default search action
SEC 2004: Toulouse, France
- Yves Deswarte, Frédéric Cuppens, Sushil Jajodia, Lingyu Wang:
Security and Protection in Information Processing Systems, IFIP 18th WorldComputer Congress, TC11 19th International Information Security Conference, 22-27 August 2004, Toulouse, France. IFIP 147, Kluwer / Springer 2004, ISBN 1-4020-8142-1 - Mohamed Hamdi, Noureddine Boudriga:
An Abstract Reduction Model for Computer Security Risk. 1-16 - Vipin Swarup:
Remediation Graphs for Security Patch Management. 17-28 - Lam-for Kwok, Dennis Longley:
Security Modelling for Risk Analysis. 29-46 - Vincenzo Ciaschini, Roberto Gorrieri:
Contrasting Malicious Java Applets by Modifying the Java Virtual Machine. 47-64 - Gerrit Rothmaier, Andre Pohl, Heiko Krumm:
Analyzing Network Management Effects with SPIN and cTLA. 65-82 - Shuo Chen, Karthik Pattabiraman, Zbigniew Kalbarczyk, Ravishankar K. Iyer:
Formal Reasoning of Various Categories of Widely Exploited Security Vulnerabilities by Pointer Taintedness Semantics. 83-100 - Vijay Masurkar, Simone Fischer-Hübner, Morton Swimmer:
Meeting the Global Challenges of Security Incident Response. 101-118 - Petri Saloma, Ronja Addams-Moring, Teemupekka Virtanen:
Security in Globally Distributed Industrial Information Systems. 119-134 - Sebastiaan H. von Solms, M. P. Hertenberger:
A Case For Information Ownership in ERP Systems. 135-150 - Hristo Koshutanski, Fabio Massacci:
Interactive Access Control for Web Services. 151-166 - Yvo Desmedt, Mike Burmester:
Identity-based Key Infrastructures (IKI). 167-176 - Hiroaki Kikuchi, Junji Nakazato:
ModInt: Compact Modular Arithmatic Class Library Available on Cellular Phone and its Application to Secure Electronic Voting System. 177-192 - Semir Daskapan:
Dependable Security by Twisted Secret Sharing. 193-208 - Eric Totel, Bernard Vivinis, Ludovic Mé:
A Language Driven IDS for Event and Alert Correlation. 209-224 - Danny Nebenzahl, Avishai Wool:
Install-time Vaccination of Windows Executables to Defend Against Stack Smashing Attacks. 225-240 - Yacine Bouzida, Sylvain Gombault:
Eigenconnections to Intrusion Detection. 241-258 - Stefan Axelsson:
Visualising Intrusions: Watching the Webserver. 259-274 - Paul Dowland, Steven Furnell:
A Long-term Trial of Keystroke Profiling using Digraph, Trigraph and Keyword Latencies. 275-290 - Martín Abadi:
Trusted Computing, Trusted Third Parties, and Verified Communications. 291-308 - Andrew Fritz, Jehan-François Pâris:
Maille Authentication - A Novel Protocol for Distributed Authentication. 309-322 - Yong Song, Victor C. M. Leung, Konstantin Beznosov:
Supporting End-to-end Security across Proxies with Multiple-Channel SSL. 323-338 - Pei-Ling Yu, Pan-Lung Tsai, Chin-Laung Lei:
A Content-Protection Scheme for Multi-Layered Reselling Structure. 339-350 - Konstantinos Rantos, Constantinos Markantonakis:
An Asymmetric Cryptography Secure Channel Protocol for Smart Cards. 351-366 - Antti Nuopponen, Sami Vaarala, Teemupekka Virtanen:
IPsec Clustering. 367-380 - Olivier Heen, Jean-Pierre Andreaux, Nicolas Prigent:
Improving Secure Device Insertion in Home Ad-hoc Networks Keyword Latencies. 381-394 - Flavio D. Garcia, Jaap-Henk Hoepman, Jeroen van Nieuwenhuizen:
Spam Filter Analysis. 395-410 - Indrajit Ray, Eunjong Kim:
Collective Signature for Efficient Authentication of XML Documents. 411-424 - Prakash Reddy, Robert N. Mayo, Eamonn O'Brien-Strain, Jim Rowson, Yuhong Xiong:
Updating Encrypted XML Documents on Untrusted Machines. 425-440 - Lubica Liskova, Martin Stanek:
Efficient Simultaneous Contract Signing. 441-456 - Jacques Demerjian, Ahmed Serhrouchni:
DHCP Authentication Using Certificates. 457-472 - Aleksey Kurchuk, Angelos D. Keromytis:
Recursive Sandboxes: Extending Systrace To Empower Applications. 473-488 - Vipul Goyal:
Fast Digital Certificate Revocation. 489-500 - Robert Pinto, Lucila Ishitani, Virgílio A. F. Almeida, Wagner Meira Jr., Fabiano A. Fonseca, Fernando D. O. Castro:
MASKS: Managing Anonymity while Sharing Knowledge to Servers. 501-516 - Idir Fodil, Vincent Jardin:
Security and Differentiated Hotspot Services Through Policy-based Management Architecture. 517-532 - Ayan Roy Chowdhury, John S. Baras:
Key Management for Secure Multicast in Hybrid Satellite Networks. 533-548
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.