default search action
Security and Management 2003: Las Vegas, Nevada, USA
- Hamid R. Arabnia, Youngsong Mun:
Proceedings of the International Conference on Security and Management, SAM '03, June 23 - 26, 2003, Las Vegas, Nevada, USA, Volume 1. CSREA Press 2003, ISBN 1-932415-16-5
Security Issues for Networks
- Michael G. Merideth, Priya Narasimhan:
Proactive Containment of Malice in Survivable Distributed Systems. Security and Management 2003: 3-9 - Hongmei Deng, Qing-An Zeng, Dharma P. Agrawal:
Network Intrusion Detection System Using Random Projection Technique. Security and Management 2003: 10-16 - Thomas Droste, Wolfgang Weber:
Additional Security Requirements to Integrate Wireless Networks. Security and Management 2003: 17-19 - Jinoh Kim, Ikkyun Kim, Kiyoung Kim, Jongsoo Jang, Sung Won Sohn, Koohong Kang:
An Integrated Network-Wide Defense Framework (INwDF) for Large Networks. Security and Management 2003: 20-26 - Alexandros G. Fragkiadakis, Nikolaos G. Bartzoudis, David J. Parish, Mark Sandford:
Hardware Support for Active Networking. Security and Management 2003: 27-33 - Kafi Hassan, Michael Conner:
Identifying Security Threats in Ad Hoc Wireless Network. Security and Management 2003: 34-40
Trust-Based Methodologies
- David Grawrock:
The Pull Model of Trust. Security and Management 2003: 41-47 - Ned M. Smith:
Prioritizing Facts for On-Line Trust Negotiation. Security and Management 2003: 48-54 - Todd A. Anderson, Vijay Tewari:
Establishing Confidence in Untrusted Storage Providers. Security and Management 2003: 55-64
Security: Management and Protocols
- Hassan Aljifri, Nizar Tyrewalla:
Security in Mobility Management. Security and Management 2003: 65-71 - Simeon Xenitellis, Pita Jarupunphol:
Security Vulnerabilities in the Trust-List PKI. Security and Management 2003: 72-77 - In-Seock Cho, Byung kwan Lee, Tai-Chi Lee:
An ISEP (Improved Secure Electronic Payment) Protocol Design Using 3BC Algorithm. Security and Management 2003: 78-84 - Gianluigi Me:
A Secure Mobile Local Payment Application Framework. Security and Management 2003: 85-92 - Ghita Kouadri Mostéfaoui:
Security in Pervasive Environments, What's Next? Security and Management 2003: 93-98
Authentication and Passwords
- Abhay Dharmadhikari, Uttam Sengupta, Ameen Ahmad, Roger Chandler:
SIM Based WLAN Authentication for Open Platforms. Security and Management 2003: 99-104 - Shushuang Man, Dawei Hong, Manton M. Matthews:
A Shoulder-Surfing Resistant Graphical Password Scheme - WIW. Security and Management 2003: 105-111 - Jung-Soo Lee, Han Ho Lee, Jong-Weon Kim:
Multi-Bits Image Watermarking Technique Against Geometrical Attacks. Security and Management 2003: 112-117 - Dennis Heimbigner:
A Tamper-Detecting Implementation of Lisp. Security and Management 2003: 118-124 - Zhuhan Jiang, Laxmikanth Gudipudi, Hiep Pham:
Distributed Resource Relay Under Personalized Firewalls. Security and Management 2003: 125-134
Security: Policies and Analysis
- Niklas Borselius, Chris J. Mitchell:
Securing FIPA Agent Communication. Security and Management 2003: 135-141 - Athanasios Agiannidis, Neil Glover, Kevin Warwick:
Behavior-Based Authentication in the Built Environment. Security and Management 2003: 142-148 - Regine Endsuleit, Thilo Mie:
Secure Multi-Agent Computations. Security and Management 2003: 149-155 - Anil Madhavapeddy, Alan Mycroft, David J. Scott, Richard Sharp:
The Case for Abstracting Security Policies. Security and Management 2003: 156-160 - Padmanabhan Krishnan, Robert Bannerman:
User Assisted Verification of Non-Repudiation and Similar Properties. Security and Management 2003: 161-170
Intrusion Detection
- Gerry V. Dozier:
IDS Vulnerability Analysis Using Genertia Red Teams. Security and Management 2003: 171-176 - Kyoung-Hwa Do, Kun-Won Jang, Sang-Hun Lee, Moon-Seog Jun:
The Design of WEB Stegodata Detection Systems Using Intrusion Detection Systems. Security and Management 2003: 177-182 - M. Ammar Rayes, Michael Cheung:
Security Management in IP Metro Ethernet/ETTx Networks. Security and Management 2003: 183-189 - Myung-Kyu Yi, MaengSoon Baik, Chong-Sun Hwang:
Design of a Fault-Tolerant Mechanism for Multi-Agent Based Intrusion Detection System. Security and Management 2003: 190-198
Architecture, Policy and Management
- Wayne A. Jansen, Tom Karygiannis, Michaela Iorga, Serban I. Gavrila, Vlad Korolev:
Security Policy Management for Handheld Devices. Security and Management 2003: 199-204 - Pavan K. Sura, Ravi Mukkamala:
A PKI Architecture for Academic Institutions: Design and Prototype. Security and Management 2003: 205-212 - Yan Yan, Yi Huang, Geoffrey C. Fox, Shrideep Pallickara, Marlon E. Pierce, Ali Kaplan, Ahmet E. Topcu:
Implementing a Prototype of the Security Framework for Distributed Brokering Systems. Security and Management 2003: 212-218 - Kyeong Ja Jeong, Moon Sun Shin, Hosung Moon, Keun Ho Ryu, Kiyoung Kim:
Alert Analysis Using Data Mining for Security Policy Server in Policy Based Network Security Management. Security and Management 2003: 219-225 - Tony White, Eugen M. Bacic:
Implementing Policy-Based Content Filtering for Web Servers. Security and Management 2003: 226-232 - Ron Forrester:
Trusted Platforms and Integrity Management: Scaling TCPA to the Enterprise. Security and Management 2003: 233-240
Algorithmic Techniques for Security
- Jing Wu, Tianbing Xia, Jennifer Seberry:
Construction of Highly Non-Linear Cubic Homogeneous Boolean Functions on GF2n+1(2). Security and Management 2003: 241-247 - Young-Jun Heo, Jongsoo Jang:
Defeating DoS Attacks Using Wavelet Analysis. Security and Management 2003: 248-252 - Mohannad Najjar:
Petra-r Cryptographic Hash Functions. Security and Management 2003: 253-259 - Hee Bong Choi, Hyoon Jae Lee, Choon Su Kim, Byung Hwa Chang, Dongho Won:
On Differential Power Analysis Attack on the Addition Modular 2N Operation of Smart Cards. Security and Management 2003: 260-266
Security Techniques and Applications
- Chun Ruan, Vijay Varadharajan, Yan Zhang:
Delegatable Authorization Program and Its Application. Security and Management 2003: 267-273 - Ok-Ran Jeong, Dong-Sub Cho:
Personalized Filtering Agent for E-Mail Classification. Security and Management 2003: 274-280 - Carol Taylor, Paul W. Oman, Axel W. Krings:
Assessing Power Substation Network Security and Survivability: A Work in Progress Report. Security and Management 2003: 281-287 - Sungsu Kim, Kyubum Wee:
Limits of Signature-Based Detection of Buffer Overflow Attacks. Security and Management 2003: 288-293 - JongSoon Park, YoungLok Lee, HyungHyo Lee, BongNam Noh:
A Role-Based Delegation Model Using Role Hierarchy Supporting Restricted Permission Inheritance. Security and Management 2003: 294-302
Models and Analyses for Security
- James F. Smith III:
Automated Resource Manager for Group Security. Security and Management 2003: 303-309 - Maheshkumar Sabhnani, Gürsel Serpen:
KDD Feature Set Complaint Heuristic Rules for R2L Attack Detection. Security and Management 2003: 310-316 - Yanet Manzano:
FDS Model: A Distributed Architectural Design for Management of Inbound Network Traffic on Web-Server Systems. Security and Management 2003: 317-323 - Kyoung-Ja Kim, Sung-Ock Hong, Tae-Mu Chang:
Agent Based Intrusion Tolerance Scheme in Ad Hoc Networks. Security and Management 2003: 324-329 - Manhee Lee, Sangkil Jung, Yoonjoo Kwon, KookHan Kim, Jeonghoon Moon, Okhwan Byeon:
Spanning Tree Search Model to Traceback DDoS Attack Using Netflow. Security and Management 2003: 330-333 - Yoon-Jung Jung, In-Jung Kim:
The Development for the Risk Assessment Methodology of Spiral Model. Security and Management 2003: 334-336 - Su-Hyung Jo, Jeong-Nyeo Kim, Sung Won Sohn:
Design of Policy-Based Security Management for Intrusion Detection. Security and Management 2003: 337-340 - Evon M. O. Abu-Taieh, Sattar J. Aboud:
A New Factoring Algorithm. Security and Management 2003: 341-347 - Peyman Nasirifard:
Web Services Security Overview and Security Proposal for UDDI Framework. Security and Management 2003: 348-351 - Moon-Ku Lee:
Stability Verification of Proxy Firewall Using Colored Petri Nets. Security and Management 2003: 352-358 - Lau Nga Sin, Moon-Chuen Lee:
Intrusion Detection System Models. Security and Management 2003: 359-366
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.