default search action
4th SECURWARE 2010: Venice, Italy
- Reijo Savola, Masaru Takesue, Rainer Falk, Manuela Popescu:
Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010. IEEE Computer Society 2010, ISBN 978-1-4244-7517-9
SYSSEC
- Keunwoo Rhee, Byunghee Lee, Dongho Won, Hac Yun Na, Seungjoo Kim:
Vulnerabilities and Improvements of Du-Xiao-Chen-Wu's Secure Cell Relay Routing Protocol for Sensor Networks. 1-4 - Donghai Tian, Deguang Kong, Changzhen Hu, Peng Liu:
Protecting Kernel Data through Virtualization Technology. 5-10 - Jonathan Rouzaud-Cornabas, Patrice Clemente, Christian Toinard:
An Information Flow Approach for Preventing Race Conditions: Dynamic Protection of the Linux OS. 11-16 - Sarosh Hashmi, John Brooke:
Towards Sybil Resistant Authentication in Mobile Ad Hoc Networks. 17-24
SECDYN & SECMAN
- Reijo M. Savola, Petri Heinonen:
Security-Measurability-Enhancing Mechanisms for a Distributed Adaptive Security Monitoring System. 25-34 - Jin Tamura:
Improving the Efficiency of a Highly-Used Access Control Scheme. 35-39 - Homam El-Taj, Omar Abouabdalla, Ahmed M. Manasrah, Ahmed Al-Madi, Muhammad Imran Sarwar, Sureswaran Ramadass:
Forthcoming Aggregating Intrusion Detection System Alerts Framework. 40-44 - Manfred Schäfer, Wolf-Dietrich Moeller:
Strategies for Managed Software Integrity Protection. 45-50 - Bilal Khan, Muhammad Khurram Khan, Maqsood Mahmud, Khaled Alghathbar:
Security Analysis of Firewall Rule Sets in Computer Networks. 51-56
ARCH I
- Pierre de Leusse, Theo Dimitrakos:
SOA-Based Security Governance Middleware. 57-62 - Tewfiq El Maliki, Jean-Marc Seigneur:
A Security Adaptation Reference Monitor (SARM) for Highly Dynamic Wireless Environments. 63-68 - Dongkyun Ahn, Gyungho Lee:
Prospect of Fine Grain Dynamic Memory Access Control with Profiling. 69-74 - Anders Fongen:
Identity Management without Revocation. 75-81
SECTECH
- Pierluigi Failla:
Heuristic Search in Encrypted Graphs. 82-87 - Francesco Beritelli, Salvatore Casale, Rosario Grasso, Andrea Spadaccini:
Performance Evaluation of SNR Estimation Methods in Forensic Speaker Recognition. 88-92 - Francesco Beritelli, Andrea Spadaccini:
A Statistical Approach to Biometric Identity Verification Based on Heart Sounds. 93-96 - Rainer Falk, Hans-Joachim Hof:
Industrial Sensor Network Security Architecture. 97-102
INFOSEC I
- Cagatay Karabat, Mehmet Keskinöz:
Blind Detectors in Spread Spectrum Watermarking for Interference Reduction. 103-108 - Wolfgang Boehmer:
Analysis of Strongly and Weakly Coupled Management Systems in Information Security. 109-116 - Cynthia Y. Lester:
Shifting the Paradigm: Training Undergraduate Students in Software Security. 117-122
INFOSEC II
- Tamás Paulik, Ádám Máté Földes, Gábor György Gulyás:
BlogCrypt: Private Content Publishing on the Web. 123-128 - Xavier Titi, Jean-Marc Seigneur:
Verifying Hotspot Quality User Rating with Certified QoS Evidence. 129-134 - Ahlem Bouchahda, Nhan Le Thanh, Adel Bouhoula, Faten Labbene:
RBAC+: Dynamic Access Control for RBAC-Administered Web-Based Databases. 135-140 - Pekka Pietikäinen, Kati Karjalainen, Juha Röning, Juhani Eronen:
Socio-technical Security Assessment of a VoIP System. 141-147
MALWA I
- Ravishankar Borgaonkar:
An Analysis of the Asprox Botnet. 148-153 - Jaziar Radianti:
Eliciting Information on the Vulnerability Black Market from Interviews. 154-159 - Masaru Takesue:
Cascaded Simple Filters for Accurate and Lightweight Email-Spam Detection. 160-165 - Jonas Pfoh, Christian A. Schneider, Claudia Eckert:
Exploiting the x86 Architecture to Derive Virtual Machine State Information. 166-175
MALWA II & CYBER-Threat
- Alireza Shahrestani, Maryam Feily, Rodina Binti Ahmad, Sureswaran Ramadass:
Discovery of Invariant Bot Behavior through Visual Network Monitoring System. 182-188 - Jaziar Radianti:
A Study of a Social Behavior inside the Online Black Markets. 189-194 - Thomas C. Ormerod, Lingyu Wang, Mourad Debbabi, Amr M. Youssef, Hamad Binsalleeh, Amine Boukhtouta, Prosenjit Sinha:
Defaming Botnet Toolkits: A Bottom-Up Approach to Mitigating the Threat. 195-200
CRYPTO
- Kun Peng, Feng Bao:
A Shuffling Scheme with Strict and Strong Security. 201-206 - Daniel Hartung, Christoph Busch:
Biometric Transaction Authentication Protocol. 207-215 - Abdel Alim Kamal, Amr M. Youssef:
Applications of SAT Solvers to AES Key Recovery from Decayed Key Schedule Images. 216-220 - Sedat Soydan:
Analyzing the DPA Leakage of the Masked S-box via Digital Simulation and Reducing the Leakage by Inserting Delay Cells. 221-227 - Fan Wu, Chung-Han Chen, Hira N. Narang:
An Efficient Acceleration of Symmetric Key Cryptography Using General Purpose Graphics Processing Unit. 228-233
SECHOME
- Mohit Soni, Sandesh Gupta, M. S. Rao, Phalguni Gupta:
An Efficient Vein Pattern-Based Recognition System. 234-239 - Hiroto Kakiuchi, Takao Kawamura, Toshihiko Sasama, Kazunori Sugahara:
Detection Methods Improving Reliability of Automatic Human Tracking System. 240-246 - Francisco José Bellido Outeiriño, Pedro Canales Aranda, José Luis de la Cruz Fernández, Benito Pérez Jarauta:
Universal Bluetooth Access Control and Security System for e-Keys Enviroments. 247-250 - Ali Ahmed, Ning Zhang:
An Access Control Architecture for Context-Risk-Aware Access Control: Architectural Design and Performance Evaluation. 251-260
ARCH II
- Boulares Ouchenne, Ousmane Koné:
A Security Control Architecture for SOAP-Based Services. 261-265 - Danilo Valeros Bernardo, Doan Hoang:
Protecting Next Generation High Speed Network Protocol - UDT through Generic Security Service Application Program Interface - GSS-API. 266-272 - Mathieu Blanc, Jérémy Briffaut, Thibault Coullet, Maxime Fonda, Christian Toinard:
Protection of a Shared HPC Cluster. 273-279 - S. Hasan Mirjalili, Arjen K. Lenstra:
Towards a Structural Secure Design Process. 280-286
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.