default search action
Security and Management 2004: Las Vegas, Nevada, USA
- Hamid R. Arabnia, Selim Aissi, Youngsong Mun:
Proceedings of the International Conference on Security and Management, SAM '04, June 21-24, 2004, Las Vegas, Nevada, USA. CSREA Press 2004, ISBN 1-932415-37-8
Architectural Designs & Frameworks
- Binh Q. Nguyen:
A Security Architecture for a Web Portal of Sensitive Archival Records. Security and Management 2004: 3-8 - Wayne A. Jansen, Serban I. Gavrila, Vlad Korolev:
A Unified Framework for Mobile Device Security. Security and Management 2004: 9-14 - Hiep Pham, Zhuhan Jiang:
Ontology-Based Framework for E-Survivability Analysis. Security and Management 2004: 15-24
Wireless & Mobile Security
- Patrick George:
User Authentication with Smart Cards in Trusted Computing Architecture. Security and Management 2004: 25-31 - Anand R. Prasad, Hu Wang:
A Protocol for Secure Seamless Handover. Security and Management 2004: 32-40
Trusted Computing Platforms
- Mary Rossell, Alan D. Ross:
Machine Authentication and Security Compliance. Security and Management 2004: 41-45 - Alan D. Ross, Dennis Morgan:
Malware Mitigation Using Host Intrusion Prevention in the Enterprise. Security and Management 2004: 46-54
Encryption & Authentication
- Dennis Heimbigner:
Managing Access Rights for Terminated Employees. Security and Management 2004: 55-60 - Farhan A. Qazi:
A Survey of Biometric Authentication Systems. Security and Management 2004: 61-67 - Soon Hwa Sung, Eunbae Kong:
Byzantine Agreement with Threshold Cryptography in Unknown Networks. Security and Management 2004: 68-74 - M. Ammar Rayes, Michael Cheung:
User Isolation and Policy-Based Security Management. Security and Management 2004: 75-79 - Hiroshi Dozono, Hiroaki Sanada, Masanori Nakakuni, Yoshio Noguchi:
The Analysis of Graffiti Input and Its Application to Personal Identification. Security and Management 2004: 80-83 - Taesung Kim, Sangrae Cho, Seunghun Jin:
Authentication and Authorization for Network Security Service. Security and Management 2004: 84-88 - Alexander Wiesmaier, Marcus Lippert, Vangelis Karatsiolis:
The Key Authority - Secure Key Management in Hierarchical Public Key Infrastructures. Security and Management 2004: 89-93 - Dawei Hong, Shushuang Man, Barbra Hawes, Manton M. Matthews:
A Graphical Password Scheme Strongly Resistant to Spyware. Security and Management 2004: 94-100 - Raghavan Subramanian:
2 Channel Authentication. Security and Management 2004: 101-108
Security Engineering
- Carlos Villarrubia, Eduardo Fernández-Medina, Mario Piattini:
Analysis of ISO/IEC 17799: 2000 to be Used in Security Metrics. Security and Management 2004: 109-117 - Jesús Arturo Pérez Díaz, Gerardo Del Valle Torres:
Vulnerabilities in 802.11b Wireless Local Area Networks. Security and Management 2004: 118-124 - Antonio Sarasa Cabezuelo, Daniel Ruiz-Zorrilla Gonzalo, Marcos Muiños Martín:
Secure Business Processes Optimization System. Security and Management 2004: 125-134
Communication Networks
- Chunxiao Chigan, Rahul Bandaru:
Towards a Perfect Secure Routing Protocol for Mobile Ad Hoc Networks. Security and Management 2004: 135-140 - Giancarlo Ruffo:
Legal File and Profit Sharing in a Peer to Peer Network. Security and Management 2004: 141-146 - Farookh Khadeer Hussain, Elizabeth Chang, Tharam S. Dillon:
Repute Relationships for Reputation Management in Peer-to-Peer Communication - I. Security and Management 2004: 147-153 - Craig Valli, Peter Wolski:
802.11b Wireless Networks Insecure at Any Speed. Security and Management 2004: 154-158 - Sirisha Medidi, Muralidhar Medidi, Sireesh Gavini, Richard L. Griswold:
Detecting Packet Mishandling in MANETs. Security and Management 2004: 159-162 - Jing Wu, Jennifer Seberry, Tianbing Xia:
Secure IP Multicast for DMS. Security and Management 2004: 163-167 - Alexander Maslov:
Scenarios for Hijacking Execution Flow of .NET Managed Code. Security and Management 2004: 168-172 - Wonjoon Choi, Byeong-Hee Roh, Seung W. Yoo:
Measures for Detecting Network Attacks at the Aggregate Traffic Level on High-Speed Internet Backbone Links. Security and Management 2004: 173-178
Intrusion Management
- Robert F. Erbacher:
Analysis and Management of Intrusion Data Collection. Security and Management 2004: 179-185 - Brian J. d'Auriol, Kishore Surapaneni:
A State Transition Model Case Study for Intrusion Detection Systems. Security and Management 2004: 186-192 - Vasilis Chatzigiannakis, Georgios Androulidakis, Mary Grammatikou, Basil S. Maglaris:
An Architectural Framework for Distributed Intrusion Detection Using Smart Agents. Security and Management 2004: 193-199 - Hiep Pham, Zhuhan Jiang:
Intrusion-Based Survivability Architecture. Security and Management 2004: 200-206 - Luis Sardinha, Nuno Ferreira Neves, Paulo Veríssimo:
Tolerating Intrusions in Grid Systems. Security and Management 2004: 207-220
Emerging Research
- Namho Yoo, Hwajung Lee, Hyeong-Ah Choi:
An XML-Based Impact Analysis Using Security Management with IAVN. Security and Management 2004: 217-220 - Regine Endsuleit, Arno Wagner:
Possible Attacks on and Countermeasures for Secure Multi-Agent Computation. Security and Management 2004: 221-227 - Myron Sheu, Le Tang, Ravi Mukkamala:
A Systematic Approach to Security Deployment in a Networking Environment. Security and Management 2004: 228-234 - Albert Ball, Donald G. Cole, Michael L. Nelson:
Testing IPv6 Security. Security and Management 2004: 235-241 - Rodolfo Villarroel, Eduardo Fernández-Medina, Mario Piattini:
General Considerations on Data Warehouse Security. Security and Management 2004: 242-248 - In-Jung Kim, Yoon-Jung Jung, JoongGil Park, Dongho Won:
A Study on Security Risk Modeling over Information and Communication Infrastructure. Security and Management 2004: 249-253 - Sung-Ock Hong, Kyoung-Ja Kim, Tae-Mu Chang:
A Study on CRL Distribution for Response Time Reduction in Distributed OCSP. Security and Management 2004: 254-257 - Yoon-Jung Jung, In-Jung Kim, Namhoon Lee, JoongGil Park:
The Development of Risk Analysis Methodology for Information Asset on Network. Security and Management 2004: 258-261 - Yuhei Kawakoya, Yoichi Muraoka:
Proposal and Implementation of Router-Based Traceback Technique. Security and Management 2004: 262-266 - Ajmal S. Mian, Raja Iqbal:
Experimental Analysis of the Arcanum Key Exchange Protocol. Security and Management 2004: 267-271 - Tarek K. Alameldin, Amitesh Sinha:
Web Spoofing Techniques, Implementation and Solutions. Security and Management 2004: 272-277 - Matthew Benke, John Waite, Paul W. Oman, Ahmed Abdel-Rahim:
Survivable Systems Analysis for Real Time Control Systems in Critical Infrastructures. Security and Management 2004: 278-286
Algorithms
- Leon Pan, Chang N. Zhang:
Using Metadata to Protect the Audiovisual Contents in MPEG-7 Applications. Security and Management 2004: 287-293 - Tianbing Xia, Jennifer Seberry, Jing Wu:
Boolean Functions with Good Properties. Security and Management 2004: 294-299 - Yong-Seok Kim, Jun-Cheol Jeon, Jin-woo Jeon, Kee-Young Yoo:
An Efficient Access Control Model Based on User-Classification and Role-Division. Security and Management 2004: 300-304 - Jin Shu, Fengyu Liu, Manwu Xu:
NSPPM: A Node Sampling Approach to Probabilistic Packet Marking-Based IP Traceback. Security and Management 2004: 305-311 - Hee Bong Choi, Jong-Gil Kim, Sang-Yun Han, Mung-Gil Choi, Chun-Soo Kim, Hyoon Jae Lee:
DPA Methods of Smart Cards. Security and Management 2004: 312-317 - Yi-Jung Chen, Dyi-Rong Duh, Yunghsiang S. Han:
A New Modulo (2n+1) Multiplier for IDEA. Security and Management 2004: 318-324 - Kyoung-Ja Kim, Tae-Mu Chang:
A ZRP Based Reliable Route Discovery Scheme in Ad-Hoc Networks. Security and Management 2004: 325-331 - Phen-Lan Lin, Juen-Lin Huang, Ting-Jung Chang:
CAPTCHA-Based Anti-Spam Mail Model. Security and Management 2004: 332-340
Applications
- Nick Antonopoulos, Tatjana Bitzakidis, Roger M. A. Peel:
ASAM: An Automated System for Authorisation Data Change Management in GRID Environments. Security and Management 2004: 341-347 - Jeff Adams, Ranjit Abbadasari, Ravi Mukkamala:
EZ-Park: An Innovative Secure M-Commerce Application. Security and Management 2004: 348-352 - Yongwha Chung, Byung-Hee Hwang, Woo-Yong Choi, Daesung Moon, Sung Bum Pan, Sang-Hwa Chung:
A Hardware Implementation of Speaker Verification Using Support Vector Machine. Security and Management 2004: 353-358 - Madiha Zafar, S. M. H. Zaidi:
TCP SYN Flood Sensor for Internet Backbone. Security and Management 2004: 359-364 - Vamshi Krishna Venapally, William S. Harrison, Nadine Hanebutte:
KLADS: Unix Based Kernel Level Anomaly Detection System. Security and Management 2004: 365-368 - Mathias Fonkam, Chamraj Bathirappan:
JxPS2 - An Intelligent, Portable and Pluggable Security Service for Web Applications Using Java, XML and JIProlog (Java Internet Prolog). Security and Management 2004: 369-375 - Patrick R. Merry, Axel W. Krings, Paul W. Oman:
Survivable Systems Analysis of the North American Power Grid Communications Infrastructure. Security and Management 2004: 376-386
Late Papers
- Young-Jun Heo, Keol-Woo Ryu:
Abnormal Traffic Detection for Network Intrusion Detection. Security and Management 2004: 387-390 - Fariborz Farahmand, Shamkant B. Navathe, Gunter P. Sharp, Philip H. Enslow Jr.:
Data Confidentiality in E-Government and E-Commerce. Security and Management 2004: 391-394 - Ned M. Smith:
A Comparison of the trusted Computing Group Security Model with Clark-Wilson. Security and Management 2004: 395-401 - Najib Saylani:
A Proposal for an Automated Approach to Real Time Profiling of IT Security Compromises. Security and Management 2004: 402-407 - Mun-Kyu Lee, Dowon Hong:
An Efficient Protocol for Mutual Authentication and Key Agreement Using the Subscriber Identity Module. Security and Management 2004: 408-413 - Ghasem S. Alijani, Nam Tran, J. Steven Welsh:
Processing Biometric Information for Smart Cards Using a Dedicated Hash Function. Security and Management 2004: 414-420 - Mira Kwak, Dong-Sub Cho:
Modeling Host Status Transition for Network Intrusion Detection. Security and Management 2004: 421-426 - Shamila Makki, Niki Pissinou, Hui Huang:
The Security Issues in the Ad-Hoc on Demand Distance Vector Routing Protocol (AODV). Security and Management 2004: 427-
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.