default search action
SEC 2005: Makuhari-Messe, Chiba, Japan
- Ryôichi Sasaki, Sihan Qing, Eiji Okamoto, Hiroshi Yoshiura:
Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30 - June 1, 2005, Chiba, Japan. IFIP 181, Springer 2005, ISBN 0-387-25658-X
Privacy and Anonymity
- Vincent Naessens, Bart De Decker, Liesje Demuynck:
Accountable Anonymous E-Mail. SEC 2005: 3-18 - Craig Pearce, Peter Bertók, Ron G. van Schyndel:
Protecting Consumer Data in Composite Web Services. SEC 2005: 19-34
Security Management
- Albin Zuccato:
A Decision Matrix Approach. SEC 2005: 35-50 - Lech J. Janczewski, Victor Portougal:
Assignment of Security Clearances in an Organization. SEC 2005: 51-64 - Thomas Schlienger, Stephanie Teufel:
Tool Supported Management of Information Security Culture. SEC 2005: 65-78
Security Architecture
- Sebastiaan H. von Solms, M. P. Hertenberger:
ERPSEC - A Reference Framework to Enhance Security in ERP Systems. SEC 2005: 79-94 - Yanjiang Yang, Feng Bao, Robert H. Deng:
A New Architecture for User Authentication and Key Exchange Using Password for Federated Enterprises. SEC 2005: 95-112 - I-Ming Tsai, Chia-Mu Yu, Wei-Ting Tu, Sy-Yen Kuo:
A Secure Quantum Communication Protocol Using Insecure Public Channels. SEC 2005: 113-126
Trusted Computing Systems
- Joon S. Park, Pratheep Chandramohan, Ganesh Devarajan, Joseph Giordano:
Trusted Component Sharing by Runtime Test and Immunization for Survivable Distributed Systems. SEC 2005: 127-142 - Jiangchun Ren, Kui Dai, Zhiying Wang, Xue-mi Zhao, Yuan-man Tong:
Design and Implementation a TPM Chip SUP320 by SOC. SEC 2005: 143-154 - Keisuke Ohmori, Ayako Suzuki, Mariko Kawabata, Ryu Matsushima, Manabu Ohmuro, Toshifumi Kai, Shigeru Nishiyama:
Mathematical Models of IP Traceback Methods and Their Verification. SEC 2005: 155-170
Secure Commercial Systems
- Joseph K. Liu, Sandy H. Wong, Duncan S. Wong:
Transferable E-Cash Revisit. SEC 2005: 171-188 - Qiong Liu, Reihaneh Safavi-Naini, Nicholas Paul Sheppard:
A License Transfer System for Supporting Content Portability in Digital Rights Management. SEC 2005: 189-204 - Yongdong Wu, Feng Bao, Robert H. Deng:
Secure Person-To-Person Communications Based on Biometrics Signals. SEC 2005: 205-222
Mobility and Ubiquitous Security
- Laurent Bussard, Walid Bagga:
Distance-Bounding Proof of Knowledge to Avoid Real-Time Attacks. SEC 2005: 223-238 - Kyung-jun Kim, HyunSook Kim, Sang-Don Lee, Ki Jun Han:
An Adaptive Multicast Polling Scheme for IEEE 802.11 Wireless LAN. SEC 2005: 239-250 - Thomas Peyrin, Serge Vaudenay:
The Pairing Problem with User Interaction. SEC 2005: 251-266
Internet and Web Security
- Asad M. Ali, Karen Lu, Michael Montgomery:
Network Smart Card: A New Paradigm of Secure Online Transactions. SEC 2005: 267-280 - Rodrigo Roman, Jianying Zhou, Javier López:
Protection Against Spam Using Pre-Challenges. SEC 2005: 281-294 - Anh Nguyen-Tuong, Salvatore Guarnieri, Doug Greene, Jeff Shirley, David Evans:
Automatically Hardening Web Applications Using Precise Tainting. SEC 2005: 295-308
Internet Security to DoS Attack
- Vrizlynn L. L. Thing, Henry C. J. Lee, Morris Sloman:
Traffic Redirection Attack Protection System (TRAPS) - A Full-Fledged Adaptive DoS/DDoS Attack Mitigation Scheme. SEC 2005: 309-326 - John Haggerty, Qi Shi, Madjid Merabti:
Statistical Signatures for Early Detection of Flooding Denial-Of-Service Attacks. SEC 2005: 327-342
Intrusion Detection
- Wayne Huang, J. L. Cong, Chien-Long Wu, Fan Zhao, Shyhtsun Felix Wu:
Design, Implementation, and Evaluation of "FRiTrace". SEC 2005: 343-358 - Konstantinos Xinidis, Kostas G. Anagnostakis, Evangelos P. Markatos:
Design and Implementation of a High-Performance Network Intrusion Prevention System. SEC 2005: 359-374 - Periklis Akritidis, Evangelos P. Markatos, Michalis Polychronakis, Kostas G. Anagnostakis:
STRIDE: Polymorphic Sled Detection through Instruction Sequence Analysis. SEC 2005: 375-392 - Spyros Antonatos, Michalis Polychronakis, Periklis Akritidis, Kostas G. Anagnostakis, Evangelos P. Markatos:
Piranha: Fast and Memory-Efficient Pattern Matching for Intrusion Detection. SEC 2005: 393-408
Digital Signature Schemes
- Guilin Wang:
Designated-Verifier Proxy Signature Schemes. SEC 2005: 409-424 - Willy Susilo, Yi Mu:
Tripartite Concurrent Signatures. SEC 2005: 425-442 - Sherman S. M. Chow, Tsz Hon Yuen, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Signcryption in Hierarchical Identity Based Cryptosystem. SEC 2005: 443-457
Key Management
- Yongdong Wu, Tieyan Li, Robert H. Deng:
Protecting Group Dynamic Information in Large Scale Multicast Groups. SEC 2005: 459-476 - Shrikant Sundaram, Peter Bertók, Benjamin A. Burton:
Secure Group Communication with Distributed Generation of Private Keys in Ad-hoc Networks. SEC 2005: 477-492
Security for Multimedia
- Jana Dittmann, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith:
Ensuring Media Integrity on Third-Party Infrastructures. SEC 2005: 493-508 - Hao-Tian Wu, Yiu-ming Cheung:
A New Fragile Mesh Watermarking Algorithm for Authentication. SEC 2005: 509-524 - Yuji Suga:
New Paradigm in Graph-Based Visual Secret Sharing Scheme by Accepting Reversal in Black-White Images. SEC 2005: 525-536
JavaCards
- John A. MacDonald, William G. Sirett, Chris J. Mitchell:
Overcoming Channel Bandwidth Constraints in Secure SIM Applications. SEC 2005: 539-550 - K. Papapanagiotou, Constantinos Markantonakis, Qing Zhang, William G. Sirett, Keith Mayes:
On the Performance of Certificate Revocation Protocols Based on a Java Card Certificate Client Implementation. SEC 2005: 551-564 - Arjen van Weelden, Martijn Oostdijk, Lars Frantzen, Pieter W. M. Koopman, Jan Tretmans:
On-the-Fly Formal Testing of a Smart Card Applet. SEC 2005: 565-576 - Joel VanLaven, Mark Brehob, Kevin J. Compton:
Side Channel Analysis, Fault Injection and Applications - A Computationally Feasible SPA Attack on AES via Optimized Search. SEC 2005: 577-588 - Sylvain Guilley, Philippe Hoogvorst:
The Proof by 2M-1: a Low-Cost Method to Check Arithmetic Computations. SEC 2005: 589-600 - Jieyin Cheng, Cheun Ngen Chong, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Stefan Nikolaus:
StreamTo: Streaming Content using a Tamper-Resistant Token. SEC 2005: 601-612
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.