SECRYPT 2006:
Setúbal,
Portugal
Manu Malek, Eduardo Fernández-Medina, Javier Hernando (Eds.):
SECRYPT 2006, Proceedings of the International Conference on Security and Cryptography, Setúbal, Portugal, August 7-10, 2006, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications.
INSTICC Press 2006, ISBN 972-8865-63-5 BibTeX
Invited Speakers
Keynote Lectures
Tutorial
- David A. Marca:
Project Management for E-Business Initiatives . Project Framework, Proven Practices, Coordinated Work, Focused Sub-Teams.
BibTeX
Access Control and Intrusion Detection
Full Papers
- Behnam Sattarzadeh, Mahdi Asadpour, Rasool Jalili:
Security Enhancement for a Low Computation Cost User Authentication Scheme.
5-8 BibTeX
- R. Ricci, Gérard Chollet, M. V. Crispino, S. Jassim, Jacques C. Koreman, Andrew C. Morris, M. Olivar-Dimas, Sonia Garcia-Salicetti, Pedro Soria-Rodriguez:
The "SECUREPHONE" - A Mobile Phone with Biometric Authentication and e-Signature Support for Dealing Secure Transactions on the Fly.
9-16 BibTeX
- Javier Hernando, Mireia Farrús, Pascual Ejarque, Ainara Garde, Jordi Luque:
Person Verification by Fusion of Prosodic, Voice Spectral and Facial Parameters.
17-23 BibTeX
- Najla Arfaoui, Farah Jemili, Montaceur Zaghdoud, Mohamed Ben Ahmed:
Comparative Study between Bayesian Network and Possibilistic Network in Intrusion Detection.
24-31 BibTeX
- Nathalie Dagorn:
Intrusion Detection for Web Applications (Short Version).
32-39 BibTeX
- Zouheir Trabelsi, Khaled Shuaib:
Spoofed ARP Packets Detection in Switched LAN Networks.
40-47 BibTeX
- Abdoul Karim Ganame, Julien Bourgeois, Renaud Bidou, François Spies:
Evaluation of the Intrusion Detection Capabilities and Performance of a Security Operation Center.
48-55 BibTeX
- Juan Manuel García, Tomás Navarrete, Carlos Orozco:
Workload Hidden Markov Model for Anomaly Detection.
56-59 BibTeX
Short Papers
Posters
Network Security and Protocols
Full Papers
- Gregory V. Bard:
A Challenging but Feasible Blockwise-Adaptive Chosen-Plaintext Attack on SSL.
99-109 BibTeX
- Ines Feki, Xiaoli Zheng, Mohammed Achemlal, Ahmed Serhrouchni:
Internet Routing Security: An Approach to Detect and to React to Incorrect Advertisements.
110-117 BibTeX
- Amir Herzberg, Igal Yoffe:
Layered Architecture for Secure E-Commerce Applications.
118-125 BibTeX
- Adam Wierzbicki:
Trust Management without Reputation in P2P Games.
126-134 BibTeX
- Chuan-Wen Loe, Khoongming Khoo:
Protecting Cipher Block Chaining Against Adaptive Chosen Plaintext Attack.
135-140 BibTeX
- Kan Yasuda, Kazumaro Aoki, Eiichiro Fujisaki, Atsushi Fujioka:
Forward-Secure Authenticated-Encryption in Multi-Receiver Setting.
141-148 BibTeX
- Gabriel Maciá-Fernández, Jesús E. Díaz-Verdejo, Pedro Garcia-Teodoro:
On the Design of a Low-Rate DoS Attack Against Iterative Servers.
149-156 BibTeX
- Pascal Urien, Mohamad Badra:
Secure Access Modules for Identity Protection over the EAP-TLS - Smartcard Benefits for User Anonymity in Wireless Infrastructures.
157-163 BibTeX
Short Papers
Posters
Cryptographic Techniques and Key Management
Full Papers
Short Papers
Posters
Information Assurance
Full Papers
Short Papers
Posters
Security in Information Systems
Full Papers
- Timothy E. Levin, Cynthia E. Irvine, Thuy D. Nguyen:
Least Privilege in Separation Kernels.
355-362 BibTeX
- Richard Whittaker, Gonzalo Argote-Garcia, Peter J. Clarke, Raimund K. Ege:
Collaboration Security for Modern Information Systems.
363-370 BibTeX
- Zheng Zhang, Walid Rjaibi:
Inter-Node Relationship Labeling: A Fine-Grained XML Access Control Implementation Using Generic Security Labels.
371-378 BibTeX
- Manuel Sánchez, Gabriel López, Antonio F. Gómez-Skarmeta, Óscar Cánovas Reverte:
Using Microsoft Office Infopath to Generate XACML Policies.
379-386 BibTeX
- Jarrod Trevathan, Wayne Read:
Secure Online English Auctions.
387-396 BibTeX
- Masaki Inamura, Toshiaki Tanaka, Toshiyuki Fujisawa, Kazuto Ogawa, Takeshi Kimura:
Flexible License Transfer System Using Mobile Terminal.
397-404 BibTeX
Short Papers
- Takahito Tsukuba, Kenichiro Noguchi:
Extending XML Signature and Applying it to Web Page Signing.
407-412 BibTeX
- Kari Anne Haaland, Chunming Rong:
Securing Web Services Using Identity-Based Encryption (IBE).
413-418 BibTeX
- David G. Rosado, Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini:
Defining Viewpoints for Security Architectural Patterns.
419-424 BibTeX
- Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini:
Security Risk Analysis in Web Services Systems.
425-430 BibTeX
- Zaobin Gan, Vijay Varadharajan:
Design and Implementation of a Practical Secure Distributed Healthcare Application.
431-436 BibTeX
- Zaobin Gan, Dengwei Wei, Vijay Varadharajan:
Improving Software Security Through an Integrated Approach.
437-442 BibTeX
- Seyed Hamed Hassani, Mohammad Reza Aref:
A New (t, n) Multi-Secret Sharing Scheme Based on Linear Algebra.
443-449 BibTeX
- Jarrod Trevathan, Wayne Read:
Undesirable and Fraudulent Behaviour in Online Auctions.
450-458 BibTeX
- Sharon Nachtigal, Chris J. Mitchell:
Modelling E-Business Security Using Business Processes.
459-464 BibTeX
Posters
Copyright © Sat May 16 23:37:21 2009
by Michael Ley (ley@uni-trier.de)