Hamid R. Arabnia, Selim Aissi, Youngsong Mun (Eds.):
Proceedings of the International Conference on Security and Management, SAM '04, June 21-24, 2004, Las Vegas, Nevada, USA.
CSREA Press 2004, ISBN 1-932415-37-8 BibTeX
Architectural Designs & Frameworks
Wireless & Mobile Security
Trusted Computing Platforms
Encryption & Authentication
- Dennis Heimbigner:
Managing Access Rights for Terminated Employees.
55-60 BibTeX
- Farhan A. Qazi:
A Survey of Biometric Authentication Systems.
61-67 BibTeX
- Soon Hwa Sung, Eunbae Kong:
Byzantine Agreement with Threshold Cryptography in Unknown Networks.
68-74 BibTeX
- M. Ammar Rayes, Michael Cheung:
User Isolation and Policy-Based Security Management.
75-79 BibTeX
- Hiroshi Dozono, Hiroaki Sanada, Masanori Nakakuni, Yoshio Noguchi:
The Analysis of Graffiti Input and Its Application to Personal Identification.
80-83 BibTeX
- Taesung Kim, Sangrae Cho, Seunghun Jin:
Authentication and Authorization for Network Security Service.
84-88 BibTeX
- Alexander Wiesmaier, Marcus Lippert, Vangelis Karatsiolis:
The Key Authority - Secure Key Management in Hierarchical Public Key Infrastructures.
89-93 BibTeX
- Dawei Hong, Shushuang Man, Barbra Hawes, Manton M. Matthews:
A Graphical Password Scheme Strongly Resistant to Spyware.
94-100 BibTeX
- Raghavan Subramanian:
2 Channel Authentication.
101-108 BibTeX
Security Engineering
Communication Networks
- Chunxiao Chigan, Rahul Bandaru:
Towards a Perfect Secure Routing Protocol for Mobile Ad Hoc Networks.
135-140 BibTeX
- Giancarlo Ruffo:
Legal File and Profit Sharing in a Peer to Peer Network.
141-146 BibTeX
- Farookh Khadeer Hussain, Elizabeth Chang, Tharam S. Dillon:
Repute Relationships for Reputation Management in Peer-to-Peer Communication - I.
147-153 BibTeX
- Craig Valli, Peter Wolski:
802.11b Wireless Networks Insecure at Any Speed.
154-158 BibTeX
- Sirisha Medidi, Muralidhar Medidi, Sireesh Gavini, Richard L. Griswold:
Detecting Packet Mishandling in MANETs.
159-162 BibTeX
- Jing Wu, Jennifer Seberry, Tianbing Xia:
Secure IP Multicast for DMS.
163-167 BibTeX
- A. Maslov:
Scenarios for Hijacking Execution Flow of .NET Managed Code.
168-172 BibTeX
- Wonjoon Choi, Byeong-hee Roh, Seung W. Yoo:
Measures for Detecting Network Attacks at the Aggregate Traffic Level on High-Speed Internet Backbone Links.
173-178 BibTeX
Intrusion Management
Emerging Research
- Namho Yoo, Hwajung Lee, Hyeong-Ah Choi:
An XML-Based Impact Analysis Using Security Management with IAVN.
217-220 BibTeX
- Regine Endsuleit, Arno Wagner:
Possible Attacks on and Countermeasures for Secure Multi-Agent Computation.
221-227 BibTeX
- Myron Sheu, Le Tang, Ravi Mukkamala:
A Systematic Approach to Security Deployment in a Networking Environment.
228-234 BibTeX
- Albert Ball, Donald G. Cole, Michael L. Nelson:
Testing IPv6 Security.
235-241 BibTeX
- Rodolfo Villarroel, Eduardo Fernández-Medina, Mario Piattini:
General Considerations on Data Warehouse Security.
242-248 BibTeX
- In-Jung Kim, Yoon-Jung Jung, JoongGil Park, Dongho Won:
A Study on Security Risk Modeling over Information and Communication Infrastructure.
249-253 BibTeX
- Sung-Ock Hong, Kyoung-Ja Kim, Tae-Mu Chang:
A Study on CRL Distribution for Response Time Reduction in Distributed OCSP.
254-257 BibTeX
- Yoon-Jung Jung, In-Jung Kim, Namhoon Lee, JoongGil Park:
The Development of Risk Analysis Methodology for Information Asset on Network.
258-261 BibTeX
- Yuhei Kawakoya, Yoichi Muraoka:
Proposal and Implementation of Router-Based Traceback Technique.
262-266 BibTeX
- Ajmal S. Mian, Raja Iqbal:
Experimental Analysis of the Arcanum Key Exchange Protocol.
267-271 BibTeX
- Tarek K. Alameldin, Amitesh Sinha:
Web Spoofing Techniques, Implementation and Solutions.
272-277 BibTeX
- Matt Benke, John Waite, Paul W. Oman, Ahmed Abdel-Rahim:
Survivable Systems Analysis for Real Time Control Systems in Critical Infrastructures.
278-286 BibTeX
Algorithms
- Leon Pan, Chang N. Zhang:
Using Metadata to Protect the Audiovisual Contents in MPEG-7 Applications.
287-293 BibTeX
- Tianbing Xia, Jennifer Seberry, Jing Wu:
Boolean Functions with Good Properties.
294-299 BibTeX
- Yong-Seok Kim, Jun-Cheol Jeon, Jin-woo Jeon, Kee-Young Yoo:
An Efficient Access Control Model Based on User-Classification and Role-Division.
300-304 BibTeX
- Jin Shu, Fengyu Liu, Manwu Xu:
NSPPM: A Node Sampling Approach to Probabilistic Packet Marking-Based IP Traceback.
305-311 BibTeX
- Hee Bong Choi, Jong-Gil Kim, Sang-Yun Han, Mung-Gil Choi, Chun-Soo Kim, Hyoon Jae Lee:
DPA Methods of Smart Cards.
312-317 BibTeX
- Yi-Jung Chen, Dyi-Rong Duh, Hun Yunghsiang Sam Han:
A New Modulo (2n+1) Multiplier for IDEA.
318-324 BibTeX
- Kyoung-Ja Kim, Tae-Mu Chang:
A ZRP Based Reliable Route Discovery Scheme in Ad-Hoc Networks.
325-331 BibTeX
- Phen-Lan Lin, Juen-Lin Huang, Ting-Jung Chang:
CAPTCHA-Based Anti-Spam Mail Model.
332-340 BibTeX
Applications
- Nick Antonopoulos, Tatjana Bitzakidis, Roger M. A. Peel:
ASAM: An Automated System for Authorisation Data Change Management in GRID Environments.
341-347 BibTeX
- Jeff Adams, Ranjit Abbadasari, Ravi Mukkamala:
EZ-Park: An Innovative Secure M-Commerce Application.
348-352 BibTeX
- Yongwha Chung, Byung-Hee Hwang, Woo-Yong Choi, Daesung Moon, Sung Bum Pan, Sang-Hwa Chung:
A Hardware Implementation of Speaker Verification Using Support Vector Machine.
353-358 BibTeX
- Madiha Zafar, S. M. H. Zaidi:
TCP SYN Flood Sensor for Internet Backbone.
359-364 BibTeX
- Vamshi Krishna Venapally, William S. Harrison, Nadine Hanebutte:
KLADS: Unix Based Kernel Level Anomaly Detection System.
365-368 BibTeX
- Mathias Fonkam, Chamraj Bathirappan:
JxPS2 - An Intelligent, Portable and Pluggable Security Service for Web Applications Using Java, XML and JIProlog (Java Internet Prolog).
369-375 BibTeX
- Patrick R. Merry, Axel W. Krings, Paul W. Oman:
Survivable Systems Analysis of the North American Power Grid Communications Infrastructure.
376-386 BibTeX
Late Papers
- Young-Jun Heo, Keol-Woo Ryu:
Abnormal Traffic Detection for Network Intrusion Detection.
387-390 BibTeX
- Fariborz Farahmand, Shamkant B. Navathe, Gunter P. Sharp, Philip H. Enslow Jr.:
Data Confidentiality in E-Government and E-Commerce.
391-394 BibTeX
- Ned M. Smith:
A Comparison of the trusted Computing Group Security Model with Clark-Wilson.
395-401 BibTeX
- Najib Saylani:
A Proposal for an Automated Approach to Real Time Profiling of IT Security Compromises.
402-407 BibTeX
- Mun-Kyu Lee, Dowon Hong:
An Efficient Protocol for Mutual Authentication and Key Agreement Using the Subscriber Identity Module.
408-413 BibTeX
- Ghasem S. Alijani, Nam Tran, J. Steven Welsh:
Processing Biometric Information for Smart Cards Using a Dedicated Hash Function.
414-420 BibTeX
- Mira Kwak, Dong-Sub Cho:
Modeling Host Status Transition for Network Intrusion Detection.
421-426 BibTeX
- Shamila Makki, Niki Pissinou, Hui Huang:
The Security Issues in the Ad-Hoc on Demand Distance Vector Routing Protocol (AODV).
427- BibTeX
Copyright © Sat May 16 23:04:19 2009
by Michael Ley (ley@uni-trier.de)