dependability. [Citation Graph (, )][DBLP]
A Dependability Case Approach to the Assessment of IP Networks. [Citation Graph (, )][DBLP]
|