ISPEC 2005:
Singapore
Robert H. Deng, Feng Bao, HweeHwa Pang, Jianying Zhou (Eds.):
Information Security Practice and Experience, First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings.
Lecture Notes in Computer Science 3439 Springer 2005, ISBN 3-540-25584-2 BibTeX
Network Security
- Stephan Riebach, Erwin P. Rathgeb, Birger Tödtmann:
Risk Assessment of Production Networks Using Honeynets - Some Practical Experience.
1-12
Electronic Edition (link) BibTeX
- Philip Robinson, Christian Schaefer, Thomas Walter:
POSSET - Policy-Driven Secure Session Transfer.
13-24
Electronic Edition (link) BibTeX
- Debabrata Nayak, Deepak B. Phatak, Ved Prakash Gulati:
Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Method: A Novel Approach.
25-35
Electronic Edition (link) BibTeX
- Zhongchao Yu, Chuk-Yang Seng, Tao Jiang, Xue Wu, William A. Arbaugh:
Robust Routing in Malicious Environment for Ad Hoc Networks.
36-47
Electronic Edition (link) BibTeX
Cryptographic Techniques I
Secure Architecture I
- Stelios Sidiroglou, John Ioannidis, Angelos D. Keromytis, Salvatore J. Stolfo:
An Email Worm Vaccine Architecture.
97-108
Electronic Edition (link) BibTeX
- Bin Liang, Heng Liu, Wenchang Shi, Yanjun Wu:
Enforcing the Principle of Least Privilege with a State-Based Privilege Control Model.
109-120
Electronic Edition (link) BibTeX
- Yanjun Wu, Wenchang Shi, Hongliang Liang, Qinghua Shang, Chunyang Yuan, Bin Liang:
Security On-demand Architecture with Multiple Modules Support.
121-131
Electronic Edition (link) BibTeX
- Hågen Hasle, Yngve Kristiansen, Ketil Kintel, Einar Snekkenes:
Measuring Resistance to Social Engineering.
132-143
Electronic Edition (link) BibTeX
Access Control
Intrusion Detection
Applications and Case Studies
Secure Architecture II
- Hany A. Samuel, Yasser H. Dakroury, Hussein I. Shahein:
Recard: Using Recommendation Cards Approach for Building Trust in Peer-to-Peer Networks.
280-292
Electronic Edition (link) BibTeX
- Wenbao Jiang, Chen Li, Shuang Hao, Yiqi Dai:
Using Trust for Restricted Delegation in Grid Environments.
293-301
Electronic Edition (link) BibTeX
- Tao Zhang, Mingzeng Hu, Xiao-chun Yun, Yongzheng Zhang:
Computer Vulnerability Evaluation Using Fault Tree Analysis.
302-313
Electronic Edition (link) BibTeX
- Xiaoqin Huang, Lin Chen, Linpeng Huang, Minglu Li:
An Identity-Based Grid Security Infrastructure Model.
314-325
Electronic Edition (link) BibTeX
Data Security
Cryptographic Techniques II
- Zuowen Tan, Zhuojun Liu, Wang Mingsheng:
On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes.
374-385
Electronic Edition (link) BibTeX
- Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo:
Token-Controlled Public Key Encryption.
386-397
Electronic Edition (link) BibTeX
- Marcel Fernandez, Miguel Soriano, Josep Cotrina Navau:
A New Class of Codes for Fingerprinting Schemes.
398-409
Electronic Edition (link) BibTeX
- Qianhong Wu, Bo Qin, Changjie Wang, Xiaofeng Chen, Yumin Wang:
t-Out-of-n String/Bit Oblivious Transfers Revisited.
410-421
Electronic Edition (link) BibTeX
Copyright © Sat May 16 23:26:12 2009
by Michael Ley (ley@uni-trier.de)