SEC 2005:
Makuhari-Messe,
Chiba,
Japan
Ryôichi Sasaki, Sihan Qing, Eiji Okamoto, Hiroshi Yoshiura (Eds.):
Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30 - June 1, 2005, Chiba, Japan.
Springer 2005, ISBN 0-387-25658-X BibTeX
Privacy and Anonymity
Security Management
Security Architecture
Trusted Computing Systems
- Joon S. Park, Pratheep Chandramohan, Ganesh Devarajan, Joseph Giordano:
Trusted Component Sharing by Runtime Test and Immunization for Survivable Distributed Systems.
127-142 BibTeX
- Jiang-chun Ren, Kui Dai, Zhiying Wang, Xue-mi Zhao, Yuan-man Tong:
Design and Implementation a TPM Chip SUP320 by SOC.
143-154 BibTeX
- Keisuke Ohmori, Ayako Suzuki, Mariko Kawabata, Ryu Matsushima, Manabu Ohmuro, Toshifumi Kai, Shigeru Nishiyama:
Mathematical Models of IP Traceback Methods and Their Verification.
155-170 BibTeX
Secure Commercial Systems
Mobility and Ubiquitous Security
Internet and Web Security
Internet Security to DoS Attack
Intrusion Detection
- Wayne Huang, J. L. Cong, Chien-Long Wu, Fan Zhao, Shyhtsun Felix Wu:
Design, Implementation, and Evaluation of "FRiTrace".
343-358 BibTeX
- Konstantinos Xinidis, Kostas G. Anagnostakis, Evangelos P. Markatos:
Design and Implementation of a High-Performance Network Intrusion Prevention System.
359-374 BibTeX
- Periklis Akritidis, Evangelos P. Markatos, Michalis Polychronakis, Kostas G. Anagnostakis:
STRIDE: Polymorphic Sled Detection through Instruction Sequence Analysis.
375-392 BibTeX
- Spyros Antonatos, Michalis Polychronakis, Periklis Akritidis, Kostas G. Anagnostakis, Evangelos P. Markatos:
Piranha: Fast and Memory-Efficient Pattern Matching for Intrusion Detection.
393-408 BibTeX
Digital Signature Schemes
Key Management
Security for Multimedia
JavaCards
- John A. MacDonald, William G. Sirett, Chris J. Mitchell:
Overcoming Channel Bandwidth Constraints in Secure SIM Applications.
539-550 BibTeX
- K. Papapanagiotou, Constantinos Markantonakis, Q. Zhang, William G. Sirett, Keith Mayes:
On the Performance of Certificate Revocation Protocols Based on a Java Card Certificate Client Implementation.
551-564 BibTeX
- Arjen van Weelden, Martijn Oostdijk, Lars Frantzen, Pieter W. M. Koopman, Jan Tretmans:
On-the-Fly Formal Testing of a Smart Card Applet.
565-576 BibTeX
- Joel VanLaven, Mark Brehob, Kevin J. Compton:
Side Channel Analysis, Fault Injection and Applications - A Computationally Feasible SPA Attack on AES via Optimized Search.
577-588 BibTeX
- Sylvain Guilley, Philippe Hoogvorst:
The Proof by 2M-1: a Low-Cost Method to Check Arithmetic Computations.
589-600 BibTeX
- Jieyin Cheng, Cheun Ngen Chong, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Stefan Nikolaus:
StreamTo: Streaming Content using a Tamper-Resistant Token.
601-612 BibTeX
Copyright © Sat May 16 23:37:19 2009
by Michael Ley (ley@uni-trier.de)