default search action
Security and Management 2007: Las Vegas, Nevada, USA
- Selim Aissi, Hamid R. Arabnia:
Proceedings of the 2007 International Conference on Security & Management, SAM 2007, Las Vegas, Nevada, USA, June 25-28, 2007. CSREA Press 2007, ISBN 1-60132-048-5
Intrusion Detection
- Maitreya Natu, Adarshpal S. Sethi:
Intrusion Detection System to Detect Wormhole Using Fault Localization Techniques. Security and Management 2007: 3-9 - Hong Nguyen, Ravi Palaniappan, Nevin Aydin, Shiyuan Jin, Damla Turgut:
Intrusion Detection in Wireless Sensor Networks. Security and Management 2007: 10-16 - Wei Wang, Sylvain Gombault:
Distance Measures for Anomaly Intrusion Detection. Security and Management 2007: 17-23 - Jun Lu, Chong-Jun Wang, Jun Wang, Shifu Chen:
An Intrusion Detection Model Based on Intention Modeling. Security and Management 2007: 24-29 - Réginalds Lips, Nabil El-Kadhi:
Intelligent Mobile Agent for Intrusion Detection System. Security and Management 2007: 30-38
Biometric, Authentication, Steganography
- Slobodan Dokic, Andrea Kulesh, Megha Dombal, Huirong Fu:
An Overview of Multi-modal Biometrics for Authentication. Security and Management 2007: 39-44 - Yoichi Shibata, Masahiro Mimura, Kenta Takahashi, Masakatsu Nishigaki:
A study on biometric key generation from fingerprints: Fingerprint-key generation from stable feature value. Security and Management 2007: 45-51 - Guillermo Martínez-Silva, Francisco Rodríguez-Henríquez, Nareli Cruz Cortés, Levent Ertaul:
On the Generation of X.509v3 Certificates with Biometric Information. Security and Management 2007: 52-57 - Takumi Yamamoto, Atsushi Harada, Takeo Isarida, Masakatsu Nishigaki:
Improvement of User Authentication Using Schema of Visual Memory: Guidance by Verbal Cue. Security and Management 2007: 58-64 - Ashutosh Saxena, Shailaja Gummadidala, Phani Kumar Kancharla:
An Efficient Authentication Protocol for GSM. Security and Management 2007: 65-69 - Atluri Kavitha, Dhavala Lalitha Bhaskari, Peri S. Avadhani:
Combinatorial Approach For Authentication Based on Face Recognition. Security and Management 2007: 70-75 - J. Octavio Gutiérrez-García, Félix F. Ramos Corchado, Herwig Unger:
User Authentication via Mouse Biometrics and the usage of Graphic User Interfaces: An Application Approach. Security and Management 2007: 76-82 - Kannan Karthik, Dimitrios Hatzinakos:
A Unified Approach To Construct Non-perfect Secret Sharing And Traitor Tracing Schemes. Security and Management 2007: 83-89 - Nu-El Choi, Eun-Jun Yoon, Hyun-Jin Park, Kee-Young Yoo:
Visual Multi-Secret Sharing Scheme with Cheater Identification. Security and Management 2007: 90-96 - Behnam Rahnama, Atilla Elçi:
ParseKey+: A Five-Way Strong Authentication Procedure as an Approach to Client/Server Impersonation Avoidance using Steganography for Key Encryption. Security and Management 2007: 97-106 - Hayk Ghazaryan:
Steganographic File System Development Based On The Information Hiding Scheme By Permutation Of Sequence Elements. Security and Management 2007: 107-111 - Jujia Wang, Yoichi Muraoka:
Proposal on Automatic Authentication of Cellular Phones by Using Force Sensor. Security and Management 2007: 112-117 - Hyun-Jin Park, Eun-Jun Yoon, Kee-Young Yoo:
A New Steganography Scheme using a Frame. Security and Management 2007: 118-122 - Paul Seymer, George Dimitoglou:
Performance Optimization of Close-Color Pair Steganalysis. Security and Management 2007: 123-130
Cryptography
- Jyh-haw Yeh:
A Time-Bound Hierarchical Key Assignment Cryptosystem with No Lifetime Limit. Security and Management 2007: 131-137 - Feng Yi, Daoshun Wang, Xiaobo Li, Yiqi Dai:
Colored Probabilistic Visual Cryptography Scheme with Reversing. Security and Management 2007: 138-141 - Levent Ertaul, Nitu Chavan:
RSA and Elliptic Curve- ElGamal Threshold Cryptography (ECCEG-TC) Implementations for Secure Data Forwarding in MANETs. Security and Management 2007: 142-146 - Hilal M. Yousif Al-Bayatti, Abdul Monem S. Rahma, Hala Bahjat Abdul Wahab:
Using Generated Digital Images to Modify the PGP Cryptography Protocol. Security and Management 2007: 147-151 - Sara Mohamadrezaei, Bahram Sadeghi Bigham:
Solving Semantic Problems in Chaff and Winnowing Problem by Using Cryptography. Security and Management 2007: 152-156 - Liaqat Ali Khan, Muhammad Shamim Baig, M. Ashraf Ashraf:
Exploiting Silence for Ciphertext Only Cryptanalysis of Stream Ciphered Digitized Voice. Security and Management 2007: 157-164
Security and Privacy
- Mahjoub Langar, Mohamed Mejri, Kamel Adi:
A Formal Approach for Security Policy Enforcement in Concurrent Programs. Security and Management 2007: 165-171 - Lizzie Coles-Kemp, Richard E. Overill:
Triangulating the Views of Human and Non-Human Stakeholders in Information System Security Risk Assessment. Security and Management 2007: 172-178 - Wei Wang:
Security Based Heuristic SAX for XML Parsing. Security and Management 2007: 179-185 - Jan vom Brocke, Heinz Lothar Grob, Gereon Strauch, Christian Buddendick:
Calculating the Return on Security Investments - An Approach Based on Principles of Capital Budgeting. Security and Management 2007: 186-191 - Shoua Yang, Shanti Sukumaran, Dipali Yermalkar, Hesiri Weerasinghe, Huirong Fu:
Security and Privacy: Open Issues with RFID. Security and Management 2007: 192-197 - Martin Schaffer, Peter Schartner, Stefan Rass:
Universally Unique Identifiers: How To Ensure Uniqueness While Protecting The Issuer's Privacy. Security and Management 2007: 198-204 - Valli Kumari Vatsavayi, K. V. S. V. N. Raju:
Enhanced User Privacy on Trusted Processors. Security and Management 2007: 205-210 - Adam Nowicki, Artur Rot, Leszek Ziora:
Implementation of Protections as the Element of Information System Security Management. Experiences of Polish Enterprises. Security and Management 2007: 211-216 - Habtamu Bogale, Jigang Liu:
Secure Web Applications: A Systematic Approach. Security and Management 2007: 217-222 - Andrzej Bialas:
Modeling the Security Objectives According to the Common Criteria Methodology. Security and Management 2007: 223-229 - Li-Yen Hsu, Shin-Shin Kao:
Extending Security/Sustainability through Pervasive Spider Web Networks in Urbanism. Security and Management 2007: 230-235 - Ki-Hyang Hong, Gang Shin Lee, Jae-il Lee, Ik-Sub Lee:
Advance Diagnosis of Information Security for the Mobile RFID Service. Security and Management 2007: 236-241 - Jin-Sub Park, Young-Sun Shin, Jung-Jin Park, Sung-Gi Kang:
A Study of Estimate Risk Level Model Based on Security Maturity. Security and Management 2007: 242-247 - Ben Salah Abderrazak:
More Security on Tunisian e-Commerce Payments by Using SMS for Customer's Authenticity With National Post Office. Security and Management 2007: 248-254 - Sarah M. North, Max M. North:
A Brief Study of Students' Attitudes, Curiosity, Interest, and Perceptions of Information and National Security. Security and Management 2007: 255-259 - Min Guo, Meng Cao:
A Key-Set Label Model for Protecting Information Security. Security and Management 2007: 260-266 - Dongmin Choi, Yeojin Lee, Choongyong Cho, Okbin Lee, Yongkeun Bae, Ilyong Chung:
A Secure Key Distribution Scheme in Wireless Sensor Networks Using Dynamic Clustering Algorithms. Security and Management 2007: 267-273 - Shima Izadpanahi, Muhammad Reza Fatemi:
Enhanced Multi-Level Security: Secure Sharing. Security and Management 2007: 274-276 - Guoqing Tu, Pingxiang Li:
A Trusted Domain-based Approach for Authorization and Delegation on Mobile Distributed System. Security and Management 2007: 277-281 - Marcin Szczodrak, Jinwoo Kim:
4G and Manet, Wireless Network of Future Battlefield. Security and Management 2007: 282-290
Analysis and Evaluation
- Mohammed Ketel:
Economic Evaluation of IT Security. Security and Management 2007: 291-297 - Gregory Vert, Phanid Dogiparthi:
A Generic Metric for Evaluation of Database Security. Security and Management 2007: 298-305 - Eltayeb Abuelyaman, Mohammed Ahmed El-Affendi:
Evaluation of the S-Box Construction Using Arithmetic Modulo Prime Numbers. Security and Management 2007: 306-309 - Hareesh Khattri, Salvador Mandujano:
On the Security of 802.11 and 802.1X: Evaluating an Embedded Network Stack. Security and Management 2007: 310-316 - Bo Chen, Baohua Zhao, Chao Lu:
Analysis of Probabilistic Information Flow Security Properties. Security and Management 2007: 317-322 - Ronggong Song, Larry Korba, George Yee:
Analysis of Smart Card-Based Remote User Authentication Schemes. Security and Management 2007: 323-329 - Qijun Gu:
Analysis of Software Vulnerability in Sensor Nodes. Security and Management 2007: 330-336 - Hiroshi Dozono, Shinsuke Ito, Hisao Tokushima, Masanori Nakakuni:
The Analysis of Key Typing Sounds using Self Organizing Maps. Security and Management 2007: 337-341 - Hesham Elzouka, Fatma Zada:
A Survey on Digital Watermarking Technologies. Security and Management 2007: 342-349 - Luigi Alcuri, Pietro Cassarà:
A Study about DDoS Attacks in SIP Environments. Security and Management 2007: 350-357 - EunJoung Byun, SungJin Choi, Chong-Sun Hwang, SangKeun Lee:
Survey on Reputation Management Systems in P2P Network. Security and Management 2007: 358-366
Systems and Algorithms
- Bin Fu, Sai Aravalli, John Abraham:
Software Protection by Hardware and Obfuscation. Security and Management 2007: 367-373 - Fatiha Benali, Véronique Legrand, Stéphane Ubéda:
An Ontology for the Management of Heteregenous Alerts of Information System. Security and Management 2007: 374-380 - Manghui Tu, Dongfeng Wang, Peng Li, Nasser Tadayon:
Allocation of Partitioned Data by Using A Neural Network Based Approach. Security and Management 2007: 381-387 - Tobias Eggendorfer:
Reducing Spam Using Network Management Techniques. Security and Management 2007: 388-394 - Ihor V. Vasyltsov, Eduard Hambardzumyan:
Immunity to Passive Attacks on Generic RNG Model. Security and Management 2007: 395-399 - Vincent Zimmer:
Platform Trust Beyond BIOS Using the Unified Extensible Firmware Interface. Security and Management 2007: 400-405 - Nguyen Ngoc Diep, Sungyoung Lee, Young-Koo Lee, Heejo Lee:
Contextual Risk-Based Access Control. Security and Management 2007: 406-412 - Ming-Jheng Li, Justie Su-tzu Juan:
A Practical English Auction Based on the Discrete Logarithms. Security and Management 2007: 413-419 - Meixing Le, Jiajin Le:
Efficient Encrypted Storage Structure for Prevention of Information Leakage. Security and Management 2007: 420-425 - Phillip G. Bradford, Daniel A. Ray:
Finding the Change-Point in a Binary Stream with Two Unknown, but Distant, Distributions. Security and Management 2007: 426-431 - Se-Min Kim, Jun-Cheol Jeon, Byung-Heon Kang, Sang-Ho Shin, Kee-Young Yoo:
Non-linear and Non-group Cellular Automata for Cryptographic Applications. Security and Management 2007: 432-438
Applied Cryptology and Network Security
- Chih-Hung Wang, Chien-Chang Feng:
A Secure E-cash Scheme with Optional Traceability. Security and Management 2007: 439-445 - Danilo Gligoroski, Smile Markovski, Ljupco Kocarev:
Totally Asynchronous Stream Ciphers + Redundancy = Cryptcoding. Security and Management 2007: 446-451 - Efrén Clemente-Cuervo, Francisco Rodríguez-Henríquez, Daniel Ortiz Arroyo, Levent Ertaul:
A PDA Implementation of an Off-line e-Cash Protocol. Security and Management 2007: 452-458 - Sunghyuck Hong, Noé Lopez-Benitez:
Design and Performance Analysis of an Enhanced Group Key Generation Protocol. Security and Management 2007: 459-466
Security of Supercomputing Clusters
- A. Palagin, N. Alishov, George Markowsky, Anatoly Sachenko, Volodymyr Turchenko:
Security Tools for GRID- Systems. Security and Management 2007: 467-473 - George Markowsky, Linda Markowsky:
Survey of Supercomputer Cluster Security Issues. Security and Management 2007: 474-480 - George Markowsky:
RF Eavesdropping Beowulf Clusters. Security and Management 2007: 481-488
Securing Medical Information
- Rachel J. Mahncke, Patricia A. H. Williams:
The Issues Involved in Securing Electronic Health Information in Transit. Security and Management 2007: 489-495 - Danny Ng, Andrew Woodward:
Implications for Use of Different Encryption Algorithms on Power Consumption for Mobile Devices in the Healthcare Industry. Security and Management 2007: 496-500 - Andrew Woodward, Patricia A. H. Williams:
Wireless Rx - Risk Assessment and Recommendations for Securing a Wireless Network in a Medical Practice. Security and Management 2007: 501-505 - Craig Valli:
IT Sharps: Issues Relating to Securely Disposing of Hard Disks from Medical Information Systems. Security and Management 2007: 506-509 - Patricia A. H. Williams:
A Holistic Perspective on Models for Medical Information Security. Security and Management 2007: 510-519 - Christopher Bolan:
KILL Features of RFID Tags in a Medical Environment: Boon or Burden? Security and Management 2007: 520-526
Late Papers
- Fernanda Mendes, Jamil Salem Barbar, Gustavo S. B. do Carmo:
The Use of Watermark for the Authentication of Digital Images Mapped Through the Use of the Wavelet Transform. Security and Management 2007: 527-533 - Rabia Jafri, Hamid R. Arabnia:
PCA-Based Methods for Face Recognition. Security and Management 2007: 534-541 - Richard A. Wasniowski:
Using Honeynets and Alerts Correlation for Intrusion Detection and Prevention. Security and Management 2007: 542-545 - Kooshiar Azimian, Javad Mohajeri, Mahmoud Salmasizadeh:
A New Public Key Encryption Scheme Equivalent to Factoring. Security and Management 2007: 546-552 - Amit Jain:
Enhancement of Information Hiding Using XML. Security and Management 2007: 553-558 - Dan T. F. Chan, Siu-Ming Yiu, Lucas Chi Kwong Hui:
Remote Group User Authentication with Forward Secrecy and Key Agreement with Smartcard. Security and Management 2007: 559-565 - Lifeng Guo, Guilin Wang, Duncan S. Wong, Lei Hu:
Further Discussions on the Security of a Nominative Signature Scheme. Security and Management 2007: 566-572 - Haixin Wang, Yao Yue, Chunming Zhang, Guoqiang Bai, Hongyi Chen:
A Novel Unified Control Architecture for a High-Performance Network Security Accelerator. Security and Management 2007: 573-579 - Guishan Dong, Xin Li, Xianliang Lu:
A MLS Cooperation System Based on Virtual Machine Monitor. Security and Management 2007: 580-584 - Chung-Han Chen, Hira N. Narang:
Education in Software Security. Security and Management 2007: 585-590 - Brian J. d'Auriol, Tuyen Nguyen, Vo Quoc Hung, Duc Thang, Hassan Jameel, Le Xuan Hung, Syed Muhammad Khaliq-ur-Rahman Raazi, Dao Phuong Thuy, Ngo Trong Canh, Adil Mehmood Khan, Sunghyun Kim, Lei Shu, Sakib Pathan, Tran Van Phuong, Sungyoung Lee, Young-Koo Lee:
Embedded Processor Security. Security and Management 2007: 591-
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.