CNIS 2006:
Cambridge,
MA,
USA
Sanguthevar Rajasekaran (Ed.):
Proceedings of the Third IASTED International Conference on Communication, Network, and Information Security, October 9-11, 2006, Cambridge, MA, USA.
IASTED/ACTA Press 2006, ISBN 0-88986-636-8 BibTeX
Information security
- Vishav Vir Singh:
PROTEMP-Z: An XML based authorization system with provisional authorization and temporal certification support.
1-6 BibTeX
- Kosuke Okada, Shigeo Wada:
A robust image watermarking method to geometric attacks.
7-12 BibTeX
- Joon Son, Jim Alves-Foss:
Covert timing channel capacity of rate monotonic real-time scheduling algorithm in MLS systems.
13-18 BibTeX
- Sigurd Eskeland:
Security analysis of a large-scale voting scheme.
19-21 BibTeX
- Charlie Obimbo, Jingbo Ni:
A grey-level image watermarking method based on block DCT and statistic correlation adjustment.
22-27 BibTeX
- Diomedes D. Kastanis, Ioannis G. Askoxylakis, Apostolos Traganitis:
An efficient authentication scheme for contactless smartcards using elliptic curve cryptography.
28-33 BibTeX
- Yuan Zhang, Richard J. Enbody, John R. Lloyd:
Proactive, content-aware, sensitive data protection framework for enterprises.
34-40 BibTeX
- Longjiang Yu, Sheng-He Sun:
Slantlet transform-based image fingerprints.
41-43 BibTeX
- Behzad Salami, Charlie Obimbo:
A multi-bitwatermark generation algorithm with properties of error correction.
44-49 BibTeX
Communication security
- Ioannis G. Askoxylakis, Diomedes D. Kastanis, Apostolos Traganitis:
Elliptic curve and password based dynamic key agreement in wireless ad-hoc networks.
50-60 BibTeX
- Mihir M. Ayachit, Haiping Xu:
A petri net based XML firewall security model for web services invocation.
61-67 BibTeX
- Paul Tipper, Christopher Edwards:
A method for deriving paths across a distributedweb of trust.
68-73 BibTeX
- Asad M. Ali:
Designing SSL/TLS protocol for resource constrained devices.
74-80 BibTeX
- Charlie Obombo, Fardeen Haji, Larry Lindsay, Darshana Patel:
Security framework for supervisory control and data acquisition, automation systems, and networks.
81-86 BibTeX
- Sylwester Sobolewski, R. Michael Buehrer:
Object authentication in closed containers by ultra-wideband multipath profile examination: An application to national security.
87-92 BibTeX
- Gareth Owen, Mo Adda:
Self-organising quorum systems for ad hoc networks.
93-98 BibTeX
- Sigurd Eskeland:
Access control by secure multi-party EPR decryption in the medical scenario.
99-103 BibTeX
- Jonathan T. Trostle:
The lightweight key management protocol (LKMP).
104-112 BibTeX
Communication,
network,
and information security
- Aliaa A. A. Youssif, Atef Z. Ghalwash, Samir Mohamed:
Artificial immune using multi-level negative selection approach to anomaly detection.
113-118 BibTeX
- R. Bhakthavathsalam:
Reinforcement of privacy in 802.16 MAC common part sublayer using the principle of circularity.
119-125 BibTeX
- Bei Wang, Jim Alves-Foss:
An MSLS-EMM for enforcing confidentiality in malicious environments.
126-131 BibTeX
- Jaime Muñoz Arteaga, Ricardo Mendoza González, Francisco J. Álvarez, Miguel Vargas Martin:
A classification of security patterns for the transactions between a requester, an intermediary, and a web-service.
132-137 BibTeX
- Omar H. Alhazmi, Sung-Whan Woo, Yashwant K. Malaiya:
Security vulnerability categories in major software systems.
138-143 BibTeX
- Ashish Anand, Rahul Rishi, Mukesh Kumar:
ARP and ICMP weaknesses: Impact and network performance analysis of a novel attack strategy.
144-149 BibTeX
- Mahendra Kumar, Richard E. Newman:
STRBAC - An approach towards spatio-temporal role-based access control.
150-155 BibTeX
- F. El-Hassan, Ashraf Matrawy, Nabil Seddigh, Biswajit Nandy:
Experimental evaluation of network security through a hierarchical quantitative metrics model.
156-164 BibTeX
- Marco Prandini:
Securing a Linux-based multi-user web server.
165-171 BibTeX
Network security
- Hiroshi Fujinoki, Ravi Kumar Boyapati:
Performance studies of the server-side access control for syn-flooding distributed denial of service attacks using real systems.
172-178 BibTeX
- Abhinav Pathak, Dheeraj Sanghi:
A scalable approach to IP anycast security.
179-184 BibTeX
- Yaxuan Qi, Jun Li:
An efficient hybrid algorithm for multidimensional packet classification.
185-190 BibTeX
- Pascal Urien, Mesmin Dandjinou, Mohamad Badra:
Introducing trusted EAP module for security enhancement in WLANs and VPNs.
191-198 BibTeX
- Jianming Yu, Quan Huang, Yibo Xue:
Optimizing multi-thread string matching for network processor based intrusion management system.
199-204 BibTeX
- Tobias Eggendorfer, Jörg Keller:
Dynamically blocking access to web pages for spammers' harvesters.
205-210 BibTeX
- Jörg Keller, Ralf Naues:
Design of a virtual computer security lab.
211-215 BibTeX
- Yaxuan Qi, Jun Li:
Towards effective packet classification.
216-223 BibTeX
- Leonardo Mattes, João Antonio Zuffo:
Access control platform for submitted jobs in computational grid environment.
224-229 BibTeX
Copyright © Sat May 16 23:02:40 2009
by Michael Ley (ley@uni-trier.de)