default search action
SECRYPT 2006: Setúbal, Portugal
- Manu Malek, Eduardo Fernández-Medina, Javier Hernando:
SECRYPT 2006, Proceedings of the International Conference on Security and Cryptography, Setúbal, Portugal, August 7-10, 2006, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications. INSTICC Press 2006, ISBN 972-8865-63-5
Invited Speakers
Keynote Lectures
- David A. Marca:
E-Business Strategy - Charting a Way through Uncertain Waters of Electronic Commerce. SECRYPT 2006 - Manu Malek:
IT Security Forensics: Promises and Shortcomings. SECRYPT 2006 - Les Barclay:
Wireless Communications, a new Emphasis for Effective Use of the Radio Spectrum. SECRYPT 2006 - Fernando Pereira:
Multimedia Representation in MPEG Standards: Achievements and Challenges. SECRYPT 2006 - Jan Jürjens:
Model-Based Security Engineering. SECRYPT 2006 - Anisse Taleb:
Advances in Speech and Audio Coding and its Applications for Mobile Multimedia. SECRYPT 2006 - Thomas Greene:
Redefining the Market Place: Only the Numbers are Different? SECRYPT 2006
Tutorial
- David A. Marca:
Project Management for E-Business Initiatives . Project Framework, Proven Practices, Coordinated Work, Focused Sub-Teams. SECRYPT 2006
Access Control and Intrusion Detection
Full Papers
- Behnam Sattarzadeh, Mahdi Asadpour, Rasool Jalili:
Security Enhancement for a Low Computation Cost User Authentication Scheme. SECRYPT 2006: 5-8 - R. Ricci, Gérard Chollet, M. V. Crispino, Sabah Jassim, Jacques C. Koreman, Andrew C. Morris, M. Olivar-Dimas, Sonia Garcia-Salicetti, Pedro Soria-Rodriguez:
The "SECUREPHONE" - A Mobile Phone with Biometric Authentication and e-Signature Support for Dealing Secure Transactions on the Fly. SECRYPT 2006: 9-16 - Javier Hernando, Mireia Farrús, Pascual Ejarque, Ainara Garde, Jordi Luque:
Person Verification by Fusion of Prosodic, Voice Spectral and Facial Parameters. SECRYPT 2006: 17-23 - Najla Arfaoui, Farah Jemili, Montaceur Zaghdoud, Mohamed Ben Ahmed:
Comparative Study between Bayesian Network and Possibilistic Network in Intrusion Detection. SECRYPT 2006: 24-31 - Nathalie Dagorn:
Intrusion Detection for Web Applications (Short Version). SECRYPT 2006: 32-39 - Zouheir Trabelsi, Khaled Shuaib:
Spoofed ARP Packets Detection in Switched LAN Networks. SECRYPT 2006: 40-47 - Abdoul Karim Ganame, Julien Bourgeois, Renaud Bidou, François Spies:
Evaluation of the Intrusion Detection Capabilities and Performance of a Security Operation Center. SECRYPT 2006: 48-55 - Juan Manuel García, Tomás Navarrete, Carlos Orozco:
Workload Hidden Markov Model for Anomaly Detection. SECRYPT 2006: 56-59
Short Papers
- Marianne Azer, Sherif El-Kassas, Magdy S. El-Soudani:
Using Attack Graphs in Ad Hoc Networks - For Intrusion Prediction Correlation and Detection. SECRYPT 2006: 63-68 - Chunren Lai, Chang N. Zhang:
Quantitative Analysis and Enforcement of the Principle of Least Privilege in Role-Based. SECRYPT 2006: 69-74 - Kun Huang, Dafang Zhang:
On the Self-Similarity of the 1999 DARPA/Lincoln Laboratory Evaluation Data. SECRYPT 2006: 75-79
Posters
- Wenhua Qi:
Access Control and Joint Management for Collaborative Peer Groups. SECRYPT 2006: 83-86 - Ahmed Réda Kaced, Jean-Claude Moissinac:
Protecting Adaptive Multimedia Delivery and Adaptation Using Proxy Based Approach. SECRYPT 2006: 87-90 - Rafael Martínez-Peláez, Francisco Rico-Novella, Luis A. Zarza-López:
Digital Pseudonym Identity for E-Commerce. SECRYPT 2006: 91-94
Network Security and Protocols
Full Papers
- Gregory V. Bard:
A Challenging but Feasible Blockwise-Adaptive Chosen-Plaintext Attack on SSL. SECRYPT 2006: 99-109 - Ines Feki, Xiaoli Zheng, Mohammed Achemlal, Ahmed Serhrouchni:
Internet Routing Security: An Approach to Detect and to React to Incorrect Advertisements. SECRYPT 2006: 110-117 - Amir Herzberg, Igal Yoffe:
Layered Architecture for Secure E-Commerce Applications. SECRYPT 2006: 118-125 - Adam Wierzbicki:
Trust Management without Reputation in P2P Games. SECRYPT 2006: 126-134 - Chuan-Wen Loe, Khoongming Khoo:
Protecting Cipher Block Chaining Against Adaptive Chosen Plaintext Attack. SECRYPT 2006: 135-140 - Kan Yasuda, Kazumaro Aoki, Eiichiro Fujisaki, Atsushi Fujioka:
Forward-Secure Authenticated-Encryption in Multi-Receiver Setting. SECRYPT 2006: 141-148 - Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro:
On the Design of a Low-Rate DoS Attack Against Iterative Servers. SECRYPT 2006: 149-156 - Pascal Urien, Mohamad Badra:
Secure Access Modules for Identity Protection over the EAP-TLS - Smartcard Benefits for User Anonymity in Wireless Infrastructures. SECRYPT 2006: 157-163
Short Papers
- Adrian Leung, Chris J. Mitchell:
A Service Discovery Threat Model for Ad Hoc Networks. SECRYPT 2006: 167-174 - Rehab K. El Nemr, Imane Aly Saroit Ismail, S. H. Ahmed:
Action-Triggered Public-Key System for GSM Using RSA with Phone-Dependent Encryption. SECRYPT 2006: 175-182 - Steffen Fries:
Security Considerations in Current VoIP Protocols. SECRYPT 2006: 183-191 - Ventzislav Nikov:
A DoS Attack Against the Integrity-Less ESP (IPSEC). SECRYPT 2006: 192-199
Posters
- Antonio Ruiz-Martínez, Antonio Fernandez Gómez-Skarmeta, Óscar Cánovas Reverte:
Combination of a Smartcard E-Purse and E-Coin to Make Electronic Payments on the Internet. SECRYPT 2006: 203-206 - Stefan Rass, Mohamed Ali Sfaxi, Solange Ghernaouti-Helie:
Achieving Unconditional Security in Existing Networks Using Quantum Cryptography. SECRYPT 2006: 207-210 - M. Amaç Güvensan, Ali Gökhan Yavuz:
Protocol Independent Lightweight Secure Communication. SECRYPT 2006: 211-217
Cryptographic Techniques and Key Management
Full Papers
- Hongxia Jin, Jeffrey B. Lotspiech, Mario Blaum:
Traitor Tracing for Subscription-Based Systems. SECRYPT 2006: 223-228 - Carlos Serrão, Miguel Sales Dias, Jaime Delgado:
Digital Object Rights Management - Interoperable Client-side DRM Middleware. SECRYPT 2006: 229-236 - Robert P. McEvoy, Colin C. Murphy:
Efficient All-or-Nothing Encryption Using CTR Mode. SECRYPT 2006: 237-245 - Lars R. Knudsen, Søren S. Thomsen:
Proposals for Iterated Hash Functions. SECRYPT 2006: 246-253 - Christophe Nègre:
Parallel Multiplication in F2n Using Condensed Matrix Representation. SECRYPT 2006: 254-259 - Markku-Juhani Olavi Saarinen:
Chosen-IV Statistical Attacks on eStream Ciphers. SECRYPT 2006: 260-266 - Wang Lianhai, Manu Malek:
Digital Contract Signature Scheme Based on Multiple Cryptosystem. SECRYPT 2006: 267-274
Short Papers
- Bartek Gedrojc, Kathy Cartrysse, Jan C. A. van der Lubbe:
Private Bidding for Mobile Agents. SECRYPT 2006: 277-282 - Hiroshi Toyoizumi:
An Infinite Phase-Size BMAP/M/1 Queue and its Application to Secure Group Communication. SECRYPT 2006: 283-288 - Christian Veigner, Chunming Rong:
On Use of Identity-Based Encryption for Secure Emailing. SECRYPT 2006: 289-296 - Chun-Hua Chen, Gwoboa Horng:
More Robust Private Information. SECRYPT 2006: 297-302 - Dumitru Dan Burdescu, Liana Stanescu:
An Algorithm for Authentication of Digital Images. SECRYPT 2006: 303-308
Posters
- Francisco Pimenta, Carlos Serrão:
Using OMA DRM 2.0 Protected Content - Ogg Vorbis Protected Audio under Symbian OS. SECRYPT 2006: 311-315 - Luis Zarza, Josep Pegueroles, Miguel Soriano, Rafael Martínez:
Design of Cryptographic Protocols by Means of Genetic Algorithms Techniques. SECRYPT 2006: 316-319 - Christophe Nègre:
Finite Field Multiplication in Lagrange Representation Using Fast Fourrier Transform. SECRYPT 2006: 320-323
Information Assurance
Full Papers
- Domenico Introna, Francescomaria Marino:
JASTEG2000 - Steganography for JPEG2000 Coded Images. SECRYPT 2006: 329-336
Short Papers
- Igor V. Kotenko, Mikhail Stepashkin:
Network Security Evaluation Based on Simulation of Malfactor's Behavior. SECRYPT 2006: 339-344
Posters
- Chun Qi, Haitao Zhou, Bin Long:
Smooth Blocks-Based Blind Watermarking Algorithm in Compressed DCT Domain. SECRYPT 2006: 347-350
Security in Information Systems
Full Papers
- Timothy E. Levin, Cynthia E. Irvine, Thuy D. Nguyen:
Least Privilege in Separation Kernels. SECRYPT 2006: 355-362 - Richard Whittaker, Gonzalo Argote-Garcia, Peter J. Clarke, Raimund K. Ege:
Collaboration Security for Modern Information Systems. SECRYPT 2006: 363-370 - Zheng Zhang, Walid Rjaibi:
Inter-Node Relationship Labeling: A Fine-Grained XML Access Control Implementation Using Generic Security Labels. SECRYPT 2006: 371-378 - Manuel Sánchez, Gabriel López, Antonio Fernandez Gómez-Skarmeta, Óscar Cánovas Reverte:
Using Microsoft Office Infopath to Generate XACML Policies. SECRYPT 2006: 379-386 - Jarrod Trevathan, Wayne Read:
Secure Online English Auctions. SECRYPT 2006: 387-396 - Masaki Inamura, Toshiaki Tanaka, Toshiyuki Fujisawa, Kazuto Ogawa, Takeshi Kimura:
Flexible License Transfer System Using Mobile Terminal. SECRYPT 2006: 397-404
Short Papers
- Takahito Tsukuba, Kenichiro Noguchi:
Extending XML Signature and Applying it to Web Page Signing. SECRYPT 2006: 407-412 - Kari Anne Haaland, Chunming Rong:
Securing Web Services Using Identity-Based Encryption (IBE). SECRYPT 2006: 413-418 - David Garcia Rosado, Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini:
Defining Viewpoints for Security Architectural Patterns. SECRYPT 2006: 419-424 - Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini:
Security Risk Analysis in Web Services Systems. SECRYPT 2006: 425-430 - Zaobin Gan, Vijay Varadharajan:
Design and Implementation of a Practical Secure Distributed Healthcare Application. SECRYPT 2006: 431-436 - Zaobin Gan, Dengwei Wei, Vijay Varadharajan:
Improving Software Security Through an Integrated Approach. SECRYPT 2006: 437-442 - Seyed Hamed Hassani, Mohammad Reza Aref:
A New (t, n) Multi-Secret Sharing Scheme Based on Linear Algebra. SECRYPT 2006: 443-449 - Jarrod Trevathan, Wayne Read:
Undesirable and Fraudulent Behaviour in Online Auctions. SECRYPT 2006: 450-458 - Sharon Nachtigal, Chris J. Mitchell:
Modelling E-Business Security Using Business Processes. SECRYPT 2006: 459-464
Posters
- Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini:
Secure Information Systems Development - Based on a Security Requirements Engineering Process. SECRYPT 2006: 467-470 - Yi-qun Zhu, Jianhua Li, Quan-hai Zhang:
An Extended Role-Based Access Control for Web Services. SECRYPT 2006: 471-474
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.