- Hyangjin Lee, Inkyoung Jeun, Hyuncheol Jung:
Criteria for Evaluating the Privacy Protection Level of Identity Management Services. SECURWARE 2009: 155-160 - Cynthia Y. Lester, Frank Jamerson:
Incorporating Software Security into an Undergraduate Software Engineering Course. SECURWARE 2009: 161-166 - Davide Lorenzoli, George Spanoudakis:
Detection of Security and Dependability Threats: A Belief Based Reasoning Approach. SECURWARE 2009: 312-320 - Peter Lory:
Secure Distributed Multiplication of Two Polynomially Shared Values: Enhancing the Efficiency of the Protocol. SECURWARE 2009: 286-291 - Matti Mantere
, Ilkka Uusitalo, Juha Röning
:
Comparison of Static Code Analysis Tools. SECURWARE 2009: 15-22 - Mauro Migliardi
, Valentina Resaz:
Distributed Intrusion Detection: Simulation and Evaluation of Two Methodologies. SECURWARE 2009: 42-48 - Mucahit Mutlugun, Ibrahim Sogukpinar
:
Multi-level Authentication Scheme Utilizing Smart Cards and Biometrics. SECURWARE 2009: 93-98 - Jan Nagy, Peter Pecho:
Social Networks Security. SECURWARE 2009: 321-325 - Hyewon Park, Zeen Kim, Kwangjo Kim:
Forward Secure ID-Based Group Key Agreement Protocol with Anonymity. SECURWARE 2009: 274-279 - Igor Podebrad, Klaus Hildebrandt, Bernd Klauer:
List of Criteria for a Secure Computer Architecture. SECURWARE 2009: 76-80 - Kamil Reddy, Hein S. Venter
:
Using Object-Oriented Concepts to Develop a High-Level Information Privacy Risk Management Model. SECURWARE 2009: 23-30 - Alireza Sadighian, Rasool Jalili:
AFMAP: Anonymous Forward-Secure Mutual Authentication Protocols for RFID Systems. SECURWARE 2009: 31-36 - Reijo Savola, Habtamu Abie:
Identification of Basic Measurable Security Components for a Distributed Messaging System. SECURWARE 2009: 121-128 - Christian Seifert, Peter Komisarczuk, Ian Welch:
True Positive Cost Curve: A Cost-Based Evaluation Method for High-Interaction Client Honeypots. SECURWARE 2009: 63-69 - Peipei Shi, Bo Zhu, Amr M. Youssef:
A PIN Entry Scheme Resistant to Recording-Based Shoulder-Surfing. SECURWARE 2009: 237-241 - Antonietta Stango
, Neeli R. Prasad, Dimitris M. Kyriazanos:
A Threat Analysis Methodology for Security Evaluation and Enhancement Planning. SECURWARE 2009: 262-267 - Masaru Takesue:
Personalized Filtering of Polymorphic E-mail Spam. SECURWARE 2009: 249-254 - Ilkka Uusitalo, Josep M. Catot, Ramon Loureiro:
Phishing and Countermeasures in Spanish Online Banking. SECURWARE 2009: 167-172 - Cristian Varas, Thomas Hirsch:
Self Protection through Collaboration Using D-CAF: A Distributed Context-Aware Firewall. SECURWARE 2009: 179-184 - Wei Zhou, Zhiqiang Wei, Mijun Kang, Paddy Nixon, Lang Jia:
A Credit-Based Incentive Mechanism for Recommendation Acquisition in Multihop Mobile Ad Hoc Networks. SECURWARE 2009: 306-311 - Rainer Falk, Wilson Goudalo, Eric Y. Chen, Reijo Savola, Manuela Popescu:
The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece. IEEE Computer Society 2009, ISBN 978-0-7695-3668-2 [contents]