default search action
1st SECURWARE 2007: Valencia, Spain
- Lourdes Peñalver, Oana Andreea Dini, Judie Mulholland, Octavio Nieto-Taladriz:
Proceedings of the First International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2007, October 14-20, 2007, Valencia, Spain. IEEE Computer Society 2007, ISBN 0-7695-2989-5
SECMAN
- Adam Wierzbicki:
Evaluating a New Reputation Algorithm With Consideration For Fairness. 1-6 - Sergejus Sosunovas, Olegas Vasilecas:
Four security certification levels for IT Managers and Staff in the Public Sector. 7-11 - Tewfiq El Maliki, Jean-Marc Seigneur:
A Survey of User-centric Identity Management Technologies. 12-17 - Mohammad M. R. Chowdhury, Juan Miguel Gómez, Josef Noll, Ángel García-Crespo:
SemID: Combining Semantics with Identity Management. 18-23
SYSSEC and THREATS
- Marga Nácher, Carlos Miguel Tavares Calafate, Juan-Carlos Cano, Pietro Manzoni:
Evaluation of the Impact of Multipath Data Dispersion for Anonymous TCP Connections. 24-29 - Olivier Powell, Jean-Marc Seigneur, Luminita Moraru:
Trustworthily Forwarding Sensor Networks Information to the Internet. 30-35 - Nikolaos Chatzis:
Motivation for Behaviour-Based DNS Security: A Taxonomy of DNS-Related Internet Threats. 36-41 - Monia Loulou, Mohamed Tounsi, Ahmed Hadj Kacem, Mohamed Jmaiel:
A Formal Approach to prevent Attacks on Mobile Agent Systems. 42-47
INFOSEC 1
- Zorana Bankovic, Slobodan Bojanic, Octavio Nieto-Taladriz, Atta Badii:
Increasing Detection Rate of User-to-Root Attacks Using Genetic Algorithms. 48-53 - Masaru Takesue:
A Scheme for Protecting the Information Leakage Via Portable Devices. 54-59 - Noura A. Saleh, Hoda N. Boghdady, Samir I. Shaheen, Ahmed M. Darwish:
A Quasi-Lossless Data Embedding Technique Based on Euclidean Distance Calculation. 60-65 - Yeonjung Kang, Hyangjin Lee, Kilsoo Chun, Junghwan Song:
Classification of Privacy Enhancing Technologies on Life-cycle of Information. 66-70 - Daniel-Ioan Curiac, Daniel T. Iercan, Octavian Dranga, Florin Dragan, Ovidiu Banias:
Chaos-Based Cryptography: End of the Road? 71-76
INFOSEC 2, PRODAM and SECTECH
- Ignacio Blanquer, Vicente Hernández, Damià Segrelles, Erik Torres:
Long-term storage and management of encrypted biomedical data in real scenarios. 77-82 - Josef Noll, Mohammad M. R. Chowdhury, György Kálmán, Juan Miguel Gómez:
Semantically supported Authentication and Privacy in Social Networks. 83-88 - Marek Kumpost:
Data Preparation for User Profiling from Traffic Log. 89-94 - Lourdes López-Santidrián, Luis Redondo, José-Fernán Martínez, Manuel Ramiro, Vicente Hernández, Francisco A. B. Bonilla, Fermín Bretón:
SECUAREA: Security in physical and logical areas. 95-100
ARCH 1 and SECHOME
- Carlos Nuno da Cruz Ribeiro:
Robust sensor self-initialization: Whispering to avoid intruders. 101-106 - Xiaomeng Su, Damiano Bolzoni, Pascal van Eck:
Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services. 107-114 - Jacques Saraydaryan, Véronique Legrand, Stéphane Ubéda:
Evaluation of Deviating Alerts coming from Behavioral Intrusion Detection System. 115-121 - Jorge Belenguer, Carlos Miguel Tavares Calafate:
A low-cost embedded IDS to monitor and prevent Man-in-the-Middle attacks on wired LAN environments. 122-127 - Pedro Malagón, Juan Carlos Vallejo, José Manuel Moya:
Dynamic environment evaluation for reliable AmI applications based on untrusted sensor. 128-131
ARCH 2
- Hristo Koshutanski, Mihaela Ion, Luigi Telesca:
Distributed Identity Management Model for Digital Ecosystems. 132-138 - Jens Heider, Julian Schütte:
Security made easy: Achieving user-friendly communication protection in ad-hoc situations. 139-144 - Vukasin Pejovic, Slobodan Bojanic, Carlos Carreras:
Adding Value to TCP/IP Based Information exchange Security by Specialized Hardware. 145-150 - Vukasin Pejovic, Ivana Kovacevic, Slobodan Bojanic, Corado Leita, Jelena Popovic, Octavio Nieto-Taladriz:
Migrating a HoneyDepot to Hardware. 151-156
ARCH 3
- Raquel Lacuesta Gilaberte, Lourdes Peñalver Herrero:
Automatic Configuration of Ad-Hoc Networks: Establishing unique IP Link-Local Addresses. 157-162 - Han-Shik Kim, Byung-Seok Kang, Sangheon Pack, Chul-Hee Kang:
Route Investigation for Secure Routing in Mobile Ad-hoc Networks. 163-168 - Lari Iso-Anttila, Jorma Ylinen, Pekka Loula:
A Proposal to Improve IKEv2 negotiation. 169-174 - Benjamin Fontan, Sara Mota, Pierre de Saqui-Sannes, Thierry Villemur:
Temporal Verification in Secure Group Communication System Design. 175-180 - Mehrez Essafi, Lamia Labed Jilani, Henda Hajjami Ben Ghézala:
Towards a Comprehensive View of Secure Software Engineering. 181-186
ARCH 4
- Hédi Hamdi, Adel Bouhoula, Mohamed Mosbah:
A Software Architecture for Automatic Security Policy Enforcement in Distributed Systems. 187-192 - Pierre Parrend, Samuel Galice, Stéphane Frénot, Stéphane Ubéda:
Identity-Based Cryptosystems for Enhanced Deployment of OSGi Bundles. 193-200 - Arnaud Dury, Sergiy Boroday, Alexandre Petrenko, Volkmar Lotz:
Formal Verification of Business Workflows and Role Based Access Control Systems. 201-210 - Haiyong Chen, Hongwei Sun, Kwok-Yan Lam:
A fast and elastic fingerprint matching algorithm using minutiae-centered circular regions. 211-215 - Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt:
AmTRUE: Authentication Management and Trusted Role-based Authorization in Multi-Application and Multi-User Environment. 216-221
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.