default search action
IAS 2008: Napoli, Italy
- Massimiliano Rak, Ajith Abraham, Valentina Casola:
Proccedings of the Fourth International Conference on Information Assurance and Security, IAS 2008, September 8-10, 2008, Napoli, Italy. IEEE Computer Society 2008, ISBN 978-0-7695-3324-7
Authentication and Access Control
- Lionel Habib, Mathieu Jaume, Charles Morisset:
A Formal Comparison of the Bell & LaPadula and RBAC Models. 3-8 - Xiaoming Wang, Huoyan Chen:
Threshold Proxy Signature Scheme with Strong Real-Time Efficiency. 9-14 - Hannan Xiao, Bruce Christianson, Ying Zhang:
A Purchase Protocol with Live Cardholder Authentication for Online Credit Card Payment. 15-20 - Ali Nasrat Haidar, Ali E. Abdallah:
Comparison and Evaluation of Identity Management in Three Architectures for Virtual Organizations. 21-26 - Donato Impedovo, Mario Refice:
Speaker Identification by Multi-Frame Generative Models. 27-32 - Ali E. Abdallah, Hassan Takabi:
Integrating Delegation with the Formal Core RBAC Model. 33-36 - Samrat Mondal, Shamik Sural:
Security Analysis of Temporal-RBAC Using Timed Automata. 37-40
Cryptographic Schemes and Applications
- Shu Yun Lim, Meng-Hui Lim, Sanggon Lee, Hoonjae Lee:
Secure Hybrid Group Key Management for Hierarchical Self-Organizing Sensor Network. 43-49 - Przemyslaw Rodwald, Janusz Stoklosa:
PHAL-256 - Parameterized Hash Algorithm. 50-55 - Sajad Shirali-Shahreza, Mohammad Shirali-Shahreza:
Steganography in Textiles. 56-61 - Mohammad Shirali-Shahreza, Sajad Shirali-Shahreza:
Persian/Arabic Unicode Text Steganography. 62-66 - Sigurd Eskeland, Vladimir A. Oleshchuk:
Efficient Hierarchical Group-Oriented Key Establishment and Decryption. 67-72 - N. R. Sunitha, B. B. Amberker:
Forward-Secure Proxy Signature Scheme for Multiple Proxy Signers Using Bellare-Miner Scheme with Proxy Revocation. 73-78 - Hao Luo, Fa-Xin Yu, Jeng-Shyang Pan:
Data Hiding in Non-Expansion Visual Cryptography Based on Edge Enhancement Multitoning. 79-82 - Mohammad Abdullah-Al-Wadud, Oksam Chae:
Skin Segmentation Using Color Distance Map and Water-Flow Property. 83-88 - Konstantinos Chalkias, Foteini Baldimtsi, Dimitrios Hristu-Varsakelis, George Stephanides:
An Implementation Infrastructure for Server-Passive Timed-Release Cryptography. 89-94 - Zhengjun Cao, Lihua Liu:
A Group Key Agreement Scheme Revisited. 95-98 - Mohamed Abid, Hossam Afifi:
Secure E-Passport Protocol Using Elliptic Curve Diffie-Hellman Key Agreement Protocol. 99-102 - Liaqat Ali Khan, Muhammad Shamim Baig:
A Server Based ASR Approach to Automated Cryptanalysis of Two Time Pads in Case of Speech. 103-107 - Mohamed Abo El-Fotouh, Klaus Diepold:
Dynamic Substitution Model. 108-111
Data Security and Privacy
- Bonnie Zhu, Shankar Sastry:
Data Fusion Assurance for the Kalman Filter in Uncertain Networks. 115-119 - A. V. Sarad, Sankar Kuppan, M. Vipin:
A Time and Storage Efficient Solution to Remote File Integrity Check. 120-125 - Mohamed Abo El-Fotouh, Klaus Diepold:
A New Narrow Block Mode of Operations for Disk Encryption. 126-131 - Siddharta S. Gadang, Brajendra Panda, Joseph E. Hoag:
Provenance Tracking with Bit Vectors. 132-137
Intrusion Detection, Intrusion Prevention, Threat Modeling, and Analysis
- Mothanna Alkubeily, Hatem Bettahar, Abdelmadjid Bouabdallah:
Impact of Cheating and Non-Cooperation on the Stability and the Performances of Application-Level Multicast Sessions. 141-146 - Navneet Kumar Pandey, S. K. Gupta, Shaveta Leekha, Jingmin Zhou:
ACML: Capability Based Attack Modeling Language. 147-154 - Giampaolo Bella, Francesco Librizzi, Salvatore Riccobene:
Realistic Threats to Self-Enforcing Privacy. 155-160 - Ulf Larson, Stefan Lindskog, Dennis K. Nilsson, Erland Jonsson:
Operator-Centric and Adaptive Intrusion Detection. 161-166 - Pantelis Kammas, Thodoros Komninos, Yannis C. Stamatiou:
A Queuing Theory Based Model for Studying Intrusion Evolution and Elimination in Computer Networks. 167-171 - Václav Snásel, Jan Platos, Pavel Krömer, Ajith Abraham:
Matrix Factorization Approach for Feature Deduction and Design of Intrusion Detection Systems. 172-179 - Anazida Zainal, Mohd Aizaini Maarof, Siti Mariyam Hj. Shamsuddin, Ajith Abraham:
Ensemble of One-Class Classifiers for Network Intrusion Detection System. 180-185 - Susanta Nanda, Lap-Chung Lam, Tzi-cker Chiueh:
Web Application Attack Prevention for Tiered Internet Services. 186-191 - Mohd. Foad Rohani, Mohd Aizaini Maarof, Ali Selamat, Houssain Kettani:
LoSS Detection Approach Based on ESOSS and ASOSS Models. 192-197 - Marios S. Andreou, Aad P. A. van Moorsel:
COTraSE: Connection Oriented Traceback in Switched Ethernet. 198-204 - Slobodan Petrovic, Sverre Bakke:
Improving the Efficiency of Misuse Detection by Means of the q-gram Distance. 205-208 - Feng Chen, Lingyu Wang, Jinshu Su:
An Efficient Approach to Minimum-Cost Network Hardening Using Attack Graphs. 209-212
Security Tools Design
- Doaa Hassan, Sherif El-Kassas, Ibrahim Ziedan:
Developing a Security Typed Java Servlet. 215-220 - Franco Frattolillo, Federica Landolfi:
Designing a DRM System. 221-226 - Doaa Hassan, Sherif El-Kassas, Ibrahim Ziedan:
Challenges for Security Typed Web Scripting Languages Design. 227-230 - Ji-Hee Jeoung, Eun-Ji Shin, Seng-Phil Hong, Sung-Hoon Kim, In-Ho Kim, Min-Woo Lee:
Systematic Website Verification for Privacy Protection. 231-234
Network Security and Sensor, Mobile and "ad hoc" Network Security
- Humberto J. Abdelnur, Tigran Avanesov, Michaël Rusinowitch, Radu State:
Abusing SIP Authentication. 237-242 - Shukor Abd Razak, Normalia Samian, Mohd Aizaini Maarof:
A Friend Mechanism for Mobile Ad Hoc Networks. 243-248 - Suleyman Kondakci:
A Composite Network Security Assessment. 249-254 - Giampaolo Bella, Gianpiero Costantino, Salvatore Riccobene:
Managing Reputation over MANETs. 255-260 - Riaz Ahmed Shaikh, Hassan Jameel, Brian J. d'Auriol, Sungyoung Lee, Young Jae Song, Heejo Lee:
Network Level Privacy for Wireless Sensor Networks. 261-266 - Adrian Leung, Chris J. Mitchell:
A Device Management Framework for Secure Ubiquitous Service Delivery. 267-274 - Tadashi Araragi, Olivier Pereira:
Automatic Verification of Simulatability in Security Protocols. 275-280 - Osama A. Elshakankiry, Andy Carpenter, Ning Zhang:
A New Secure Binding Management Protocol for Mobile IPv6 Networks. 281-286 - Jetzabel M. Serna, Jesus Luna, Manel Medina:
Geolocation-Based Trust for Vanet's Privacy. 287-290 - Ryma Abassi, Sihem Guemara El Fatmi:
An Automated Validation Method for Security Policies: The Firewall Case. 291-294 - Tobias Hoppe, Stefan Kiltz, Jana Dittmann:
Adaptive Dynamic Reaction to Automotive IT Security Incidents Using Multimedia Car Environment. 295-298 - Francesco Tamberi, Dario Maggiari, Daniele Sgandurra, Fabrizio Baiardi:
Semantics-Driven Introspection in a Virtual Environment. 299-302
Security in Critical Infrastructure
- Michele Albano, Stefano Chessa, Roberto Di Pietro:
Information Assurance in Critical Infrastructures via Wireless Sensor Networks. 305-310 - Maurizio Dusi, Francesco Gringoli, Luca Salgarelli:
A Model for the Study of Privacy Issues in Secure Shell Connections. 311-317 - Claudio Mazzariello:
IRC Traffic Analysis for Botnet Detection. 318-323
Quantum Cryptography
- Di Jin, Pramode K. Verma, Stamatios V. Kartalopoulos:
Key Distribution Using Dual Quantum Channels. 327-332 - Dazu Huang, Zhigang Chen:
Quantum Key Distribution Based on Multi-qubit Hadamard Matrices. 333-337 - Stamatios V. Kartalopoulos:
Chaotic Quantum Cryptography. 338-342
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.