default search action
3. WOSIS 2005: Miami, FL, USA
- Eduardo Fernández-Medina, Julio César Hernández Castro, Luis Javier García Castro:
Security in Information Systems, Proceedings of the 3rd International Workshop on Security in Information Systems, WOSIS 2005, In conjunction with ICEIS2005, Miami, USA, May 2005. INSTICC Press 2005, ISBN 972-8865-25-2 - Siraj A. Shaikh, Vicky J. Bush:
Analysing the Woo-Lam Protocol Using CSP and Rank Functions. WOSIS 2005: 3-12 - Shuyao Yu, Youkun Zhang, Runguo Ye, Chuck Song:
A Secure Hash-Based Strong-Password Authentication Scheme. WOSIS 2005: 13-20 - H. A. Eneh, Orhan Gemikonakli:
An Approach for the Analysis of Security Standards for Authentication in Distributed Systems. WOSIS 2005: 21-30 - M. Choudary Gorantla, Raju Gangishetti, Manik Lal Das, Ashutosh Saxena:
An Effective Certificateless Signature Scheme Based on Bilinear Pairings. WOSIS 2005: 31-39 - Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati:
ID-based Serial Multisignature Scheme using Bilinear Pairings. WOSIS 2005: 40-47 - Changshe Ma, Kefei Chen, Shengli Liu, Dong Zheng:
Transitive Signatures Based on Bilinear Maps. WOSIS 2005: 48-56 - Robson de Oliveira Albuquerque, Maíra Hanashiro, Rafael Timóteo de Sousa Júnior, Cláudia J. Barenco Abbas, Luis Javier García-Villalba:
MANET - Auto Configuration with Distributed Certification Authority models Considering Routing Protocols Usage. WOSIS 2005: 57-66 - Robson de Oliveira Albuquerque, Daniel Silva Almendra, Leonardo Lobo Pulcineli, Rafael Timóteo de Sousa Júnior, Cláudia J. Barenco Abbas, Luis Javier García-Villalba:
SisBrAV - Brazilian Vulnerability Alert System. WOSIS 2005: 67-76 - Sushan Sudaharan, Srikrishna Dhammalapati, Sijan Rai, Duminda Wijesekera:
Honeynet Clusters as an early Warning System for Production Networks. WOSIS 2005: 77-83 - Cláudia J. Barenco Abbas, Alessandra Lafetá, Giuliano Arruda, Luis Javier García-Villalba:
A Honeypot Implementation as Part of the Brazilian Distributed Honeypots Project and Statistical Analysis of Attacks Against a University's Network. WOSIS 2005: 84-93 - Ulf T. Mattsson:
A Real-time Intrusion Prevention System for Commercial Enterprise Databases and File Systems. WOSIS 2005: 94-101 - Jiande Zheng:
Public-Key Encryption Based on Matrix Diagonalization Problem. WOSIS 2005: 102-112 - Guangsen Zhang, Manish Parashar:
Cooperative Defense against Network Attacks. WOSIS 2005: 113-122 - Christos K. Dimitriadis, Despina Polemi:
A Protocol for Incorporating Biometrics in 3G with Respect to Privacy. WOSIS 2005: 123-135 - Vaibhav Gowadia, Csilla Farkas:
Tree Automata for Schema-level Filtering of XML Associations . WOSIS 2005: 136-145 - Chunxiao Ye, Zhongfu Wu, Yunqing Fu:
An Attribute-Based-Delegation-Model and Its Extension. WOSIS 2005: 146-159 - Sabah S. Al-Fedaghi:
A Systematic Approach to Anonymity. WOSIS 2005: 160-172 - Claudine Conrado, Milan Petkovic, Michiel van der Veen, Wytse van der Velde:
Controlled Sharing of Personal Content using Digital Rights Management. WOSIS 2005: 173-185 - Marco Voss, Wolfram Wiesemann:
Using Reputation Systems to Cope with Trust Problems in Virtual Organizations. WOSIS 2005: 186-195 - Yanjun Zuo, Brajendra Panda:
External Object Trust Zone Mapping for Information Clustering. WOSIS 2005: 196-206 - Eduardo B. Fernández, Tami Sorgente, María M. Larrondo-Petrie:
A UML-Based Methodology for Secure Systems: The Design Stage . WOSIS 2005: 207-216 - Rodolfo Villarroel, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini:
Towards a UML 2.0/OCL extension for designing Secure Data Warehouses. WOSIS 2005: 217-228 - Khaled Alghathbar, Duminda Wijesekera, Csilla Farkas:
Secure UML Information Flow using FlowUML. WOSIS 2005: 229-238 - Wes Sonnenreich, Jason Albanese, Bruce Stout:
Return On Security Investment (ROSI): A Practical Quantitative Model. WOSIS 2005: 239-252 - Subhas C. Misra, Vinod Kumar, Uma Kumar:
An Approach for Modeling Information Systems Security Risk Assessment. WOSIS 2005: 253-262 - Peter D. Zegzhda, Dmitry P. Zegzhda, Maxim O. Kalinin:
Detection of the Operating System Configuration Vulnerabilities with Safety Evaluation Facility. WOSIS 2005: 263-276 - Thuong Doan, Laurent D. Michel, Steven A. Demurjian, T. C. Ting:
Stateful Design for Secure Information Systems. WOSIS 2005: 277-286 - Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini:
Towards an integration of Security Requirements into Business Process Modeling. WOSIS 2005: 287-297 - Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini:
Towards a Process for Web Services Security. WOSIS 2005: 298-308 - Christine E. Drake, Andrew Klein, Jonathan J. Oliver:
Analysis of the Phishing Email Problem and Discussion of Possible Solutions. WOSIS 2005: 309-318 - Wiebe K. Wiechers, Semir Daskapan:
Validating the Security of Medusa: A survivability Protocol for Security Systems. WOSIS 2005: 319-330 - Serge Chaumette, Damien Sauveron:
An Efficient and Simple Way to Test the Security of Java CardsTM. WOSIS 2005: 331-341
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.