The SCEAS System
Navigation Menu

Conferences in DBLP

Information Security (sec)
2005 (conf/sec/2005)

  1. Vincent Naessens, Bart De Decker, Liesje Demuynck
    Accountable Anonymous E-Mail. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:3-18 [Conf]
  2. Craig Pearce, Peter Bertók, Ron G. van Schyndel
    Protecting Consumer Data in Composite Web Services. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:19-34 [Conf]
  3. Albin Zuccato
    A Decision Matrix Approach. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:35-50 [Conf]
  4. Lech J. Janczewski, Victor Portougal
    Assignment of Security Clearances in an Organization. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:51-64 [Conf]
  5. Thomas Schlienger, Stephanie Teufel
    Tool Supported Management of Information Security Culture. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:65-78 [Conf]
  6. Sebastiaan H. von Solms, M. P. Hertenberger
    ERPSEC - A Reference Framework to Enhance Security in ERP Systems. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:79-94 [Conf]
  7. Yanjiang Yang, Feng Bao, Robert H. Deng
    A New Architecture for User Authentication and Key Exchange Using Password for Federated Enterprises. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:95-112 [Conf]
  8. I-Ming Tsai, Chia-Mu Yu, Wei-Ting Tu, Sy-Yen Kuo
    A Secure Quantum Communication Protocol Using Insecure Public Channels. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:113-126 [Conf]
  9. Joon S. Park, Pratheep Chandramohan, Ganesh Devarajan, Joseph Giordano
    Trusted Component Sharing by Runtime Test and Immunization for Survivable Distributed Systems. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:127-142 [Conf]
  10. Jiang-chun Ren, Kui Dai, Zhiying Wang, Xue-mi Zhao, Yuan-man Tong
    Design and Implementation a TPM Chip SUP320 by SOC. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:143-154 [Conf]
  11. Keisuke Ohmori, Ayako Suzuki, Mariko Kawabata, Ryu Matsushima, Manabu Ohmuro, Toshifumi Kai, Shigeru Nishiyama
    Mathematical Models of IP Traceback Methods and Their Verification. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:155-170 [Conf]
  12. Joseph K. Liu, Sandy H. Wong, Duncan S. Wong
    Transferable E-Cash Revisit. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:171-188 [Conf]
  13. Qiong Liu, Reihaneh Safavi-Naini, Nicholas Paul Sheppard
    A License Transfer System for Supporting Content Portability in Digital Rights Management. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:189-204 [Conf]
  14. Yongdong Wu, Feng Bao, Robert H. Deng
    Secure Person-To-Person Communications Based on Biometrics Signals. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:205-222 [Conf]
  15. Laurent Bussard, Walid Bagga
    Distance-Bounding Proof of Knowledge to Avoid Real-Time Attacks. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:223-238 [Conf]
  16. Kyung-jun Kim, HyunSook Kim, Sang-Don Lee, Ki Jun Han
    An Adaptive Multicast Polling Scheme for IEEE 802.11 Wireless LAN. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:239-250 [Conf]
  17. Thomas Peyrin, Serge Vaudenay
    The Pairing Problem with User Interaction. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:251-266 [Conf]
  18. Asad Ali, Karen Lu, Michael Montgomery
    Network Smart Card: A New Paradigm of Secure Online Transactions. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:267-280 [Conf]
  19. Rodrigo Roman, Jianying Zhou, Javier Lopez
    Protection Against Spam Using Pre-Challenges. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:281-294 [Conf]
  20. Anh Nguyen-Tuong, Salvatore Guarnieri, Doug Greene, Jeff Shirley, David Evans
    Automatically Hardening Web Applications Using Precise Tainting. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:295-308 [Conf]
  21. Vrizlynn L. L. Thing, Henry C. J. Lee, Morris Sloman
    Traffic Redirection Attack Protection System (TRAPS) - A Full-Fledged Adaptive DoS/DDoS Attack Mitigation Scheme. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:309-326 [Conf]
  22. John Haggerty, Qi Shi, Madjid Merabti
    Statistical Signatures for Early Detection of Flooding Denial-Of-Service Attacks. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:327-342 [Conf]
  23. Wayne Huang, J. L. Cong, Chien-Long Wu, Fan Zhao, Shyhtsun Felix Wu
    Design, Implementation, and Evaluation of "FRiTrace". [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:343-358 [Conf]
  24. Konstantinos Xinidis, Kostas G. Anagnostakis, Evangelos P. Markatos
    Design and Implementation of a High-Performance Network Intrusion Prevention System. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:359-374 [Conf]
  25. P. Akritidis, Evangelos P. Markatos, Michalis Polychronakis, Kostas G. Anagnostakis
    STRIDE: Polymorphic Sled Detection through Instruction Sequence Analysis. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:375-392 [Conf]
  26. Spyros Antonatos, Michalis Polychronakis, P. Akritidis, Kostas G. Anagnostakis, Evangelos P. Markatos
    Piranha: Fast and Memory-Efficient Pattern Matching for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:393-408 [Conf]
  27. Guilin Wang
    Designated-Verifier Proxy Signature Schemes. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:409-424 [Conf]
  28. Willy Susilo, Yi Mu
    Tripartite Concurrent Signatures. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:425-442 [Conf]
  29. Sherman S. M. Chow, Tsz Hon Yuen, Lucas Chi Kwong Hui, Siu-Ming Yiu
    Signcryption in Hierarchical Identity Based Cryptosystem. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:443-457 [Conf]
  30. Yongdong Wu, Tieyan Li, Robert H. Deng
    Protecting Group Dynamic Information in Large Scale Multicast Groups. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:459-476 [Conf]
  31. Shrikant Sundaram, Peter Bertók, Benjamin Burton
    Secure Group Communication with Distributed Generation of Private Keys in Ad-hoc Networks. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:477-492 [Conf]
  32. Jana Dittmann, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith
    Ensuring Media Integrity on Third-Party Infrastructures. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:493-508 [Conf]
  33. Hao-Tian Wu, Yiu-ming Cheung
    A New Fragile Mesh Watermarking Algorithm for Authentication. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:509-524 [Conf]
  34. Yuji Suga
    New Paradigm in Graph-Based Visual Secret Sharing Scheme by Accepting Reversal in Black-White Images. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:525-536 [Conf]
  35. John A. MacDonald, William G. Sirett, Chris J. Mitchell
    Overcoming Channel Bandwidth Constraints in Secure SIM Applications. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:539-550 [Conf]
  36. K. Papapanagiotou, Constantinos Markantonakis, Q. Zhang, William G. Sirett, Keith Mayes
    On the Performance of Certificate Revocation Protocols Based on a Java Card Certificate Client Implementation. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:551-564 [Conf]
  37. Arjen van Weelden, Martijn Oostdijk, Lars Frantzen, Pieter W. M. Koopman, Jan Tretmans
    On-the-Fly Formal Testing of a Smart Card Applet. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:565-576 [Conf]
  38. Joel VanLaven, Mark Brehob, Kevin J. Compton
    Side Channel Analysis, Fault Injection and Applications - A Computationally Feasible SPA Attack on AES via Optimized Search. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:577-588 [Conf]
  39. Sylvain Guilley, Philippe Hoogvorst
    The Proof by 2M-1: a Low-Cost Method to Check Arithmetic Computations. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:589-600 [Conf]
  40. Jieyin Cheng, Cheun Ngen Chong, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Stefan Nikolaus
    StreamTo: Streaming Content using a Tamper-Resistant Token. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:601-612 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002