Hamid R. Arabnia, Youngsong Mun (Eds.):
Proceedings of the International Conference on Security and Management, SAM '03, June 23 - 26, 2003, Las Vegas, Nevada, USA, Volume 2.
CSREA Press 2003, ISBN 1-932415-17-3 BibTeX
@proceedings{DBLP:conf/csreaSAM/2003-2,
editor = {Hamid R. Arabnia and
Youngsong Mun},
title = {Proceedings of the International Conference on Security and Management,
SAM '03, June 23 - 26, 2003, Las Vegas, Nevada, USA, Volume 2},
booktitle = {Security and Management},
publisher = {CSREA Press},
year = {2003},
isbn = {1-932415-17-3},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
Networks,
Operating Systems,
Web Services and Mobility
- Choon-Han Youn, Marlon E. Pierce, Geoffrey Fox:
Developing Secure Web Services for Computational Portals.
367-372 BibTeX
- Geonlyang Kim, Jung-Chan Na, Seung Won Sohn:
Design of a LDAP Schema Based on Network Security Policy Information Model for Storing Security Policy.
373-377 BibTeX
- Prabhaker Mateti, Sowgandh Sunil Gadi:
Prevention of Buffer Overflow Exploits in IA-32 Based Linux.
378-384 BibTeX
- Kyechan Lee, Kyubum Wee:
Detection of Loadable Kernel Module Rootkit.
385-389 BibTeX
- Maheshkumar Sabhnani, Gürsel Serpen:
Formulation of a Heuristic Rule for Misuse and Anomaly Detection for U2R Attacks in Solaris Operating System Environment.
390-396 BibTeX
- Sang-Kil Park, Jongsoo Jang, BongNam Noh:
Supporting Interoperability to Multi Intrusion Detection System in Secure Networking Framework.
397-401 BibTeX
- Alexander Buchmann, Harald Görl, Sven Lachmund:
Placement of Cryptographic Mechanisms in Operating Systems.
402-408 BibTeX
- Bo-Heung Chung, Jeong-Nyeo Kim, Sung Won Sohn:
Improve Network Security with Kernel-Level Intrusion Detection Sensor.
409-414 BibTeX
- Su-Hong Min, Ok-Ran Jeong, Dong-Sub Cho:
A Web-Based Login System Using the Time Based Password (TBP).
415-420 BibTeX
- José R. Herrero, David Benlliure:
Operating System Support for Process Confinement.
421-425 BibTeX
- Jong Tak Kim, Chan Koh, Jin Tak Choi:
A Protection of Mobile System in Network Systems.
426-432 BibTeX
- Jongwook Moon, Hakbong Cho, Changseok Choi, Gihyun Jung, Younkwang Jung, Kyunghee Choi:
Accelerating Firewall.
433-437 BibTeX
- Hyunchul Kang, Gil-Haeng Lee, Dae-Ung Kim:
Fault Management Model and Implementation for Customer Network Management.
438-443 BibTeX
- Hye-Young Kim, Hwa-Sun Kim, Heung-Sik Kim, Sang-Gyun Kim, Heung-Kook Choi:
Cyber-Lecture Management System for XML-Based Secondary Education.
444-448 BibTeX
- Jangbok Kim, Hosung Lim, Kyunghee Choi, Gihyun Jung:
A New Architecture for Enhancing the Security of E-Mail System.
449-454 BibTeX
- Taeshik Shon, Jongsub Moon, Cheolwon Lee, Eul-Gyu Im, Jung-Taek Seo:
Safe Patch Distribution Architecture in Intranet Environments.
455-460 BibTeX
- Boleslaw Fabisiak:
Threats, Vulnerabilities and Exposures to Networked Manufacturing Systems.
461-468 BibTeX
Design and Analysis of Protocols and Performance Evaluation + Systems
- Holly Xiao:
Trust Management for Mobile IPv6 Binding Update.
469-474 BibTeX
- Wonjoo Park, Dong-il Seo, Daeyoung Kim:
The Methods of IPsec Applying Between MN and HA in Mobile IPv6.
475-478 BibTeX
- Yeojin Lee, Taehoon Lee, Ilyong Chung:
A Secure Mobile Agent System Based on Identity-Based Digital Signature Scheme.
479-485 BibTeX
- Yoe-Sub Shin, Yang-Gyu Kim, Haeng-Seok Ko, Dong-Heyok Jang, TaeJoo Chang, Oh-Seok Kwon:
A Study on the High Crypto-System for the Multi-Sessions.
486-490 BibTeX
- Dong-ho Kang, Dong-il Seo, Jongsoo Jang:
A Study on Bandwidth Consumption DDoS: Attack Defense.
491-494 BibTeX
- Leonardo Mattes, Frank Meylan, Adilson Eduardo Guelfi, João Antonio Zuffo:
Performance Analysis of a Security Manager for Multi-Service Communication Middleware.
495-501 BibTeX
- Misun Kim, Sangjin Park, Youngsong Mun:
QoS Guaranteed Service Model in Mobile IPv6.
502-507 BibTeX
- Sang-Hun Lee, Kyoung-Hwa Do, Kun-Won Jang, Moon-Seog Jun:
VDTS: The Design of Real-Time Virus Detection and Tracing Systems.
508-513 BibTeX
- Bernhard Thurm:
Analysis of Web Service Performance for Network Management.
514-520 BibTeX
- Mira Kwak, Dong-Sub Cho:
Extended Probabilistic Packet Marking Scheme for IP Traceback.
521-526 BibTeX
Security Techniques,
Models and Applications
- Gang Zhu, Jie Dai:
Economic Perspective of Information Security.
527-533 BibTeX
- Shin-Kyung Lee, Tae-wan Kim, Dae-Ung Kim:
The Subscriber Management of CO-LAN Gateway System.
534-538 BibTeX
- Darryl A. White, Ghasem S. Alijani:
Identifying Requirements for Network Security Software.
539-543 BibTeX
- Remus Chua Choong Hee, Jianping Chen, Ben M. Chen:
The Development of Network Security Suite for Windows-Based Servers.
544-550 BibTeX
- Miyoun Yoon, Kiyoung Kim, Yongtae Shin:
Robust Multimedia Authentication in Mobile Multicast Environment.
551-557 BibTeX
- Chung-E Wang:
Simultaneous Data Compression and Encryption.
558-563 BibTeX
- Sang-Hyun Bae, Hae Kyung Seong, Kang Hyeon Rhee:
Color Level Logo Image Watermarking on Multi Color Space.
564-569 BibTeX
- Viktor Bunimov, Manfred Schimmler, Wolfgang Bziuk:
Key Generation for Secure High Speed Communication.
570-576 BibTeX
- Dong-Hwan Shin, Jong-Weon Kim, Jong-Uk Choi:
Semi-Fragile Image Watermarking Based on Block Mean Difference.
577-583 BibTeX
- Simon McNicol, Serdar Boztas:
Randomized Traitor Tracing Algorithms for Broadcast Security.
584-590 BibTeX
- Young-Ho Suh, Won Gyum Kim, Jong-Weon Kim, Chi-Jung Hwang:
Image Fingerprinting with Multi-Bits Watermark.
591-594 BibTeX
- Han Ho Lee, Jung-Soo Lee, Nam Yong Lee, Jong-Weon Kim:
The Fingerprinting Algorithm for Digital Image and Video.
595-600 BibTeX
- Young-Shil Kim, Young-Mi Kim, Seong-Jin Park, Doo-Kwon Baik:
Design and Implementation of Stego WaveK Through Improved Lowbit Encoding Method.
601-606 BibTeX
- Sangwoo Lee, Yun-kyung Lee, Youngsae Kim, Youngsoo Park, Sung-Ik Jun, Kyo-Il Chung:
Implementation of an Elliptic Curve Cryptography Hardware Accelerator for Smart Cards.
607-610 BibTeX
- Soon Hwa Sung, Eunbae Kong:
Efficient Electronic Voting System with Secure Multiparty Fault-Detection Protocol.
611-617 BibTeX
- F. Sang-Ju Song, S. Doo-Sung Lee, T. Sun-Hyung Kim:
Development of Digital Content Viewer with Tracing Capability by Use of the Watermarking Technique.
618-625 BibTeX
- Jong-Weon Kim, Jung-Soo Lee, Jong-Uk Choi:
A New Multi-Layer Copyright Protection by Using Digital Watermarking.
626-632 BibTeX
Late Papers and Post-Conference Papers
- Wei-Kuei Chen:
Efficient On-Line Electronic Checks.
633-636 BibTeX
- Tom Coffey, Reiner Dojen, Tomas Flanagan:
On Different Approaches to Establish the Security of Cryptographic Protocols.
637-643 BibTeX
- Guillermo A. Francia III, Aditya Kilaru, Le Phuong, Mehul B. Vashi:
A Performance Comparison of Encryption Algorithms.
644-649 BibTeX
- Randy Justice, Sumitra Mukherjee:
Inferential Disclosure Limitation in Multivariate Categorical Databases.
650-653 BibTeX
- Tom Cribb, Asha Rao:
An Information Security Management Model.
654-657 BibTeX
- Scott F. Smith:
Similarity Searches in Computer Security.
658-662 BibTeX
- Willy Susilo, Yi Mu:
On Fail-Stop Verifiable Secret Sharing Schemes.
663-667 BibTeX
- Willy Susilo, Jianyong Huang, Jennifer Seberry:
On Using Fast Exponentiation Algorithm in PDAs (or: How Secure is the Discrete Logarithm Problem Assumption in PDAs?).
668-674 BibTeX
- Prashant Dewan, Partha Dasgupta, Vijay Karamcheti:
Defending Against Denial of Service Attacks Using Secure Name Resolution.
675-681 BibTeX
Copyright © Sat May 16 23:04:18 2009
by Michael Ley (ley@uni-trier.de)