Conferences in DBLP
Vincent Naessens , Bart De Decker , Liesje Demuynck Accountable Anonymous E-Mail. [Citation Graph (0, 0)][DBLP ] SEC, 2005, pp:3-18 [Conf ] Craig Pearce , Peter Bertók , Ron G. van Schyndel Protecting Consumer Data in Composite Web Services. [Citation Graph (0, 0)][DBLP ] SEC, 2005, pp:19-34 [Conf ] Albin Zuccato A Decision Matrix Approach. [Citation Graph (0, 0)][DBLP ] SEC, 2005, pp:35-50 [Conf ] Lech J. Janczewski , Victor Portougal Assignment of Security Clearances in an Organization. [Citation Graph (0, 0)][DBLP ] SEC, 2005, pp:51-64 [Conf ] Thomas Schlienger , Stephanie Teufel Tool Supported Management of Information Security Culture. [Citation Graph (0, 0)][DBLP ] SEC, 2005, pp:65-78 [Conf ] Sebastiaan H. von Solms , M. P. Hertenberger ERPSEC - A Reference Framework to Enhance Security in ERP Systems. [Citation Graph (0, 0)][DBLP ] SEC, 2005, pp:79-94 [Conf ] Yanjiang Yang , Feng Bao , Robert H. Deng A New Architecture for User Authentication and Key Exchange Using Password for Federated Enterprises. [Citation Graph (0, 0)][DBLP ] SEC, 2005, pp:95-112 [Conf ] I-Ming Tsai , Chia-Mu Yu , Wei-Ting Tu , Sy-Yen Kuo A Secure Quantum Communication Protocol Using Insecure Public Channels. [Citation Graph (0, 0)][DBLP ] SEC, 2005, pp:113-126 [Conf ] Joon S. Park , Pratheep Chandramohan , Ganesh Devarajan , Joseph Giordano Trusted Component Sharing by Runtime Test and Immunization for Survivable Distributed Systems. [Citation Graph (0, 0)][DBLP ] SEC, 2005, pp:127-142 [Conf ] Jiang-chun Ren , Kui Dai , Zhiying Wang , Xue-mi Zhao , Yuan-man Tong Design and Implementation a TPM Chip SUP320 by SOC. [Citation Graph (0, 0)][DBLP ] SEC, 2005, pp:143-154 [Conf ] Keisuke Ohmori , Ayako Suzuki , Mariko Kawabata , Ryu Matsushima , Manabu Ohmuro , Toshifumi Kai , Shigeru Nishiyama Mathematical Models of IP Traceback Methods and Their Verification. [Citation Graph (0, 0)][DBLP ] SEC, 2005, pp:155-170 [Conf ] Joseph K. Liu , Sandy H. Wong , Duncan S. Wong Transferable E-Cash Revisit. [Citation Graph (0, 0)][DBLP ] SEC, 2005, pp:171-188 [Conf ] Qiong Liu , Reihaneh Safavi-Naini , Nicholas Paul Sheppard A License Transfer System for Supporting Content Portability in Digital Rights Management. [Citation Graph (0, 0)][DBLP ] SEC, 2005, pp:189-204 [Conf ] Yongdong Wu , Feng Bao , Robert H. Deng Secure Person-To-Person Communications Based on Biometrics Signals. [Citation Graph (0, 0)][DBLP ] SEC, 2005, pp:205-222 [Conf ] Laurent Bussard , Walid Bagga Distance-Bounding Proof of Knowledge to Avoid Real-Time Attacks. [Citation Graph (0, 0)][DBLP ] SEC, 2005, pp:223-238 [Conf ] Kyung-jun Kim , HyunSook Kim , Sang-Don Lee , Ki Jun Han An Adaptive Multicast Polling Scheme for IEEE 802.11 Wireless LAN. [Citation Graph (0, 0)][DBLP ] SEC, 2005, pp:239-250 [Conf ] Thomas Peyrin , Serge Vaudenay The Pairing Problem with User Interaction. [Citation Graph (0, 0)][DBLP ] SEC, 2005, pp:251-266 [Conf ] Asad Ali , Karen Lu , Michael Montgomery Network Smart Card: A New Paradigm of Secure Online Transactions. [Citation Graph (0, 0)][DBLP ] SEC, 2005, pp:267-280 [Conf ] Rodrigo Roman , Jianying Zhou , Javier Lopez Protection Against Spam Using Pre-Challenges. [Citation Graph (0, 0)][DBLP ] SEC, 2005, pp:281-294 [Conf ] Anh Nguyen-Tuong , Salvatore Guarnieri , Doug Greene , Jeff Shirley , David Evans Automatically Hardening Web Applications Using Precise Tainting. [Citation Graph (0, 0)][DBLP ] SEC, 2005, pp:295-308 [Conf ] Vrizlynn L. L. Thing , Henry C. J. Lee , Morris Sloman Traffic Redirection Attack Protection System (TRAPS) - A Full-Fledged Adaptive DoS/DDoS Attack Mitigation Scheme. [Citation Graph (0, 0)][DBLP ] SEC, 2005, pp:309-326 [Conf ] John Haggerty , Qi Shi , Madjid Merabti Statistical Signatures for Early Detection of Flooding Denial-Of-Service Attacks. [Citation Graph (0, 0)][DBLP ] SEC, 2005, pp:327-342 [Conf ] Wayne Huang , J. L. Cong , Chien-Long Wu , Fan Zhao , Shyhtsun Felix Wu Design, Implementation, and Evaluation of "FRiTrace". [Citation Graph (0, 0)][DBLP ] SEC, 2005, pp:343-358 [Conf ] Konstantinos Xinidis , Kostas G. Anagnostakis , Evangelos P. Markatos Design and Implementation of a High-Performance Network Intrusion Prevention System. [Citation Graph (0, 0)][DBLP ] SEC, 2005, pp:359-374 [Conf ] P. Akritidis , Evangelos P. Markatos , Michalis Polychronakis , Kostas G. Anagnostakis STRIDE: Polymorphic Sled Detection through Instruction Sequence Analysis. [Citation Graph (0, 0)][DBLP ] SEC, 2005, pp:375-392 [Conf ] Spyros Antonatos , Michalis Polychronakis , P. Akritidis , Kostas G. Anagnostakis , Evangelos P. Markatos Piranha: Fast and Memory-Efficient Pattern Matching for Intrusion Detection. [Citation Graph (0, 0)][DBLP ] SEC, 2005, pp:393-408 [Conf ] Guilin Wang Designated-Verifier Proxy Signature Schemes. [Citation Graph (0, 0)][DBLP ] SEC, 2005, pp:409-424 [Conf ] Willy Susilo , Yi Mu Tripartite Concurrent Signatures. [Citation Graph (0, 0)][DBLP ] SEC, 2005, pp:425-442 [Conf ] Sherman S. M. Chow , Tsz Hon Yuen , Lucas Chi Kwong Hui , Siu-Ming Yiu Signcryption in Hierarchical Identity Based Cryptosystem. [Citation Graph (0, 0)][DBLP ] SEC, 2005, pp:443-457 [Conf ] Yongdong Wu , Tieyan Li , Robert H. Deng Protecting Group Dynamic Information in Large Scale Multicast Groups. [Citation Graph (0, 0)][DBLP ] SEC, 2005, pp:459-476 [Conf ] Shrikant Sundaram , Peter Bertók , Benjamin Burton Secure Group Communication with Distributed Generation of Private Keys in Ad-hoc Networks. [Citation Graph (0, 0)][DBLP ] SEC, 2005, pp:477-492 [Conf ] Jana Dittmann , Stefan Katzenbeisser , Christian Schallhart , Helmut Veith Ensuring Media Integrity on Third-Party Infrastructures. [Citation Graph (0, 0)][DBLP ] SEC, 2005, pp:493-508 [Conf ] Hao-Tian Wu , Yiu-ming Cheung A New Fragile Mesh Watermarking Algorithm for Authentication. [Citation Graph (0, 0)][DBLP ] SEC, 2005, pp:509-524 [Conf ] Yuji Suga New Paradigm in Graph-Based Visual Secret Sharing Scheme by Accepting Reversal in Black-White Images. [Citation Graph (0, 0)][DBLP ] SEC, 2005, pp:525-536 [Conf ] John A. MacDonald , William G. Sirett , Chris J. Mitchell Overcoming Channel Bandwidth Constraints in Secure SIM Applications. [Citation Graph (0, 0)][DBLP ] SEC, 2005, pp:539-550 [Conf ] K. Papapanagiotou , Constantinos Markantonakis , Q. Zhang , William G. Sirett , Keith Mayes On the Performance of Certificate Revocation Protocols Based on a Java Card Certificate Client Implementation. [Citation Graph (0, 0)][DBLP ] SEC, 2005, pp:551-564 [Conf ] Arjen van Weelden , Martijn Oostdijk , Lars Frantzen , Pieter W. M. Koopman , Jan Tretmans On-the-Fly Formal Testing of a Smart Card Applet. [Citation Graph (0, 0)][DBLP ] SEC, 2005, pp:565-576 [Conf ] Joel VanLaven , Mark Brehob , Kevin J. Compton Side Channel Analysis, Fault Injection and Applications - A Computationally Feasible SPA Attack on AES via Optimized Search. [Citation Graph (0, 0)][DBLP ] SEC, 2005, pp:577-588 [Conf ] Sylvain Guilley , Philippe Hoogvorst The Proof by 2M-1: a Low-Cost Method to Check Arithmetic Computations. [Citation Graph (0, 0)][DBLP ] SEC, 2005, pp:589-600 [Conf ] Jieyin Cheng , Cheun Ngen Chong , Jeroen Doumen , Sandro Etalle , Pieter H. Hartel , Stefan Nikolaus StreamTo: Streaming Content using a Tamper-Resistant Token. [Citation Graph (0, 0)][DBLP ] SEC, 2005, pp:601-612 [Conf ]