


default search action
Security and Management 2005: Las Vegas, Nevada, USA
- Hamid R. Arabnia:

Proceedings of The 2005 International Conference on Security and Management, SAM 2005, Las Vegas, Nevada, USA, June 20-23, 2005. CSREA Press 2005, ISBN 1-932415-82-3
Workshop: IP Network Security
- Hua Wang, Zhongwei Zhang, David Lai:

Towards an Authentication Protocol for Service Outsourcing Over IP Networks. Security and Management 2005: 3-9 - Jiwei Wei, Zhixin Sun:

On Intelligent Agent-based Decoy Systems. Security and Management 2005: 10-16 - Michihiro Aoki, Takafumi Hamano, Takeshi Miyasaka, Kentaro Ogawa, Masaaki Inami, Keishi Habara, Shinichiro Chaki:

Enhancing Security Functionality on Open Router Architecture. Security and Management 2005: 17-23 - Ed Kirkham, Paul Botham:

redAlert: Data-Mining and Visualisation for IP Data Analysis. Security and Management 2005: 24-32
Public Key Encryption
- Soon Hwa Sung, Eunbae Kong:

A Distributed Certificate Status Verification Using Mobile Code PSTU(Proactive Self Transaction Unit) of Secure Mobile Agent in PKI(Public Key Infrastructure). Security and Management 2005: 33-39 - Himanshu Thapliyal, M. B. Srinivas, Hamid R. Arabnia:

Faster RSA Encryption/Decryption Architecture Using an Efficient High Speed Overlay Multiplier. Security and Management 2005: 40-44 - HyunHee Choi, InJung Kim, Jeong Ryou:

A Study on Variable Modulo Number Based Public Key Cryptosystem in Mobile Network. Security and Management 2005: 45-50
Key Management
- Wei-Bin Lee, Jia-Hong Li, Chyi-Ren Dow:

Efficient Date-Constraint Hierarchical Key Assignment Scheme. Security and Management 2005: 51-57 - Ying Wu, Yongping Zhang, Tianjie Cao:

Security Analysis of A Proxy Signature Scheme Based on the Elliptic Curve Cryptosystem. Security and Management 2005: 58-64 - Eun-Jun Yoon, Jae-Hyung Jung, Woo-Hun Kim, Kee-Young Yoo:

A Secret Key Based Authentication Scheme Using Smart Cards. Security and Management 2005: 65-71 - Eun-Jun Yoon, Eun-Kyung Ryu, Woo-Hun Kim, Kee-Young Yoo:

Cryptanalysis of A Key Authentication Scheme Based on Discrete Logarithms. Security and Management 2005: 72-78
Attack Management
- Karin Sallhammar, Bjarne E. Helvik, Svein J. Knapskog:

Incorporating Attacker Behavior in Stochastic Models of Security. Security and Management 2005: 79-85 - Guangsen Zhang, Manish Parashar:

Cooperative Mechanism Against DDoS Attacks. Security and Management 2005: 86-96 - Sergio Caltagirone, Paul Ortman, Sean Melton, David O. Manz, Kyle King, Paul W. Oman:

RADICL: A Reconfigurable Attack-Defend Instructional Computing Laboratory. Security and Management 2005: 97-103 - Jin Shu, Fengyu Liu, Manwu Xu:

Baseline - A Passive Approach to Tolerate and Detect DoS/DDoS Attacks. Security and Management 2005: 104-110 - Henghui Zou, Hengming Zou:

A Prediction and Early Warning Model for Hacker Attacks. Security and Management 2005: 111-118 - Jonathan Wong, Duncan S. Wong:

Known Session Key Attack Against a Collection of Signcryption Schemes. Security and Management 2005: 119-126
Intrusion Detection
- HamidReza Haydari, Ali Moeini, MahdiReza Mohajerani:

An Approach to Reduce False Alarms in an Intrusion Detection System. Security and Management 2005: 127-132 - Brian J. d'Auriol, Afolami Akinsanmi:

A Conceptual Space Model for Intrusion Detection. Security and Management 2005: 133-139 - Brian J. d'Auriol, Kishore Surapaneni:

A Computation-Communication Sequencing Model for Intrusion Detection Systems. Security and Management 2005: 140-143 - Riaz Ahmed Shaikh, Saeed Rajput, S. M. H. Zaidi, Kashif Shairf:

Enterprise Wide Centralized Logging Mechanism for Application Level Intrusion Detection. Security and Management 2005: 144-148 - Richard A. Wasniowski:

Intrusion Detection with Agent-Based System. Security and Management 2005: 149-154
Network Management: Issues & Protocols
- Ramzi El-Haddadeh, Gareth A. Taylor:

Novel Congestion-Based Pricing Scheme for QoS-Enabled Networks. Security and Management 2005: 155-162 - Yuqing Zhang, Xiuying Liu, Dengguo Feng:

An approach to the formal verification of the three-principal security protocols. Security and Management 2005: 163-169 - Kanwalinderjit Kaur Gagneja:

Privacy Protocol for Quantum Channel. Security and Management 2005: 170-175 - Brian J. d'Auriol:

Network Vertical Intrusion Model (NetVIM). Security and Management 2005: 176-179 - M. D. Kesari, S. D. Sudarsan, T. Velayutham, Manisha Jagadhane, U. Sailaja:

Information Assurance Security Frameworkfor Enterprise Networks. Security and Management 2005: 180-186
Design, Architecture & Frameworks
- Dennis Heimbigner:

Client-Side Deception Using Architectural Degradation. Security and Management 2005: 187-193 - Jinqiao Yu, Y. V. Ramana Reddy, Sentil Selliah, Sumitra Reddy:

A Knowledge-Based Alert Evaluation and Security Decision Support Framework. Security and Management 2005: 194-200 - Kibaya Erisania, Dongqing Xie:

Designing a Secure Trust Intermediary Service (STIS) for Web Services: a WS-Trust Approach. Security and Management 2005: 201-207 - Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu, Yan Woo:

A model to support fine-grained delegation of authorization. Security and Management 2005: 208-212 - Youngho Kim, Jeongnyeo Kim:

Design of Packet Filtering on Network Processor. Security and Management 2005: 213-220
Research & Methodologies
- Jan vom Brocke, Christian Buddendick:

Security Awareness Management - Foundations and Implementation of Security Awareness. Security and Management 2005: 221-227 - Robert F. Erbacher, Menashe Garber:

Real-Time Interactive Visual Port Monitoring and Analysis. Security and Management 2005: 228-234 - Chlotia Posey Garrison:

Computer Security Awareness of College Students. Security and Management 2005: 235-240 - John Gathegi, Michael Workman:

Observance and Contravention of Information Security Measures. Security and Management 2005: 241-247 - Guillermo A. Francia III, Keion Clinton:

Computer Forensic Tools and Techniques. Security and Management 2005: 248-252 - Brian Brammeier, Eltayeb Abuelyaman:

On The Improvement of XML Web Services Security. Security and Management 2005: 253-259 - Zubair A. Baig:

Preventing Service Flooding on Internet DNS Servers thru an Application-Level Mechanism: A Performance Analysis. Security and Management 2005: 260-268
Algorithms
- Ganesh Godavari, C. Edward Chow:

Secure Information Sharing Using Attribute Certificates and Role Based Access Control. Security and Management 2005: 269-276 - Jianwu Zheng, Mingsheng Liu:

Establishing Trustworthy Terminal with Smart Card. Security and Management 2005: 277-282 - Alexander Bahrushin, Kiseon Kim:

Rotation and Scaling Invariant Watermarking on Base of a Linear Polar Grid Representation. Security and Management 2005: 283-289 - Hesham Elzouka:

A Secure and Robust Algorithm for Exchanging Secret Messages. Security and Management 2005: 290-296 - Patrick George, Gérald Maunier:

Combining User and Platform Trust Properties to Enhance VPN Client Authentication. Security and Management 2005: 297-303 - Dugyu Ryoo, Seonho Kim, Moonseog Jun:

Role Authentication for Secure DBMS. Security and Management 2005: 304-312
Optimization Techniques
- Alexander Wiesmaier, Mike Fisher, Marcus Lippert, Johannes Buchmann:

Ouflanking and Securely Using the PIN/TAN-System. Security and Management 2005: 313-319 - Lawrence Chung, Nary Subramanian:

Reconfirming Change in Secure Software Systems: An Adaptable Security Approach. Security and Management 2005: 320-326 - Yan Woo, Lucas Chi Kwong Hui, Kam-Pui Chow, Siu-Ming Yiu:

Dynamic Integrity Verification for Software Self-defense. Security and Management 2005: 327-333 - Bogdan Hoanca, Kenrick J. Mock:

Screen oriented technique for reducing the incidence of shoulder surfing. Security and Management 2005: 334-340 - Ihor V. Vasyltsov, Hee-Kwan Son:

Redundancy of Check-Point Unit as a Method to Increase the Resistance to Fault Influence in ECC. Security and Management 2005: 341-347 - Eui-nam Huh, Seung-Yeon Lee, Youngsong Mun, Hyunseung Choo:

An Efficient Authentication Mechanism on Ad-Hoc Telematics Environment. Security and Management 2005: 348-356
Systems & Prototypes
- Teik Guan Tan:

An Enhanced One-Time Password Implementation. Security and Management 2005: 357-363 - Jianyun Xu, Andrew H. Sung, Qingzhong Liu:

Online Fraud Detection System Based on Non-Stationery Anomaly Detection. Security and Management 2005: 364-370 - Himanshu Thapliyal, M. B. Srinivas, Hamid R. Arabnia:

Implementation of A Fast Square In RSA Encryption/Decryption Architecture. Security and Management 2005: 371-374 - Jianming Yu, Jun Li:

A Parallel NIDS Pattern Matching Engine and Its Implementation on Network Processor. Security and Management 2005: 375-384
Security in Remote - Mobile Environments
- Miss Laiha Mat Kiah, Keith M. Martin:

Group Communication: Design Challenges in the Development of Key Management Frameworks in Wireless Mobile Environments. Security and Management 2005: 385-391 - Tarek K. Alameldin, Saeed Iqbal, Vishal Saberwal:

Steganography Analysis on Mobile Devices. Security and Management 2005: 392-397 - Wayne A. Jansen, Serban I. Gavrila, Vlad Korolev:

Proximity-Based Authentication for Mobile Devices. Security and Management 2005: 398-404 - Georgios Kalogridis, Chris J. Mitchell, Gary Clemo:

Spy Agents: Evaluating Trust in Remote Environments. Security and Management 2005: 405-411 - Wei-Bin Lee, Hsing-Bai Chen, Chyi-Ren Dow:

Remote User Authentication Scheme with User Anonymity. Security and Management 2005: 412-420
Conference on Biometric Authentication
- Zong Chen, Michael Recce:

Verification of Fingertip Pattern on Gun Handle. Security and Management 2005: 421-424 - Yuan Luo, Marina L. Gavrilova:

Coarse Fingerprint Matching Based on Singular Points. Security and Management 2005: 425-433 - Zong Chen, Michael Recce:

Dynamic Handgrip Recognition. Security and Management 2005: 434-439 - Hiroshi Dozono, Daichi Takata, Masanori Nakakuni, Yoshio Noguchi:

The Analysis of Pen Pressures of Handwritten Symbols on PDA Touch Panel using Self Orgazining Maps. Security and Management 2005: 440-445 - Chikara Ohkubo, Yoichi Muraoka:

Biometric Authentication Using PKI. Security and Management 2005: 446-452
Late Papers
- Jiann-Liang Chen, Shih-Feng Sun:

Design of IPv6-Based Mobile Routers for Network Mobility Applications. Security and Management 2005: 453-459 - Fu-Shing Sun, Chun-Hung Tzeng:

A Learning Model for Intrusion Detection Using Tolerance Relation. Security and Management 2005: 460-466 - Nitin Gupta:

The changing face of application security: A look at the evolving security infrastructure. Security and Management 2005: 467-472 - Janusz Stoklosa, Jaroslaw Bubicz:

Compound inversive congruential generator as a source of keys for stream ciphers. Security and Management 2005: 473-478 - Eunjin Ko, Boosun Jeon, Nosam Park, Gilhaeng Lee:

The Data Handling Method of a Data Dispatcher Module in Web-Based SLA Monitoring and Reporting (WSMR) System. Security and Management 2005: 479-483 - Goo Yeon Lee, Yong Lee, Hwa Jong Kim, Choong Kyo Jeong, Dong Eun Lee:

Design and Implementation of a Data Sharing Scheme with Security and Flexibility Applicable to Extended P2P Systems. Security and Management 2005: 484-490 - Alexandre Fernandes de Moraes, João Batista Camargo Jr.:

Biometrics - Evaluating Security Technologies for Brazilian Airports. Security and Management 2005: 491-496 - Ching-Tang Hsieh, Chu-Sheng Cheng, Chih-Hsu Hsu:

AC/V Segmentation Approach for Mandarin Speech Based on Wavelet Transform. Security and Management 2005: 497-501 - Andrzej Bialas:

IT Security Modeling. Security and Management 2005: 502-505 - Brian P. Briammeier, Eltayeb Salih Abuelyaman:

A Spyware Prevention Model: A Proactive Approach. Security and Management 2005: 506-511 - Sung-Yeal Im, Ki-Dong Chung:

A Study on the Data Encipherment Equipment with Rijndael Algorithm in ATM Network. Security and Management 2005: 512-517 - Mira Kwak, Dong-Sub Cho:

Host State Representation for Intrusion Detection. Security and Management 2005: 518-523 - Muhammad Almas, Muhammad Younus, Abdul Basit:

A Linear Dimension Reduction Technique For Face Recognition. Security and Management 2005: 524-

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














