default search action
Security and Management 2005: Las Vegas, Nevada, USA
- Hamid R. Arabnia:
Proceedings of The 2005 International Conference on Security and Management, SAM 2005, Las Vegas, Nevada, USA, June 20-23, 2005. CSREA Press 2005, ISBN 1-932415-82-3
Workshop: IP Network Security
- Hua Wang, Zhongwei Zhang, David Lai:
Towards an Authentication Protocol for Service Outsourcing Over IP Networks. Security and Management 2005: 3-9 - Jiwei Wei, Zhixin Sun:
On Intelligent Agent-based Decoy Systems. Security and Management 2005: 10-16 - Michihiro Aoki, Takafumi Hamano, Takeshi Miyasaka, Kentaro Ogawa, Masaaki Inami, Keishi Habara, Shinichiro Chaki:
Enhancing Security Functionality on Open Router Architecture. Security and Management 2005: 17-23 - Ed Kirkham, Paul Botham:
redAlert: Data-Mining and Visualisation for IP Data Analysis. Security and Management 2005: 24-32
Public Key Encryption
- Soon Hwa Sung, Eunbae Kong:
A Distributed Certificate Status Verification Using Mobile Code PSTU(Proactive Self Transaction Unit) of Secure Mobile Agent in PKI(Public Key Infrastructure). Security and Management 2005: 33-39 - Himanshu Thapliyal, M. B. Srinivas, Hamid R. Arabnia:
Faster RSA Encryption/Decryption Architecture Using an Efficient High Speed Overlay Multiplier. Security and Management 2005: 40-44 - HyunHee Choi, InJung Kim, Jeong Ryou:
A Study on Variable Modulo Number Based Public Key Cryptosystem in Mobile Network. Security and Management 2005: 45-50
Key Management
- Wei-Bin Lee, Jia-Hong Li, Chyi-Ren Dow:
Efficient Date-Constraint Hierarchical Key Assignment Scheme. Security and Management 2005: 51-57 - Ying Wu, Yongping Zhang, Tianjie Cao:
Security Analysis of A Proxy Signature Scheme Based on the Elliptic Curve Cryptosystem. Security and Management 2005: 58-64 - Eun-Jun Yoon, Jae-Hyung Jung, Woo-Hun Kim, Kee-Young Yoo:
A Secret Key Based Authentication Scheme Using Smart Cards. Security and Management 2005: 65-71 - Eun-Jun Yoon, Eun-Kyung Ryu, Woo-Hun Kim, Kee-Young Yoo:
Cryptanalysis of A Key Authentication Scheme Based on Discrete Logarithms. Security and Management 2005: 72-78
Attack Management
- Karin Sallhammar, Bjarne E. Helvik, Svein J. Knapskog:
Incorporating Attacker Behavior in Stochastic Models of Security. Security and Management 2005: 79-85 - Guangsen Zhang, Manish Parashar:
Cooperative Mechanism Against DDoS Attacks. Security and Management 2005: 86-96 - Sergio Caltagirone, Paul Ortman, Sean Melton, David O. Manz, Kyle King, Paul W. Oman:
RADICL: A Reconfigurable Attack-Defend Instructional Computing Laboratory. Security and Management 2005: 97-103 - Jin Shu, Fengyu Liu, Manwu Xu:
Baseline - A Passive Approach to Tolerate and Detect DoS/DDoS Attacks. Security and Management 2005: 104-110 - Henghui Zou, Hengming Zou:
A Prediction and Early Warning Model for Hacker Attacks. Security and Management 2005: 111-118 - Jonathan Wong, Duncan S. Wong:
Known Session Key Attack Against a Collection of Signcryption Schemes. Security and Management 2005: 119-126
Intrusion Detection
- HamidReza Haydari, Ali Moeini, MahdiReza Mohajerani:
An Approach to Reduce False Alarms in an Intrusion Detection System. Security and Management 2005: 127-132 - Brian J. d'Auriol, Afolami Akinsanmi:
A Conceptual Space Model for Intrusion Detection. Security and Management 2005: 133-139 - Brian J. d'Auriol, Kishore Surapaneni:
A Computation-Communication Sequencing Model for Intrusion Detection Systems. Security and Management 2005: 140-143 - Riaz Ahmed Shaikh, Saeed Rajput, S. M. H. Zaidi, Kashif Shairf:
Enterprise Wide Centralized Logging Mechanism for Application Level Intrusion Detection. Security and Management 2005: 144-148 - Richard A. Wasniowski:
Intrusion Detection with Agent-Based System. Security and Management 2005: 149-154
Network Management: Issues & Protocols
- Ramzi El-Haddadeh, Gareth A. Taylor:
Novel Congestion-Based Pricing Scheme for QoS-Enabled Networks. Security and Management 2005: 155-162 - Yuqing Zhang, Xiuying Liu, Dengguo Feng:
An approach to the formal verification of the three-principal security protocols. Security and Management 2005: 163-169 - Kanwalinderjit Kaur Gagneja:
Privacy Protocol for Quantum Channel. Security and Management 2005: 170-175 - Brian J. d'Auriol:
Network Vertical Intrusion Model (NetVIM). Security and Management 2005: 176-179 - M. D. Kesari, S. D. Sudarsan, T. Velayutham, Manisha Jagadhane, U. Sailaja:
Information Assurance Security Frameworkfor Enterprise Networks. Security and Management 2005: 180-186
Design, Architecture & Frameworks
- Dennis Heimbigner:
Client-Side Deception Using Architectural Degradation. Security and Management 2005: 187-193 - Jinqiao Yu, Y. V. Ramana Reddy, Sentil Selliah, Sumitra Reddy:
A Knowledge-Based Alert Evaluation and Security Decision Support Framework. Security and Management 2005: 194-200 - Kibaya Erisania, Dongqing Xie:
Designing a Secure Trust Intermediary Service (STIS) for Web Services: a WS-Trust Approach. Security and Management 2005: 201-207 - Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu, Yan Woo:
A model to support fine-grained delegation of authorization. Security and Management 2005: 208-212 - Youngho Kim, Jeongnyeo Kim:
Design of Packet Filtering on Network Processor. Security and Management 2005: 213-220
Research & Methodologies
- Jan vom Brocke, Christian Buddendick:
Security Awareness Management - Foundations and Implementation of Security Awareness. Security and Management 2005: 221-227 - Robert F. Erbacher, Menashe Garber:
Real-Time Interactive Visual Port Monitoring and Analysis. Security and Management 2005: 228-234 - Chlotia Posey Garrison:
Computer Security Awareness of College Students. Security and Management 2005: 235-240 - John Gathegi, Michael Workman:
Observance and Contravention of Information Security Measures. Security and Management 2005: 241-247 - Guillermo A. Francia III, Keion Clinton:
Computer Forensic Tools and Techniques. Security and Management 2005: 248-252 - Brian Brammeier, Eltayeb Abuelyaman:
On The Improvement of XML Web Services Security. Security and Management 2005: 253-259 - Zubair A. Baig:
Preventing Service Flooding on Internet DNS Servers thru an Application-Level Mechanism: A Performance Analysis. Security and Management 2005: 260-268
Algorithms
- Ganesh Godavari, C. Edward Chow:
Secure Information Sharing Using Attribute Certificates and Role Based Access Control. Security and Management 2005: 269-276 - Jianwu Zheng, Mingsheng Liu:
Establishing Trustworthy Terminal with Smart Card. Security and Management 2005: 277-282 - Alexander Bahrushin, Kiseon Kim:
Rotation and Scaling Invariant Watermarking on Base of a Linear Polar Grid Representation. Security and Management 2005: 283-289 - Hesham Elzouka:
A Secure and Robust Algorithm for Exchanging Secret Messages. Security and Management 2005: 290-296 - Patrick George, Gérald Maunier:
Combining User and Platform Trust Properties to Enhance VPN Client Authentication. Security and Management 2005: 297-303 - Dugyu Ryoo, Seonho Kim, Moonseog Jun:
Role Authentication for Secure DBMS. Security and Management 2005: 304-312
Optimization Techniques
- Alexander Wiesmaier, Mike Fisher, Marcus Lippert, Johannes Buchmann:
Ouflanking and Securely Using the PIN/TAN-System. Security and Management 2005: 313-319 - Lawrence Chung, Nary Subramanian:
Reconfirming Change in Secure Software Systems: An Adaptable Security Approach. Security and Management 2005: 320-326 - Yan Woo, Lucas Chi Kwong Hui, Kam-Pui Chow, Siu-Ming Yiu:
Dynamic Integrity Verification for Software Self-defense. Security and Management 2005: 327-333 - Bogdan Hoanca, Kenrick J. Mock:
Screen oriented technique for reducing the incidence of shoulder surfing. Security and Management 2005: 334-340 - Ihor V. Vasyltsov, Hee-Kwan Son:
Redundancy of Check-Point Unit as a Method to Increase the Resistance to Fault Influence in ECC. Security and Management 2005: 341-347 - Eui-nam Huh, Seung-Yeon Lee, Youngsong Mun, Hyunseung Choo:
An Efficient Authentication Mechanism on Ad-Hoc Telematics Environment. Security and Management 2005: 348-356
Systems & Prototypes
- Teik Guan Tan:
An Enhanced One-Time Password Implementation. Security and Management 2005: 357-363 - Jianyun Xu, Andrew H. Sung, Qingzhong Liu:
Online Fraud Detection System Based on Non-Stationery Anomaly Detection. Security and Management 2005: 364-370 - Himanshu Thapliyal, M. B. Srinivas, Hamid R. Arabnia:
Implementation of A Fast Square In RSA Encryption/Decryption Architecture. Security and Management 2005: 371-374 - Jianming Yu, Jun Li:
A Parallel NIDS Pattern Matching Engine and Its Implementation on Network Processor. Security and Management 2005: 375-384
Security in Remote - Mobile Environments
- Miss Laiha Mat Kiah, Keith M. Martin:
Group Communication: Design Challenges in the Development of Key Management Frameworks in Wireless Mobile Environments. Security and Management 2005: 385-391 - Tarek K. Alameldin, Saeed Iqbal, Vishal Saberwal:
Steganography Analysis on Mobile Devices. Security and Management 2005: 392-397 - Wayne A. Jansen, Serban I. Gavrila, Vlad Korolev:
Proximity-Based Authentication for Mobile Devices. Security and Management 2005: 398-404 - Georgios Kalogridis, Chris J. Mitchell, Gary Clemo:
Spy Agents: Evaluating Trust in Remote Environments. Security and Management 2005: 405-411 - Wei-Bin Lee, Hsing-Bai Chen, Chyi-Ren Dow:
Remote User Authentication Scheme with User Anonymity. Security and Management 2005: 412-420
Conference on Biometric Authentication
- Zong Chen, Michael Recce:
Verification of Fingertip Pattern on Gun Handle. Security and Management 2005: 421-424 - Yuan Luo, Marina L. Gavrilova:
Coarse Fingerprint Matching Based on Singular Points. Security and Management 2005: 425-433 - Zong Chen, Michael Recce:
Dynamic Handgrip Recognition. Security and Management 2005: 434-439 - Hiroshi Dozono, Daichi Takata, Masanori Nakakuni, Yoshio Noguchi:
The Analysis of Pen Pressures of Handwritten Symbols on PDA Touch Panel using Self Orgazining Maps. Security and Management 2005: 440-445 - Chikara Ohkubo, Yoichi Muraoka:
Biometric Authentication Using PKI. Security and Management 2005: 446-452
Late Papers
- Jiann-Liang Chen, Shih-Feng Sun:
Design of IPv6-Based Mobile Routers for Network Mobility Applications. Security and Management 2005: 453-459 - Fu-Shing Sun, Chun-Hung Tzeng:
A Learning Model for Intrusion Detection Using Tolerance Relation. Security and Management 2005: 460-466 - Nitin Gupta:
The changing face of application security: A look at the evolving security infrastructure. Security and Management 2005: 467-472 - Janusz Stoklosa, Jaroslaw Bubicz:
Compound inversive congruential generator as a source of keys for stream ciphers. Security and Management 2005: 473-478 - Eunjin Ko, Boosun Jeon, Nosam Park, Gilhaeng Lee:
The Data Handling Method of a Data Dispatcher Module in Web-Based SLA Monitoring and Reporting (WSMR) System. Security and Management 2005: 479-483 - Goo Yeon Lee, Yong Lee, Hwa Jong Kim, Choong Kyo Jeong, Dong Eun Lee:
Design and Implementation of a Data Sharing Scheme with Security and Flexibility Applicable to Extended P2P Systems. Security and Management 2005: 484-490 - Alexandre Fernandes de Moraes, João Batista Camargo Jr.:
Biometrics - Evaluating Security Technologies for Brazilian Airports. Security and Management 2005: 491-496 - Ching-Tang Hsieh, Chu-Sheng Cheng, Chih-Hsu Hsu:
AC/V Segmentation Approach for Mandarin Speech Based on Wavelet Transform. Security and Management 2005: 497-501 - Andrzej Bialas:
IT Security Modeling. Security and Management 2005: 502-505 - Brian P. Briammeier, Eltayeb Salih Abuelyaman:
A Spyware Prevention Model: A Proactive Approach. Security and Management 2005: 506-511 - Sung-Yeal Im, Ki-Dong Chung:
A Study on the Data Encipherment Equipment with Rijndael Algorithm in ATM Network. Security and Management 2005: 512-517 - Mira Kwak, Dong-Sub Cho:
Host State Representation for Intrusion Detection. Security and Management 2005: 518-523 - Muhammad Almas, Muhammad Younus, Abdul Basit:
A Linear Dimension Reduction Technique For Face Recognition. Security and Management 2005: 524-
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.