The SCEAS System
Navigation Menu

Conferences in DBLP

(sersc-isa)
2009 (conf/sersc-isa/2009)


  1. Update on SEED: SEED-192/256. [Citation Graph (, )][DBLP]


  2. A New Double-Block-Length Hash Function Using Feistel Structure. [Citation Graph (, )][DBLP]


  3. The Dark Side of Timed Opacity. [Citation Graph (, )][DBLP]


  4. Certificateless Signature Scheme without Random Oracles. [Citation Graph (, )][DBLP]


  5. Fine-Grain Access Control Using Shibboleth for the Storage Resource Broker. [Citation Graph (, )][DBLP]


  6. Grouping Provenance Information to Improve Efficiency of Access Control. [Citation Graph (, )][DBLP]


  7. Tagging the Turtle: Local Attestation for Kiosk Computing. [Citation Graph (, )][DBLP]


  8. Selective Regression Test for Access Control System Employing RBAC. [Citation Graph (, )][DBLP]


  9. Formal Verification for Access Control in Web Information Sharing System. [Citation Graph (, )][DBLP]


  10. Adaptive Iris Segmentation. [Citation Graph (, )][DBLP]


  11. Recognizing Partially Occluded Faces from a Single Exemplar Image Per Person. [Citation Graph (, )][DBLP]


  12. Methodology and Tools of IS Audit and Computer Forensics - The Common Denominator. [Citation Graph (, )][DBLP]


  13. What about Vulnerability to a Fault Attack of the Miller's Algorithm During an Identity Based Protocol?. [Citation Graph (, )][DBLP]


  14. A New Strongly Secure Authenticated Key Exchange Protocol. [Citation Graph (, )][DBLP]


  15. Improved Implementations of Cryptosystems Based on Tate Pairing. [Citation Graph (, )][DBLP]


  16. Efficient Secure Multiparty Computation Protocol in Asynchronous Network. [Citation Graph (, )][DBLP]


  17. Clustering-Based Frequency l-Diversity Anonymization. [Citation Graph (, )][DBLP]


  18. Protect Disk Integrity: Solid Security, Fine Performance and Fast Recovery. [Citation Graph (, )][DBLP]


  19. A Kademlia-Based Node Lookup System for Anonymization Networks. [Citation Graph (, )][DBLP]


  20. A Computationally-Efficient Construction for the Matrix-Based Key Distribution in Sensor Network. [Citation Graph (, )][DBLP]


  21. Key-Insulated Encryption Based Key Pre-distribution Scheme for WSN. [Citation Graph (, )][DBLP]


  22. Securing Mobile Phone Calls with Identity-Based Cryptography. [Citation Graph (, )][DBLP]


  23. On the Security Properties and Attacks against Mobile Agent Graph Head Sealing (MAGHS). [Citation Graph (, )][DBLP]


  24. A New Approach to Malware Detection. [Citation Graph (, )][DBLP]


  25. ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION. [Citation Graph (, )][DBLP]


  26. A Deployment Value Model for Intrusion Detection Sensors. [Citation Graph (, )][DBLP]


  27. Security Evaluation of an Intrusion Tolerant Web Service Architecture Using Stochastic Activity Networks. [Citation Graph (, )][DBLP]


  28. Counteracting Phishing Page Polymorphism: An Image Layout Analysis Approach. [Citation Graph (, )][DBLP]


  29. Signaling-Oriented DoS Attacks in UMTS Networks. [Citation Graph (, )][DBLP]


  30. Detecting DDoS Attacks Using Dispersible Traffic Matrix and Weighted Moving Average. [Citation Graph (, )][DBLP]


  31. Attack Patterns Discovery by Frequent Episodes Mining from Honeypot Systems. [Citation Graph (, )][DBLP]


  32. Efficient and Automatic Instrumentation for Packed Binaries. [Citation Graph (, )][DBLP]


  33. Secure Cover Selection Steganography. [Citation Graph (, )][DBLP]


  34. Side-Channel Leakage in Masked Circuits Caused by Higher-Order Circuit Effects. [Citation Graph (, )][DBLP]


  35. Performance Analysis of Digital Secure Voice Transmission over HF Radio Channel. [Citation Graph (, )][DBLP]


  36. Energy Analysis of Multimedia Video Streaming on Mobile Devices. [Citation Graph (, )][DBLP]


  37. Combating Index Poisoning in P2P File Sharing. [Citation Graph (, )][DBLP]


  38. A Cryptanalytic View of the NSA's Skipjack Block Cipher Design. [Citation Graph (, )][DBLP]


  39. MinuCode: A Fixed-Value Representation of Fingerprint Minutiae for Biometric Cryptosystem. [Citation Graph (, )][DBLP]


  40. Self-initialized Distributed Certificate Authority for Mobile Ad Hoc Network. [Citation Graph (, )][DBLP]


  41. Design and Delivery of Undergraduate IT Security Management Course. [Citation Graph (, )][DBLP]


  42. Secure Multi-party Computation Using Virtual Parties for Computation on Encrypted Data. [Citation Graph (, )][DBLP]


  43. Using a Link Metric to Improve Communication Mechanisms and Real-Time Properties in an Adaptive Middleware for Heterogeneous Sensor Networks. [Citation Graph (, )][DBLP]


  44. Performance Evaluation of DSR in Multi-services Ad Hoc Networks. [Citation Graph (, )][DBLP]


  45. Implementation and Evaluation of WiMedia MAC LSI. [Citation Graph (, )][DBLP]


  46. A Reliable and Efficient Pedal Back Data Disseminating Scheme for Ad-Hoc WSNs. [Citation Graph (, )][DBLP]


  47. Improved Location Acquisition Algorithms for the Location-Based Alert Service. [Citation Graph (, )][DBLP]


  48. An Enhanced Trust Center Based Authentication in ZigBee Networks. [Citation Graph (, )][DBLP]


  49. Sensor Disposition Problem in Wireless Ad-Hoc Sensor Networks. [Citation Graph (, )][DBLP]


  50. Performance Evaluation of Cost Effective Routing for Packet Transmissions in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  51. Energy Lesser Broadcasting Algorithms Using Adjustable Transmission Ranges in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  52. A Multi-Path Routing Supported Scheduling Algorithm for Multi-Channel Single-Transceiver Wireless Mesh Networks. [Citation Graph (, )][DBLP]


  53. Predictive Scheme for Location Service in Mobile Ad-Hoc Networks. [Citation Graph (, )][DBLP]


  54. An Efficient Hybrid Routing Approach for Hybrid Wireless Mesh Networks. [Citation Graph (, )][DBLP]


  55. Relationship between Motivation and Satisfaction of Online Computer Games: Evidence from Adolescent Players Using Wireless Service in Taiwan. [Citation Graph (, )][DBLP]


  56. DISHES: A Distributed Shell System for Ubiquitous Computing. [Citation Graph (, )][DBLP]


  57. Error Control Scheme of Hybrid ARQ Based on Majority Voting Bit by Bit. [Citation Graph (, )][DBLP]


  58. Secure Error-Correction Network Coding in a Randomized Setting. [Citation Graph (, )][DBLP]


  59. Bayesian Approach Based Comment Spam Defending Tool. [Citation Graph (, )][DBLP]


  60. An Improved Secure Identity-Based On-Line/Off-Line Signature Scheme. [Citation Graph (, )][DBLP]


  61. Honeybee-Based Model to Detect Intrusion. [Citation Graph (, )][DBLP]


  62. A Data Mining Framework for Building Intrusion Detection Models Based on IPv6. [Citation Graph (, )][DBLP]


  63. FPGA Implementation of Elliptic Curve Point Multiplication over GF(2191). [Citation Graph (, )][DBLP]


  64. A Forward-Secrecy WTLS Handshake Protocol Based on XTR. [Citation Graph (, )][DBLP]


  65. Application of 2D Barcode in Hardcopy Document Verification System. [Citation Graph (, )][DBLP]


  66. Protecting Global SOA from DoS and Other Security Threats. [Citation Graph (, )][DBLP]


  67. CRYPTEX Model for E-Commercial Contract of Software Source Code Using Secrete Sharing Scheme. [Citation Graph (, )][DBLP]


  68. HOTP-Based User Authentication Scheme in Home Networks. [Citation Graph (, )][DBLP]


  69. A Comparative Analysis of HC-128 and Rabbit Encryption Schemes for Pervasive Computing in WSN Environment. [Citation Graph (, )][DBLP]


  70. A Comparative Analysis of PKC and Semi-PKC Based Key Management Schemes for Hierarchical Sensor Networks. [Citation Graph (, )][DBLP]


  71. A Mathematical Approach towards Trust Based Security in Pervasive Computing Environment. [Citation Graph (, )][DBLP]


  72. A Secure Group Rekeying Scheme with Compromised Node Revocation in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  73. Fault Tolerant Secure Routing in Cluster Based Mobile Sensor Networks. [Citation Graph (, )][DBLP]


  74. Hardware-Based Random Number Generation in Wireless Sensor Networks(WSNs). [Citation Graph (, )][DBLP]


  75. Authenticated Encryption in WSN Using eSTREAM Ciphers. [Citation Graph (, )][DBLP]


  76. Aggregate and Verifiably Encrypted Signatures from Multilinear Maps without Random Oracles. [Citation Graph (, )][DBLP]


  77. Device Authentication/Authorization Protocol for Home Network in Next Generation Security. [Citation Graph (, )][DBLP]


  78. A Study on Feasibility and Establishment of a Security Grade Certification Scheme for the New IT Services. [Citation Graph (, )][DBLP]


  79. Domain Specific Intended Use Evaluation Method: Intrusion Detection Specific Intended Use Evaluation Method. [Citation Graph (, )][DBLP]


  80. A Study of International Trend Analysis on Web Service Vulnerabilities in OWASP and WASC. [Citation Graph (, )][DBLP]


  81. Cryptanalysis of Secure Key Exchange Protocol between STB and Smart Card in IPTV Broadcasting. [Citation Graph (, )][DBLP]


  82. Free-Form Deformation Axis Aligned Bounding Box. [Citation Graph (, )][DBLP]


  83. A Study on Mosaic Based CCTV System Using Localization. [Citation Graph (, )][DBLP]


  84. Selecting the Wireless Communication Methods for Establishing Ubiquitous City-Gas Facilities in Korea. [Citation Graph (, )][DBLP]


  85. Safety High Accuracy Context-Aware Matrix (CAM) Making Based on X.509 Proxy Certificate. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002