Hamid R. Arabnia (Ed.):
Proceedings of The 2005 International Conference on Security and Management, SAM 2005, Las Vegas, Nevada, USA, June 20-23, 2005.
CSREA Press 2005, ISBN 1-932415-82-3 BibTeX
Workshop:
IP Network Security
- Hua Wang, Zhongwei Zhang, David Lai:
Towards an Authentication Protocol for Service Outsourcing Over IP Networks.
3-9 BibTeX
- Jiwei Wei, Zhixin Sun:
On Intelligent Agent-based Decoy Systems.
10-16 BibTeX
- Michihiro Aoki, Takafumi Hamano, Takeshi Miyasaka, Kentaro Ogawa, Masaaki Inami, Keishi Habara, Shinichiro Chaki:
Enhancing Security Functionality on Open Router Architecture.
17-23 BibTeX
- Ed Kirkham, Paul Botham:
redAlert: Data-Mining and Visualisation for IP Data Analysis.
24-32 BibTeX
Public Key Encryption
Key Management
- Wei-Bin Lee, Jia-Hong Li, Chyi-Ren Dow:
Efficient Date-Constraint Hierarchical Key Assignment Scheme.
51-57 BibTeX
- Ying Wu, Yongping Zhang, Tianjie Cao:
Security Analysis of A Proxy Signature Scheme Based on the Elliptic Curve Cryptosystem.
58-64 BibTeX
- Eun-Jun Yoon, Jae-Hyung Jung, Woo-Hun Kim, Kee-Young Yoo:
A Secret Key Based Authentication Scheme Using Smart Cards.
65-71 BibTeX
- Eun-Jun Yoon, Eun-Kyung Ryu, Woo-Hun Kim, Kee-Young Yoo:
Cryptanalysis of A Key Authentication Scheme Based on Discrete Logarithms.
72-78 BibTeX
Attack Management
- Karin Sallhammar, Bjarne E. Helvik, Svein J. Knapskog:
Incorporating Attacker Behavior in Stochastic Models of Security.
79-85 BibTeX
- Guangsen Zhang, Manish Parashar:
Cooperative Mechanism Against DDoS Attacks.
86-96 BibTeX
- Sergio Caltagirone, Paul Ortman, Sean Melton, David Manz, Kyle King, Paul W. Oman:
RADICL: A Reconfigurable Attack-Defend Instructional Computing Laboratory.
97-103 BibTeX
- Jin Shu, Fengyu Liu, Manwu Xu:
Baseline - A Passive Approach to Tolerate and Detect DoS/DDoS Attacks.
104-110 BibTeX
- Henghui Zou, Hengming Zou:
A Prediction and Early Warning Model for Hacker Attacks.
111-118 BibTeX
- Jonathan Wong, Duncan S. Wong:
Known Session Key Attack Against a Collection of Signcryption Schemes.
119-126 BibTeX
Intrusion Detection
Network Management:
Issues & Protocols
Design,
Architecture & Frameworks
Research & Methodologies
Algorithms
Optimization Techniques
- Alexander Wiesmaier, Mike Fisher, Marcus Lippert, Johannes Buchmann:
Ouflanking and Securely Using the PIN/TAN-System.
313-319 BibTeX
- Lawrence Chung, Nary Subramanian:
Reconfirming Change in Secure Software Systems: An Adaptable Security Approach.
320-326 BibTeX
- Yan Woo, Lucas Chi Kwong Hui, K. P. Chow, Siu-Ming Yiu:
Dynamic Integrity Verification for Software Self-defense.
327-333 BibTeX
- Bogdan Hoanca, Kenrick J. Mock:
Screen oriented technique for reducing the incidence of shoulder surfing.
334-340 BibTeX
- Ihor V. Vasyltsov, Hee-Kwan Son:
Redundancy of Check-Point Unit as a Method to Increase the Resistance to Fault Influence in ECC.
341-347 BibTeX
- Eui-nam Huh, Seung-Yeon Lee, Youngsong Mun, Hyunseung Choo:
An Efficient Authentication Mechanism on Ad-Hoc Telematics Environment.
348-356 BibTeX
Systems & Prototypes
Security in Remote - Mobile Environments
Conference on Biometric Authentication
Late Papers
- Jiann-Liang Chen, Shih-Feng Sun:
Design of IPv6-Based Mobile Routers for Network Mobility Applications.
453-459 BibTeX
- Fu-Shing Sun, Chun-Hung Tzeng:
A Learning Model for Intrusion Detection Using Tolerance Relation.
460-466 BibTeX
- Nitin Gupta:
The changing face of application security: A look at the evolving security infrastructure.
467-472 BibTeX
- Janusz Stoklosa, Jaroslaw Bubicz:
Compound inversive congruential generator as a source of keys for stream ciphers.
473-478 BibTeX
- Eunjin Ko, Boosun Jeon, Nosam Park, Gilhaeng Lee:
The Data Handling Method of a Data Dispatcher Module in Web-Based SLA Monitoring and Reporting (WSMR) System.
479-483 BibTeX
- Goo Yeon Lee, Yong Lee, Hwa Jong Kim, Choong Kyo Jeong, Dong Eun Lee:
Design and Implementation of a Data Sharing Scheme with Security and Flexibility Applicable to Extended P2P Systems.
484-490 BibTeX
- Alexandre Fernandes de Moraes, João Batista Camargo Jr.:
Biometrics - Evaluating Security Technologies for Brazilian Airports.
491-496 BibTeX
- Ching-Tang Hsieh, Chu-Sheng Cheng, Chih-Hsu Hsu:
AC/V Segmentation Approach for Mandarin Speech Based on Wavelet Transform.
497-501 BibTeX
- Andrzej Bialas:
IT Security Modeling.
502-505 BibTeX
- Brian P. Briammeier, Eltayeb Salih Abuelyaman:
A Spyware Prevention Model: A Proactive Approach.
506-511 BibTeX
- Sung-Yeal Im, Ki-Dong Chung:
A Study on the Data Encipherment Equipment with Rijndael Algorithm in ATM Network.
512-517 BibTeX
- Mira Kwak, Dong-Sub Cho:
Host State Representation for Intrusion Detection.
518-523 BibTeX
- Muhammad Almas, Muhammad Younus, Abdul Basit:
A Linear Dimension Reduction Technique For Face Recognition.
524- BibTeX
Copyright © Sat May 16 23:04:19 2009
by Michael Ley (ley@uni-trier.de)