default search action
Security and Management 2009: Las Vegas, Nevada, USA
- Hamid R. Arabnia, Kevin Daimi:
Proceedings of the 2009 International Conference on Security & Management, SAM 2009, July 13-16, 2009, Las Vegas Nevada, USA, 2 Volumes. CSREA Press 2009, ISBN 1-60132-126-0
Information and Computer Security
- Alex Hai Wang, Su Yan:
A Stochastic Model of the Damage Propagation in Database Systems. Security and Management 2009: 3-9 - Hassan Rasheed, Randy Y. C. Chow:
Adaptive Risk-Aware Application-Level Access Control. Security and Management 2009: 10-16 - Max M. North, Greg Quinet, Robert Thacker, DeAnthony Perryman, John Crunk, Sarah M. North:
Investigation of Computer Security and Ethics Awareness in University Environment. Security and Management 2009: 17-21 - Karim Mohammed Rezaul, Mohammad Rahman, Aliar Hossain:
Information Security and Threats: A study on E-Commerce. Security and Management 2009: 22-27 - Michael Pollard, Gejuan Clements, Max M. North, Sarah M. North, Greg Quinet:
A Translation of NIST Security Controls Into DBMS Security Procedures (FISMA Compliance). Security and Management 2009: 28-30 - Breno Silva Pinto, Varin Khera, Lance Chun Che Fung:
Detecting Anomalies in Network Traffic with Entropy based MA-RMSE Algorithms. Security and Management 2009: 31-36 - Ahmad Ghafarian, Jason Garruto:
An Analysis of Data Protection Strategies. Security and Management 2009: 37-41 - Gevorg Margarov, Vahan Markarov, Ashot Khachaturov:
Steganographic System with Dynamically Reconfigurable Structure. Security and Management 2009: 43-45 - Ilze Murane:
A New Element in Information Security Process Security Aware Smart Household Employee. Security and Management 2009: 46-51 - Pavel Minarík, Zdenek Vrbka, Marek Winkler:
Advanced Network Traffic Visualization in the Service of Network Security. Security and Management 2009: 52-55 - Michel Kamel, Romain Laborde, François Barrère, Abdelmalek Benzekri:
An organizational pattern for contributing to the deployment of secure Virtual Enterprises. Security and Management 2009: 56-61 - Eric Ke Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu:
A New Practical Scheme for Protecting Web Content. Security and Management 2009: 62-66 - Artur Rot:
Computer Support of Risk Analysis in Information Technology Environment. Security and Management 2009: 67-71 - Levent Ertaul, Omicel Catambay:
Today & Tomorrow: IEEE 802.11 WLAN Security. Security and Management 2009: 73-77
Cryptography + Key Management Strategies
- Artan Luma, Bujar Raufi:
New Data Encryption Algorithm and its Implementation for Online User Authentication. Security and Management 2009: 81-85 - Ronggong Song, Khalil El-Khatib, Peter C. Mason:
Analysis of Chinese Remainder Theorem Based Group Key Management Protocols. Security and Management 2009: 86-92 - Phillip D. Colbert, Ben A. Juliano:
A Performance Comparison of Microsoft SQL Server 2008 Transparent Data Encryption and NetLib Encryptionizer. Security and Management 2009: 93-98 - Seungmin Lee, Jaehoon Nah, Dongil Seo:
Security Requirements for Scalable IPTV Services. Security and Management 2009: 99-102 - Kevin Daimi:
A Framework for Online Examination Security Based on Cryptology and Biometrics. Security and Management 2009: 103-112 - Adbelfatah Yahya, Ayman M. Abdalla:
An AES-Based Encryption Algorithm with Shuffling. Security and Management 2009: 113-116 - Le Thi Hoai An, Pham Dinh Tao, Sarra Bouallagui:
Cryptanalysis of an Identification Scheme Based on the Perceptron Problem using a Hybridization of Deterministic Optimization and Genetic Algorithm. Security and Management 2009: 117-123 - Sharma Abhishek Srinivasan, Ravi Mukkamala, K. Venkataramaniah:
Design and Anlysis of Cryptographically Strong S-Boxes: A Novel Approach. Security and Management 2009: 124-129 - Alessandro Brawerman, Jose W. Bohner Jr., Victor D. Ribeiro:
A Secure Intranet VoIP Framework. Security and Management 2009: 130-135 - Ping Luo, Haijian Zhou, Daoshun Wang, Yiqi Dai:
Cryptanalysis of RSA with Constrained Low Public Exponent. Security and Management 2009: 136-142 - Siddharth Sharma, Akshay Atrey, Saurabh Jain:
A Novel And Efficient Algorithm To Enhance The Complexity Of Elliptic Curve Cryptography. Security and Management 2009: 143-148 - Mani Arora, Poonamjeet Kaur, Nishima Gakhar, Gauravjeet Singh:
Metrics for Analysis of Cryptograhic Algorithms. Security and Management 2009: 149-156 - Gevorg Margarov, Siranush Chopuryan, Yeghisabet Alaverdyan:
Cryptanalysis of Finite Automata Public Key Cryptosystems. Security and Management 2009: 157-161 - Leidy Marcela Giraldo Castano, Edward Yesid Villegas Pulgarin:
Optical Encryption with Jigsaw Transform using Matlab. Security and Management 2009: 162-165 - Robert Okonigene, Isimhemen Oborkhale:
Design of a Cryptographic Software for Wireless Network Security. Security and Management 2009: 166-169
Authentication + Biometrics
- Joon Park, Yasir Shaikh, Rohit Mahajan:
Prevention of ATM Fraud Using F-PIN. Security and Management 2009: 173-178 - Eric Ke Wang, Yi Jun He, Lucas Chi Kwong Hui, Siu-Ming Yiu:
A Practical SMS-based Mutual Authentication Protocol for Secure Online Banking. Security and Management 2009: 179-183 - Pino Caballero-Gil, Candelaria Hernández-Goya, Amparo Fúster-Sabater:
Differentiated Services to Provide Efficient Node Authentication in VANETs. Security and Management 2009: 184-187 - Takumi Yamamoto, Yuko Kojima, Masakatsu Nishigaki:
A Shoulder-Surfing-Resistant Image-Based Authentication System with Temporal Indirect Image Selection. Security and Management 2009: 188-194 - Hiroshi Dozono, Masanori Nakakuni, Takayuki Inoue, Hidetaka Nozaki:
Study of Biometric Authentication Method Using Behavior Characteristics on Game Consoles. Security and Management 2009: 195-200 - Yong-Zhong He, Zhen Han, Huirong Fu:
Usage Control in Conditional Access System with malicious Set-top Box. Security and Management 2009: 201-205 - Naveen Kumar:
Secure Authentication Using Visual Cryptography. Security and Management 2009: 206-210 - Gevorg Margarov, Maha Tolba:
Fingerprint Biometric Solution for Securely Secret Sharing. Security and Management 2009: 211-213 - Stella C. Chiemeke, Olumide B. Longe:
Conditional Access Systems for Internet Content Protection. Security and Management 2009: 214-219 - Woei-Jiunn Tsaur, You-Mine Lin:
An Agent-Based Single Sign-On Scheme for Web Services Environments. Security and Management 2009: 220-226 - Guiyue Jin, Eun Young Jeong, Ho-Youl Jung, Ki Dong Lee:
RFID Authentication Protocol Conforming to EPC Class-1 Generation-2 Standard. Security and Management 2009: 227-231 - Sunil V. K. Gaddam, Manohar Lal:
An Effective Method for Revocable Biometric Key Generation. Security and Management 2009: 232-237 - Sunghyuck Hong:
A Secure Certificate for Secure Group Communication. Security and Management 2009: 238-240 - Veronica Akwukwuma, Annie Egwali:
Authentication Practices At The User Interface: Vulnerability Of Users And Organizations In Nigeria. Security and Management 2009: 241-247
Privacy Issues + Intrusion Detection and Firewalls + Attack Prevention
- Ossama Toutonji, Seong-Moo Yoo:
Realistic Approach against Worm Attack on Computer Networks by Emulating Human Immune System. Security and Management 2009: 251-257 - Ryu Watanabe, Toshiaki Tanaka:
Denial of Service Attack Resilience on Area Expanded WLAN Services. Security and Management 2009: 258-264 - Richard Lundeen, Charles Burns:
Simplified Single Packet Authorization. Security and Management 2009: 265-270 - Farah Barika, Karim Hadjar, Nabil El-Kadhi:
Artificial Neural Network for IDS Solution. Security and Management 2009: 271-277 - Andrzej Bialas:
Validation of the Specification Means Ontology on the Simple Firewall Case. Security and Management 2009: 278-284 - Charlie Obimbo:
An Intrusion Detection System for Mobile Ad-Hoc Networks. Security and Management 2009: 285-290 - Eun-Ae Cho, Chang-Joo Moon, Dae-Ha Park, Jeong-Oog Lee, Doo-Kwon Baik:
A Database Firewall Server Using Data Masking. Security and Management 2009: 291-296 - Samuel Shepard, Larry A. Dunning, Ray Kresman:
Data Mining and Anonymous Opt-out. Security and Management 2009: 297-303
Access Control and Signatures
- Starsky H. Y. Wong, Zoe Lin Jiang, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Two Efficient Proxy Signature Schemes for Delegation Chains with Nonrepudiation and Untraceability. Security and Management 2009: 307-313 - Jérôme Dossogne, Olivier Markowitch:
A Tripartite Strong Designated Verifier Scheme Based On Threshold RSA Signatures. Security and Management 2009: 314-317 - Mohammad M. Rasheed, Norita Md Norwawi, Mohammed M. Kadhum, Osman Ghazali:
Intelligent Anti-Internet Worm Automatically Detect and Update Signatures Server. Security and Management 2009: 318-322 - Qingshui Xue, Fengying Li, Yuan Zhou, Jiping Zhang, Zhenfu Cao, Haifeng Qian:
Bilinear-pairings Based Designated-verifier Threshold Proxy Signature Scheme. Security and Management 2009: 323-327
Novel Systems + Implementation Issues
- Vincent Zimmer:
Cloud Net-Booting Beyond BIOS Using the Unified Extensible Firmware Interface. Security and Management 2009: 331-339 - Tobias Wegner:
A Secure Multi-Provider OSGi Platform Enabling Process-Isolation by Using Distribution. Security and Management 2009: 340-345 - Greg Vert, Evangelos Triantaphyllou:
Security Level Determination Using Branes for Contextual Based Global Processing: An Architecture. Security and Management 2009: 346-350 - Vincent Zimmer:
Access Control Beyond BIOS Using the Unified Extensible Firmware Interface. Security and Management 2009: 351-359
Protocols and Related Issues
- Levent Ertaul, Dilraba Ibrahim:
Evaluation of Secure Routing Protocols in Mobile Ad Hoc Networks (MANETs). Security and Management 2009: 363-369 - Xiaowen Zhang, Qinghai Gao, Mohamed K. Saad:
Analysis of RFID Authentication Protocols Based on Static and Dynamic Shared Secret. Security and Management 2009: 370-376
Security Issues + Applications + Algorithms + Management Strategies + Policies
- Sato Hiroyuki:
A Service Framework based on Grades of IdPs and SPs. Security and Management 2009: 379-385 - Michael R. Grimaila, Larry Fortson, Janet Sutton:
Design Considerations for a Cyber Incident Mission Impact Assessment (CIMIA) Process. Security and Management 2009: 386-391 - DongHo Kang, BoHeung Jung, KyoungSon Jhang, KiYoung Kim:
USB Data leakage prevention Using hardware based data inspection technique. Security and Management 2009: 392-396 - Mikhail I. Gofman, Ruiqi Luo, Jian He, Yingbin Zhang, Ping Yang:
Incremental Information Flow Analysis of Role Based Access Control. Security and Management 2009: 397-403 - Rattikorn Hewett, Phongphun Kijsanayothin:
Location Contexts in Role-based Security Policy Enforcement. Security and Management 2009: 404-410 - Francis Manning:
Securing the Environment: A Methodology for Weighting and Analyzing Attack Graphs. Security and Management 2009: 411-416 - Byoung-Koo Kim, Seungyong Yoon, Ikkyun Kim, Jintae Oh:
Multi-region based Clustering Analysis Method for Unknown Malicious Code Detection. Security and Management 2009: 417-422 - Kanaka Rajanala, Huiping Guo, Chengyu Sun:
Tamper Detection and Localization for Categorical Data Using Fragile Watermarks for Multi Owner Databases. Security and Management 2009: 423-428 - Siranush Chopuryan:
The Stability of Trapdoor One Way Function Based on Finite Automata. Security and Management 2009: 429-433 - Nabil El-Kadhi, Sofien Beji:
Ontology Driven Security for Mobile Applications. Security and Management 2009: 434-440 - Guillermo A. Francia III, Suprasith Jarupathirun:
Security Metrics-Review and Research Directions. Security and Management 2009: 441-446 - Priscilla Hope, Jason Bowling, Kathy Liszka:
Artificial Neural Networks as a Tool for Identifying Image Spam. Security and Management 2009: 447-451 - Seungyong Yoon, Byoung-Koo Kim, Hwashin Moon, Ikkyun Kim, Jintae Oh:
Abnormal Traffcic Detection using Flow-based Traffic Measuring Scheme. Security and Management 2009: 452-456 - Seung-Hyun Kim, Daeseon Choi, Seunghun Jin:
Digital ID Wallet: Provide Selective Disclosure and Users Control of Identity Information. Security and Management 2009: 457-462 - Hicham Tout, William Hafner, Wei Li, Easwar A. Nyshadham:
Phishpin: An Integrated Anti-Phishing Framework. Security and Management 2009: 463-468 - Lucas Vespa, Ning Weng:
Split-DFA (SDFA) for Scalable Pattern Matching in Network Security. Security and Management 2009: 469-474 - Robert F. Erbacher:
Visualization for Rapid Assessment and Projection in Cyber Situational Awareness. Security and Management 2009: 475-480 - Ye Liu, Zhihui Li, Rui Guo:
A Multi-secret Sharing Scheme in an Access Structure. Security and Management 2009: 481-484 - Sungdo Park, Bokman Jang, Hyokyung Chang, Bong-hoi Kim, Eui-In Choi:
Rule-Based Auditing System for Security Assurance in Ubiquitous Computing. Security and Management 2009: 485-489 - Anton Romanov, Eiji Okamoto:
A Framework for Building and Managing Secured ERP Landscape. Security and Management 2009: 490-495 - Madhavi Nidamarthy, Huiping Guo, Chengyu Sun:
Multiple Watermarking for Relational Data. Security and Management 2009: 496-500 - Michael Workman:
A Matter of Trust: Studies of Organizational Systems of Justice Perceptions on Attitudes about Corporate Surveillance. Security and Management 2009: 501-508 - Erlo Meister, Elmarie Biermann:
Increasing Security Awareness: Designing a Socially Engineered E-mail Worm. Security and Management 2009: 509-514 - Anand Singh, David J. Lilja:
Using a Statistical Approach for Optimal Security Parameter Determination. Security and Management 2009: 515-520 - Rune Steinsmo Ødegård, Danilo Gligoroski:
On the Randomness and Regularity of Reduced Edon-R Compression Function. Security and Management 2009: 521-525
Workshop on Ubiquitous Computing Security - UC-Sec 09
- Hossein Rezaei Ghaleh, Mohammad-Ali Doostari:
Improving the Client Security Using the Smart Card and Trusted Server. Security and Management 2009: 529-534 - Seung-Hee Oh, Deok-Gyu Lee, Jong Wook Han, Jong Hyuk Park:
The Detection and Response Mechanism against Abnormal Traffic Attack in ATN Network. Security and Management 2009: 535-540 - Wan S. Yi, Woong Go, Sookyun Kim, Dongho Won, Jin Kwak:
Fingerprint Based Secure Authentication Protocol using OTP in e-Banking. Security and Management 2009: 541-546 - Wan S. Yi, Dongbum Lee, Sang-Soo Yeo, Dongho Won, Jin Kwak:
Security and Efficiency Analyses of Security Mechanisms in e-Passport Systems. Security and Management 2009: 547-553
Special Track on Applied Cryptology and Network Security
- Ali Akbar Sobhi Afshar, Alireza Sharifi, Taraneh Eghlidos:
On the Security and Efficiency of Secure Channel Coding Schemes Based on Punctured Codes. Security and Management 2009: 557-562 - Fernando Hernández Álvarez, Luis Hernández Encinas, Carmen Sanchez-Avila:
Biometric Fuzzy Extractor Scheme for Iris Templates. Security and Management 2009: 563-569 - Yasuo Hatano, Kunihiko Miyazaki, Toshinobu Kaneko:
A Study on Multi-Resipient Encryptions for Selective Disclosure. Security and Management 2009: 570-575 - Raúl Durán Díaz, Fernando Hernández Álvarez, Luis Hernández Encinas:
Graphic Multisecret Sharing Schemes with One-Dimensional Cellular Automata. Security and Management 2009: 576-582 - Amadou Moctar Kane:
On the use of Continued Fractions for Stream Ciphers. Security and Management 2009: 583-589
Late Papers
- Mahadevan Gomathisankaran, Ruby B. Lee:
Tantra: A Fast PRNG Algorithm and its Implementation. Security and Management 2009: 593-598 - Muhammad Ali, Deepthi Jangum:
The Development of a Security Engineering Course at Tuskegee University. Security and Management 2009: 599-602 - Vladimir S. Zaborovsky, Anton Titov:
Specialized Solutions for Improvement of Firewall Performance and Conformity to Security Policy. Security and Management 2009: 603-608 - Peter Hannay:
Fun & Games: An Introduction to Console Forensics. Security and Management 2009: 609-612 - Craig Valli, Andrew Woodward:
SCADA Security - Slowly Circling a Disaster Area. Security and Management 2009: 613-617 - Craig Valli:
Snort IDS for SCADA Networks. Security and Management 2009: 618-621 - Andrew Woodward:
Do Current BitTorrent Clients Running on Windows 7 Beta Leave Behind Meaningful Data? Security and Management 2009: 622-617 - Lei Hou, Hai-Xin Duan, Jianping Wu:
Selecting Trust Peers Based on Updated Credit Value in Peer-to-Peer Networks. Security and Management 2009: 628-634 - Peter Hannay, Andrew Woodward:
Firewire Forensics in Modern Operating Systems. Security and Management 2009: 635-638 - Zhiqian Xu, Hai Jiang:
Data Protection in Object-based Storage Devices. Security and Management 2009: 639-644 - Arnur G. Tokhtabayev, Victor A. Skormin, Andrey M. Dolgikh, Mamirbek Beisenbi, Moldir Kargaldayeva:
Detection of Specific Semantic Functionalities, such as Self-Replication Mechanism, in Malware Using Colored Petri Nets. Security and Management 2009: 645-651 - Mohssen M. Z. E. Mohammed, H. Anthony Chan, Neco Ventura, Mohsin Hashim, Izzeldin Amin:
A modified Knuth-Morris-Pratt Algorithm for Zero-day Polymorphic Worms Detection. Security and Management 2009: 652-657 - Hala Bahjat Abdul Wahab, Abdul Monem S. Rahma, Hilal M. Yousif Al-Bayatti:
Proposed New Quantum Cryptography System Using Quantum Description Techniques for Generated Curves. Security and Management 2009: 658-664 - Mousa Farajallah, Rushdi Hamamreh:
Self Generating Multi Keys Cryptosystem Model for Non-Invertible Matrices based on Hill Cipher. Security and Management 2009: 665-672
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.