


default search action
1st SECURWARE 2007: Valencia, Spain
- Lourdes Peñalver, Oana Andreea Dini, Judie Mulholland, Octavio Nieto-Taladriz:

Proceedings of the First International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2007, October 14-20, 2007, Valencia, Spain. IEEE Computer Society 2007, ISBN 0-7695-2989-5
SECMAN
- Adam Wierzbicki

:
Evaluating a New Reputation Algorithm With Consideration For Fairness. 1-6 - Sergejus Sosunovas, Olegas Vasilecas:

Four security certification levels for IT Managers and Staff in the Public Sector. 7-11 - Tewfiq El Maliki

, Jean-Marc Seigneur
:
A Survey of User-centric Identity Management Technologies. 12-17 - Mohammad M. R. Chowdhury, Juan Miguel Gómez, Josef Noll, Ángel García-Crespo:

SemID: Combining Semantics with Identity Management. 18-23
SYSSEC and THREATS
- Marga Nácher, Carlos Miguel Tavares Calafate

, Juan-Carlos Cano
, Pietro Manzoni
:
Evaluation of the Impact of Multipath Data Dispersion for Anonymous TCP Connections. 24-29 - Olivier Powell, Jean-Marc Seigneur

, Luminita Moraru:
Trustworthily Forwarding Sensor Networks Information to the Internet. 30-35 - Nikolaos Chatzis:

Motivation for Behaviour-Based DNS Security: A Taxonomy of DNS-Related Internet Threats. 36-41 - Monia Loulou, Mohamed Tounsi

, Ahmed Hadj Kacem, Mohamed Jmaiel:
A Formal Approach to prevent Attacks on Mobile Agent Systems. 42-47
INFOSEC 1
- Zorana Bankovic, Slobodan Bojanic, Octavio Nieto-Taladriz, Atta Badii:

Increasing Detection Rate of User-to-Root Attacks Using Genetic Algorithms. 48-53 - Masaru Takesue:

A Scheme for Protecting the Information Leakage Via Portable Devices. 54-59 - Noura A. Saleh, Hoda N. Boghdady, Samir I. Shaheen

, Ahmed M. Darwish:
A Quasi-Lossless Data Embedding Technique Based on Euclidean Distance Calculation. 60-65 - Yeonjung Kang, Hyangjin Lee, Kilsoo Chun, Junghwan Song:

Classification of Privacy Enhancing Technologies on Life-cycle of Information. 66-70 - Daniel-Ioan Curiac

, Daniel T. Iercan, Octavian Dranga, Florin Dragan, Ovidiu Banias
:
Chaos-Based Cryptography: End of the Road? 71-76
INFOSEC 2, PRODAM and SECTECH
- Ignacio Blanquer, Vicente Hernández, Damià Segrelles

, Erik Torres:
Long-term storage and management of encrypted biomedical data in real scenarios. 77-82 - Josef Noll, Mohammad M. R. Chowdhury, György Kálmán, Juan Miguel Gómez:

Semantically supported Authentication and Privacy in Social Networks. 83-88 - Marek Kumpost:

Data Preparation for User Profiling from Traffic Log. 89-94 - Lourdes López-Santidrián

, Luis Redondo, José-Fernán Martínez, Manuel Ramiro, Vicente Hernández
, Francisco A. B. Bonilla, Fermín Bretón:
SECUAREA: Security in physical and logical areas. 95-100
ARCH 1 and SECHOME
- Carlos Nuno da Cruz Ribeiro:

Robust sensor self-initialization: Whispering to avoid intruders. 101-106 - Xiaomeng Su, Damiano Bolzoni, Pascal van Eck:

Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services. 107-114 - Jacques Saraydaryan, Véronique Legrand, Stéphane Ubéda:

Evaluation of Deviating Alerts coming from Behavioral Intrusion Detection System. 115-121 - Jorge Belenguer, Carlos Miguel Tavares Calafate

:
A low-cost embedded IDS to monitor and prevent Man-in-the-Middle attacks on wired LAN environments. 122-127 - Pedro Malagón, Juan Carlos Vallejo, José Manuel Moya

:
Dynamic environment evaluation for reliable AmI applications based on untrusted sensor. 128-131
ARCH 2
- Hristo Koshutanski

, Mihaela Ion, Luigi Telesca:
Distributed Identity Management Model for Digital Ecosystems. 132-138 - Jens Heider, Julian Schütte

:
Security made easy: Achieving user-friendly communication protection in ad-hoc situations. 139-144 - Vukasin Pejovic, Slobodan Bojanic, Carlos Carreras

:
Adding Value to TCP/IP Based Information exchange Security by Specialized Hardware. 145-150 - Vukasin Pejovic, Ivana Kovacevic, Slobodan Bojanic, Corado Leita, Jelena Popovic, Octavio Nieto-Taladriz:

Migrating a HoneyDepot to Hardware. 151-156
ARCH 3
- Raquel Lacuesta Gilaberte, Lourdes Peñalver Herrero:

Automatic Configuration of Ad-Hoc Networks: Establishing unique IP Link-Local Addresses. 157-162 - Han-Shik Kim, Byung-Seok Kang

, Sangheon Pack
, Chul-Hee Kang:
Route Investigation for Secure Routing in Mobile Ad-hoc Networks. 163-168 - Lari Iso-Anttila, Jorma Ylinen, Pekka Loula:

A Proposal to Improve IKEv2 negotiation. 169-174 - Benjamin Fontan, Sara Mota, Pierre de Saqui-Sannes

, Thierry Villemur:
Temporal Verification in Secure Group Communication System Design. 175-180 - Mehrez Essafi, Lamia Labed Jilani, Henda Hajjami Ben Ghézala

:
Towards a Comprehensive View of Secure Software Engineering. 181-186
ARCH 4
- Hédi Hamdi, Adel Bouhoula

, Mohamed Mosbah
:
A Software Architecture for Automatic Security Policy Enforcement in Distributed Systems. 187-192 - Pierre Parrend, Samuel Galice, Stéphane Frénot, Stéphane Ubéda:

Identity-Based Cryptosystems for Enhanced Deployment of OSGi Bundles. 193-200 - Arnaud Dury, Sergiy Boroday, Alexandre Petrenko

, Volkmar Lotz:
Formal Verification of Business Workflows and Role Based Access Control Systems. 201-210 - Haiyong Chen, Hongwei Sun, Kwok-Yan Lam:

A fast and elastic fingerprint matching algorithm using minutiae-centered circular regions. 211-215 - Somchart Fugkeaw

, Piyawit Manpanpanich, Sekpon Juntapremjitt:
AmTRUE: Authentication Management and Trusted Role-based Authorization in Multi-Application and Multi-User Environment. 216-221

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














