default search action
Security and Management 2006: Las Vegas, Nevada, USA
- Hamid R. Arabnia, Selim Aissi:
Proceedings of the 2006 International Conference on Security & Management, SAM 2006, Las Vegas, Nevada, USA, June 26-29, 2006. CSREA Press 2006, ISBN 1-60132-001-9
Policies + Guidelines + Service Oriented Systems + Attack Detection
- Rune Gustavsson:
Ensuring Dependability in Service Oriented Computing. Security and Management 2006: 3-11 - Kenichi Takahashi, Kouichi Sakurai:
A Framework for the User-Oriented Personal Information Protection. Security and Management 2006: 12-19 - Andrzej Bialas:
A Semiformal Approach to the Security Problem of the Target of Evaluation (TOE) Modeling. Security and Management 2006: 19-25 - Norbik Bashah Idris, Bharanidharan Shanmugam:
Novel Attack Detection Using Fuzzy Logic and Data Mining. Security and Management 2006: 26-31 - Omer Mahmood:
Custom Plugin - A Solution to Phishing and Pharming Attacks. Security and Management 2006: 32-37 - Eunjin Ko, Yongsun Ryu, Gilhaeng Lee, Youngsun Kim:
The Fault Detecting Method for Supporting SLA Fault Metrics of IPTV Service. Security and Management 2006: 38-43 - Guannan Gong, Liang Hu, Kuo Zhao, Jinxin He, Yuefeng Xu, Ying Duan:
SPS-VN: Research on the Security Policy System for Virtual Network. Security and Management 2006: 44-47 - Gang Shin Lee, Mi Hyun Ahn, Ho-Seong Kim, Jae-il Lee:
The Information Security Guideline for SMEs in Korea. Security and Management 2006: 48-56
Biometric Authentication + Steganographic Algorithms
- Shahram Latifi, Nimalan Solayappan:
A Survey of Unimodal Biometric Methods. Security and Management 2006: 57-63 - Hesham Elzouka:
A New Robust and Secure Steganographic System for Greyscale Images. Security and Management 2006: 64-71 - Kevin Daimi, Katherine Snyder:
Security Requirements for Multimodal Biometric Systems. Security and Management 2006: 72-77 - Yoshifumi Ueshige, Kouichi Sakurai:
A Proposal of One-Time Biometric Authentication. Security and Management 2006: 78-83 - Xuan-Hien Dang, Krishna C. S. Kota:
Case Study: An Implementation of a Secure Steganographic System. Security and Management 2006: 84-90
Authentication Systems + Authorization Issues + Verification
- Jonathan White, Dale Thompson:
Using Synthetic Decoys to Digitally Watermark Personally-Identifying Data and to Promote Data Security. Security and Management 2006: 91-99 - Hiroshi Dozono, Yoshio Noguchi, Masanori Nakakuni, Hisao Tokushima:
The Analyses of Key Stroke Timings using Self Organizing Maps and its Application to Authentication. Security and Management 2006: 100-105 - Kun-Won Jang, Chan-Kil Park, Jung-Jae Kim, Moon-Seog Jun:
A Study on DRM System for On/Off Line Key Authentication. Security and Management 2006: 106-111 - Wilfrid Mirville, Jamie Kobie, Michael Nelson:
MRAS: A Multi-Layered Remote Authentication System. Security and Management 2006: 112-117 - Jinxin He, Gaochao Xu, Zhiguo Zhou, Guannan Gong:
A New Approach For Source Authentication Of Multicast Data. Security and Management 2006: 118-121 - Huang-Ju Chen, Jyh-Ming Huang, Lei Wang:
Efficient and Secure Authentication Protocols for Mobile VoIP Communications. Security and Management 2006: 122-128 - Hao Wang, Zhongfu Wu, Xin Tan:
A New Secure Authentication Scheme Based Threshold ECDSA For Wireless Sensor Network. Security and Management 2006: 129-133 - Haibo Tian, Yumin Wang:
Security Analysis of the Digital Transmission Copy Protection Specification. Security and Management 2006: 134-137 - Zemao Zhao, Xiangxong Tang, Bin Li, Longhai Zhu:
An ID-based Anonymous Proxy Signature From Bilinear Pairings. Security and Management 2006: 138-144
Encryption and Key Management
- Danilo Gligoroski, Svein J. Knapskog, Suzana Andova:
Cryptcoding - Encryption and Error-Correction Coding in a Single Step. Security and Management 2006: 145-151 - Levent Ertaul, Vaidehi Kedlaya:
Finding Minimum Optimal Path Securely Using Homomorphic Encryption Schemes in Computer Networks. Security and Management 2006: 152-158 - Li Lu, Lei Hu:
Pairing-Based Multi-Recipient Public Key Encryption. Security and Management 2006: 159-165 - Sunghyuck Hong, Noé Lopez-Benitez:
Enhanced Group Key Generation Protocol. Security and Management 2006: 166-171 - Levent Ertaul, Jayalalitha Panda:
Mobile Agent Security. Security and Management 2006: 172-178 - Mykola Karpinskyy, Lesya Vasylkiv, Marcin Gizycki:
Secret Key Leakage Caused by Hamming-weight Timing Analysis on Modular Exponentiation. Security and Management 2006: 179-185 - Tae Ho Kim, Jong Jin Kim, Chang Hoon Kim, Chun Pyo Hong:
Flexible Cryptographic Component Design for Secure Web Applications. Security and Management 2006: 186-192
Network Security + Intrusion Detection + Related Issues
- Norbert Lehmann, Reinhard Schwarz, Jörg Keller:
FireCrocodile: A Checker for Static Firewall Configurations. Security and Management 2006: 193-199 - Hongmei Deng, Roger Xu, Frank Zhang, Chiman Kwan, Leonard Haynes:
Agent-based Distributed Intrusion Detection Methodology for MANETs. Security and Management 2006: 200-206 - Grant A. Jacoby, Thadeus Hickman, Stuart Warders, Barak Griffin, Aaron Darensburg, Daniel Castle:
Gibraltar: A Mobile Host-Based Intrusion Protection System. Security and Management 2006: 207-212 - Thawatchai Chomsiri, Chotipat Pornavalai:
Firewall Rules Analysis. Security and Management 2006: 213-219 - Shuangbao Wang, Fengjing Shao, Robert S. Ledley:
Connputer - A Framework of Intrusion-Free Secure Computer Architecture. Security and Management 2006: 220-225 - Wen Ouyang, Kun-Ming Yu, Wen-Ping Lee:
Design and Implementation of a High-Performance Active Network Security System. Security and Management 2006: 226-232 - Omer Demir, Ping Ji, Jinwoo Kim:
Session Based Logging (SBL) for IP-Traceback on Network Forensics. Security and Management 2006: 233-239 - Richard Wasniowski:
Network Intrusion Detection System with Data Mart. Security and Management 2006: 240-244 - Jun Qian, Chao Xu, Meilin Shi:
Remodeling and Simulation of Intrusion Detection Evaluation Dataset. Security and Management 2006: 245-251 - Johnnes Arreymbi:
Modelling to Enhance GSM Network Security. Security and Management 2006: 252-260 - Kuo Zhao, Liang Hu, Guannan Gong, Meng Zhang, Kexin Yang:
Comparison of Two Sampling-Based Data Collection Mechanisms for Intrusion Detection System. Security and Management 2006: 261-265 - Hsun-Jung Cho, Li-Yen Hsu:
Integrating the Generalized-Honeycomb-Torus for Sustainable Parking Structures in the Globalizing Age. Security and Management 2006: 266-271 - Yan-ning Huang, Yong Jiang:
Firewall Design: Understandable, Designable and Testable. Security and Management 2006: 272-278
Applications + Algorithms + Software Tools
- Anil Kumar Venkataiahgari, Mourad Debbabi, J. William Atwood:
Secure E-commerce Protection Profile. Security and Management 2006: 279-285 - Pierre K. Y. Lai, Siu-Ming Yiu, Kam-Pui Chow, C. F. Chong, Lucas Chi Kwong Hui:
An Efficient Bloom Filter Based Solution for Multiparty Private Matching. Security and Management 2006: 286-292 - Mohammad Chowdhury, Bon Sy, Rasheed Ahmad:
Application of Gaussian Estimation for Devising Reliable Vulnerability Assessment on SIP-based VoIP Infrastructure. Security and Management 2006: 293-299 - Jörg Keller, Tobias Eggendorfer:
Combining SMTP and HTTP tar Pits to Proactively Reduce Spam. Security and Management 2006: 300-306 - Dongwan Shin:
Modeling Role-based Trust and Authority in Open Environments. Security and Management 2006: 307-313 - Li-Yen Hsu, Shin-Shin Kao:
Developing Dual-Surveillance Based Vehicle Security Management with Generalized Honeycomb Tori. Security and Management 2006: 314-320 - Bernard Kaddour, Joël Quinqueton:
Using Aspects and Compilation Techniques to Dynamically Manage Applications. Security and Management 2006: 321-327 - Michael LeMay, Jack Tan:
Acoustic Surveillance of Physically Unmodified PCs. Security and Management 2006: 328-334 - Xiaodong Yuan, Dajiong Yue:
Software Vaccine Technique and Its Application in Early Virus. Security and Management 2006: 335-340 - Jianwu Zheng, Mingsheng Liu, Hui Liu:
On Achieving Trustworthy SOA-Based Web Services. Security and Management 2006: 341-350
Integrated Security
- Satish Baddelpeli, Gregory Vert:
Adaptive Security Metrics for Computer Systems. Security and Management 2006: 351-356 - Rajasekhar Yakkali, Gregory Vert:
Architectural Framework Design for Authentication Mechanism in Mobile Adhoc Networks (MANETs). Security and Management 2006: 357-363 - Gregory Vert, Manaf Alfize:
An Enhanced Pretty Good Privacy (EPGP) System with Mutual Non-Repudiation. Security and Management 2006: 364-370 - Sara Nasser, Sergiu Dascalu, Gregory Vert:
User Interface Design of the Interactive Fingerprint Recognition (INFIR) System. Security and Management 2006: 371-377 - Arthur Reloj, Gregory Vert:
Optical Wireless: Chromatic Encoded Visual Data Transfer. Security and Management 2006: 378-383 - Gregory Vert, Nic Herndon:
Secure Simultaneous Search of Distributed, Heterogeneous Bioinformatics Databases. Security and Management 2006: 384-389 - Amit Mathur, Suneuy Kim, Mark Stamp:
Role Based Access Control and the JXTA Peer-to-Peer Framework. Security and Management 2006: 390-398
Securing Medical Information
- Christopher Bolan:
Do No Harm: The Use of RFID Tags in a Medical Environment. Security and Management 2006: 399-403 - Andrew Woodward:
Data Security and wireless networks: mutually exclusive? Security and Management 2006: 404-409 - Craig Valli:
The Insider Threat to Medical Records; Has the Network Age Changed Anything? Security and Management 2006: 410-414 - Patricia A. H. Williams:
The Role of Standards in Medical Information Security: An Opportunity for Improvement. Security and Management 2006: 415-420 - Craig Valli:
SQL Injection - Threats to Medical Systems: The Issues and Countermeasures. Security and Management 2006: 421-425 - Patricia A. H. Williams:
Security Immunization Using Basic Countermeasures. Security and Management 2006: 426-434
Late Papers
- Gregory Vert, Sergiu M. Dascalu, Frederick C. Harris Jr., Sermsak Buntha:
A Visual Environment for Characterization of State Changes in Computer Systems. Security and Management 2006: 435-440 - Ebrahim Khosravi, Brandy Tyson:
Increasing Security in Mobile Ad Hoc Networks by Incentives to Cooperate and Secure Routing. Security and Management 2006: 441-447 - Jinqiao Yu, Y. V. Ramana Reddy, Sumitra Reddy:
TRINETR: Facilitating Alerts Analysis and Response Decision Making. Security and Management 2006: 448-455 - Shamila Makki, Wunnava V. Subbarao:
On Security in TCP/IP over Wireless Network. Security and Management 2006: 456-461 - Okbin Lee, Seongyeol Kim:
Conference Key Agrement Protocol Employing a Symmetric Balanced Incomplete Block Design. Security and Management 2006: 462-467 - Yoichi Shibata, Masahiro Mimura, Kenta Takahashi, Masakatsu Nishigaki:
Mechanism-Based PKI - A Real-Time Key Generation from Fingerprints. Security and Management 2006: 468-474 - Cesar Monroy, Rayford B. Vaughn:
Keeping An Educational Network Healthy: Differentiating Malicious And Naive Students On An Educational Network Environment. Security and Management 2006: 475-481 - Vivek Kumar Sehgal:
Stochastic Modeling of Worm Propagation in Trusted Networks. Security and Management 2006: 482-488 - Ali Berrached, André de Korvin:
Reinforcing Access Control Using Fuzzy Relation Equations. Security and Management 2006: 489-493 - Rajarshi Sanyal:
Framework for realizing Mobile and Computer Communications through Color Signals. Security and Management 2006: 494-500 - Manoj B. Sastry, Michael J. Covington, Deepak J. Manohar:
Securing Collaborative Applications. Security and Management 2006: 501-508 - Rongzhen Yang, Liang He, Shoufeng Yang, Forni Gary, Fei Liu, Jiayue Chang, Manxue Guo:
The Value of Hardware-Based Security Solutions and its Architecture for Security Demanding Wireless Services. Security and Management 2006: 509-514 - Robert Thibadeau, Michael Willett:
Trusted Storage: Focus on Use Cases. Security and Management 2006: 515-521 - Pravesh Gaonjur, Chandradeo Bokhoree:
Risk of Insider Threats in Information Technology Outsourcing: Can Deceptive Techniques be Applied? Security and Management 2006: 522-
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.