MMM-ACNS 2003:
St. Petersburg,
Russia
Vladimir Gorodetsky, Leonard J. Popyack, Victor A. Skormin (Eds.):
Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings.
Lecture Notes in Computer Science 2776 Springer 2003, ISBN 3-540-40797-9 BibTeX
Invited Papers
- Kulesh Shanmugasundaram, Nasir D. Memon, Anubhav Savant, Hervé Brönnimann:
ForNet: A Distributed Forensics Network.
1-16
Electronic Edition (link) BibTeX
- Ravi S. Sandhu, Jaehong Park:
Usage Control: A Vision for Next Generation Access Control.
17-31
Electronic Edition (link) BibTeX
- Thumrongsak Kosiyatrakul, Susan Older, Polar Humenn, Shiu-Kai Chin:
Implementing a Calculus for Distributed Access Control in Higher Order Logic and HOL.
32-46
Electronic Edition (link) BibTeX
- Anatol Slissenko:
Complexity Problems in the Analysis of Information Systems Security.
47-56
Electronic Edition (link) BibTeX
- Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu:
A Behavior-Based Approach to Securing Email Systems.
57-81
Electronic Edition (link) BibTeX
- Shambhu J. Upadhyaya:
Real-Time Intrusion Detection with Emphasis on Insider Attacks.
82-85
Electronic Edition (link) BibTeX
Mathematical Models and Architectures for Computer Network Security
- Stefano Bistarelli, Iliano Cervesato, Gabriele Lenzini, Fabio Martinelli:
Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols.
86-99
Electronic Edition (link) BibTeX
- Lazaros Gymnopoulos, Stelios Dritsas, Stefanos Gritzalis, Costas Lambrinoudakis:
GRID Security Review.
100-111
Electronic Edition (link) BibTeX
- Spyros Kokolakis, Costas Lambrinoudakis, Dimitris Gritzalis:
A Knowledge-Based Repository Model for Security Policies Management.
112-121
Electronic Edition (link) BibTeX
- Fabio Martinelli:
Symbolic Partial Model Checking for Security Analysis.
122-134
Electronic Edition (link) BibTeX
- Michael Smirnov:
Rule-Based Systems Security Model.
135-146
Electronic Edition (link) BibTeX
- Peter D. Zegzhda, Dmitry P. Zegzhda, Maxim O. Kalinin:
Logical Resolving for Security Evaluation.
147-156
Electronic Edition (link) BibTeX
Intrusion Detection
Public Key Distribution,
Authentication,
Access Control
Cryptography
- Mohamed Al-Ibrahim:
A Signcryption Scheme Based on Secret Sharing Technique.
279-288
Electronic Edition (link) BibTeX
- Pino Caballero-Gil, Candelaria Hernández-Goya:
A Zero-Knwoledge Identification Scheme.
289-297
Electronic Edition (link) BibTeX
- Youngdai Ko, Deukjo Hong, Seokhie Hong, Sangjin Lee, Jongin Lim:
Linear Cryptanalysis of SPECTR-H64 with Higher Order Differential Property.
298-307
Electronic Edition (link) BibTeX
- Valery I. Korzhik, Viktor Yakovlev, Alexander Sinuk:
Achievability of the Key-Capacity in a Scenario of Key Sharing.
308-315
Electronic Edition (link) BibTeX
- Nick A. Moldovyan:
On Cipher Design Based on Switchable Controlled Operations.
316-327
Electronic Edition (link) BibTeX
- Alexander Rostovtsev, Elena Makhovenko:
Elliptic Curve Point Multiplication.
328-336
Electronic Edition (link) BibTeX
- Nicolas Sklavos, Alexander A. Moldovyan, Odysseas G. Koufopavlou:
Encryption and Data Dependent Permutations: Implementation Cost and Performance Evaluation.
337-348
Electronic Edition (link) BibTeX
Steganography
- Vladimir Gorodetsky, Vladimir Samoilov:
Simulation-Based Exploration of SVD-Based Technique for Hidden Communication by Image Steganography Channel.
349-359
Electronic Edition (link) BibTeX
- Kaiwen Zhang, Shuozhong Wang, Xinpeng Zhang:
Detection and Removal of Hidden Data in Images Embedded with Quantization Index Modulation.
360-370
Electronic Edition (link) BibTeX
- Valery I. Korzhik, Guillermo Morales-Luna, Irina Marakova, Carlos Patiño-Ruvalcaba:
Digital Watermarking under a Filtering and Additive Noise Attack Condition.
371-382
Electronic Edition (link) BibTeX
- Shuozhong Wang, Xinpeng Zhang, Kaiwen Zhang:
Data Hiding in Digital Audio by Frequency Domain Dithering.
383-394
Electronic Edition (link) BibTeX
- Xinpeng Zhang, Shuozhong Wang, Kaiwen Zhang:
Steganography with Least Histogram Abnormality.
395-406
Electronic Edition (link) BibTeX
- Xinpeng Zhang, Shuozhong Wang, Kaiwen Zhang:
Multi-bit Watermarking Scheme Based on Addition of Orthogonal Sequences.
407-418
Electronic Edition (link) BibTeX
Short Papers
- Mohamed Al-Ibrahim, Anton Cerný:
Authentication of Anycast Communication.
419-423
Electronic Edition (link) BibTeX
- Ruo Ando, Yoshiyasu Takefuji:
Two-Stage Orthogonal Network Incident Detection for the Adaptive Coordination with SMTP Proxy.
424-427
Electronic Edition (link) BibTeX
- Alexander Grusho, Elena Timonina:
Construction of the Covert Channels.
428-431
Electronic Edition (link) BibTeX
- Mitrou Lilian, Konstantinos Moulinos:
Privacy and Data Protection in Electronic Communications.
432-435
Electronic Edition (link) BibTeX
- Hyun-Sung Kim, Sung-Ho Hwang:
Multiplier for Public-Key Cryptosystem Based on Cellular Automata.
436-439
Electronic Edition (link) BibTeX
- Sri Kumar, Vladimir Marbukh:
A Game Theoretic Approach to Analysis and Design of Survivable and Secure Systems and Protocols.
440-443
Electronic Edition (link) BibTeX
- Francisco J. Martín, Enric Plaza:
Alert Triage on the ROC.
444-448
Electronic Edition (link) BibTeX
- Nick D. Goots, Boris V. Izotov, Alexander A. Moldovyan, Nick A. Moldovyan:
Fast Ciphers for Cheap Hardware: Differential Analysis of SPECTR-H64.
449-452
Electronic Edition (link) BibTeX
- Yuri Melnikov, Alexander O. Tarakanov:
Immunocomputing Model of Intrusion Detection.
453-456
Electronic Edition (link) BibTeX
- Gustavo Santana, Leonid Sheremetov, Miguel Contreras:
Agent Platform Security Architecture.
457-460
Electronic Edition (link) BibTeX
- Taeshik Shon, Taewoo Noh, Jongsub Moon:
Support Vector Machine Based ICMP Covert Channel Attack Detection.
461-464
Electronic Edition (link) BibTeX
- Svetlana P. Sokolova, Ruslan S. Ivlev:
Computer Immunology System with Variable Configuration.
465-468
Electronic Edition (link) BibTeX
Copyright © Sat May 16 23:30:21 2009
by Michael Ley (ley@uni-trier.de)