default search action
CNIS 2006: Cambridge, MA, USA
- Sanguthevar Rajasekaran:
Proceedings of the Third IASTED International Conference on Communication, Network, and Information Security, October 9-11, 2006, Cambridge, MA, USA. IASTED/ACTA Press 2006, ISBN 0-88986-636-8
Information security
- Vishav Vir Singh:
PROTEMP-Z: An XML based authorization system with provisional authorization and temporal certification support. Communication, Network, and Information Security 2006: 1-6 - Kosuke Okada, Shigeo Wada:
A robust image watermarking method to geometric attacks. Communication, Network, and Information Security 2006: 7-12 - Joon Son, Jim Alves-Foss:
Covert timing channel capacity of rate monotonic real-time scheduling algorithm in MLS systems. Communication, Network, and Information Security 2006: 13-18 - Sigurd Eskeland:
Security analysis of a large-scale voting scheme. Communication, Network, and Information Security 2006: 19-21 - Charlie Obimbo, Jingbo Ni:
A grey-level image watermarking method based on block DCT and statistic correlation adjustment. Communication, Network, and Information Security 2006: 22-27 - Diomedes D. Kastanis, Ioannis G. Askoxylakis, Apostolos Traganitis:
An efficient authentication scheme for contactless smartcards using elliptic curve cryptography. Communication, Network, and Information Security 2006: 28-33 - Yuan Zhang, Richard J. Enbody, John R. Lloyd:
Proactive, content-aware, sensitive data protection framework for enterprises. Communication, Network, and Information Security 2006: 34-40 - Longjiang Yu, Sheng-He Sun:
Slantlet transform-based image fingerprints. Communication, Network, and Information Security 2006: 41-43 - Behzad Salami, Charlie Obimbo:
A multi-bitwatermark generation algorithm with properties of error correction. Communication, Network, and Information Security 2006: 44-49
Communication security
- Ioannis G. Askoxylakis, Diomedes D. Kastanis, Apostolos Traganitis:
Elliptic curve and password based dynamic key agreement in wireless ad-hoc networks. Communication, Network, and Information Security 2006: 50-60 - Mihir M. Ayachit, Haiping Xu:
A petri net based XML firewall security model for web services invocation. Communication, Network, and Information Security 2006: 61-67 - Paul Tipper, Christopher Edwards:
A method for deriving paths across a distributedweb of trust. Communication, Network, and Information Security 2006: 68-73 - Asad M. Ali:
Designing SSL/TLS protocol for resource constrained devices. Communication, Network, and Information Security 2006: 74-80 - Charlie Obombo, Fardeen Haji, Larry Lindsay, Darshana Patel:
Security framework for supervisory control and data acquisition, automation systems, and networks. Communication, Network, and Information Security 2006: 81-86 - Sylwester Sobolewski, R. Michael Buehrer:
Object authentication in closed containers by ultra-wideband multipath profile examination: An application to national security. Communication, Network, and Information Security 2006: 87-92 - Gareth Owen, Mo Adda:
Self-organising quorum systems for ad hoc networks. Communication, Network, and Information Security 2006: 93-98 - Sigurd Eskeland:
Access control by secure multi-party EPR decryption in the medical scenario. Communication, Network, and Information Security 2006: 99-103 - Jonathan T. Trostle:
The lightweight key management protocol (LKMP). Communication, Network, and Information Security 2006: 104-112
Communication, network, and information security
- Aliaa A. A. Youssif, Atef Z. Ghalwash, Samir Mohamed:
Artificial immune using multi-level negative selection approach to anomaly detection. Communication, Network, and Information Security 2006: 113-118 - R. Bhakthavathsalam:
Reinforcement of privacy in 802.16 MAC common part sublayer using the principle of circularity. Communication, Network, and Information Security 2006: 119-125 - Bei Wang, Jim Alves-Foss:
An MSLS-EMM for enforcing confidentiality in malicious environments. Communication, Network, and Information Security 2006: 126-131 - Jaime Muñoz Arteaga, Ricardo Mendoza González, Francisco J. Álvarez, Miguel Vargas Martin:
A classification of security patterns for the transactions between a requester, an intermediary, and a web-service. Communication, Network, and Information Security 2006: 132-137 - Omar Hussain Alhazmi, Sung-Whan Woo, Yashwant K. Malaiya:
Security vulnerability categories in major software systems. Communication, Network, and Information Security 2006: 138-143 - Ashish Anand, Rahul Rishi, Mukesh Kumar:
ARP and ICMP weaknesses: Impact and network performance analysis of a novel attack strategy. Communication, Network, and Information Security 2006: 144-149 - Mahendra Kumar, Richard E. Newman:
STRBAC - An approach towards spatio-temporal role-based access control. Communication, Network, and Information Security 2006: 150-155 - F. El-Hassan, Ashraf Matrawy, Nabil Seddigh, Biswajit Nandy:
Experimental evaluation of network security through a hierarchical quantitative metrics model. Communication, Network, and Information Security 2006: 156-164 - Marco Prandini:
Securing a Linux-based multi-user web server. Communication, Network, and Information Security 2006: 165-171
Network security
- Hiroshi Fujinoki, Ravi Kumar Boyapati:
Performance studies of the server-side access control for syn-flooding distributed denial of service attacks using real systems. Communication, Network, and Information Security 2006: 172-178 - Abhinav Pathak, Dheeraj Sanghi:
A scalable approach to IP anycast security. Communication, Network, and Information Security 2006: 179-184 - Yaxuan Qi, Jun Li:
An efficient hybrid algorithm for multidimensional packet classification. Communication, Network, and Information Security 2006: 185-190 - Pascal Urien, Mesmin Dandjinou, Mohamad Badra:
Introducing trusted EAP module for security enhancement in WLANs and VPNs. Communication, Network, and Information Security 2006: 191-198 - Jianming Yu, Quan Huang, Yibo Xue:
Optimizing multi-thread string matching for network processor based intrusion management system. Communication, Network, and Information Security 2006: 199-204 - Tobias Eggendorfer, Jörg Keller:
Dynamically blocking access to web pages for spammers' harvesters. Communication, Network, and Information Security 2006: 205-210 - Jörg Keller, Ralf Naues:
Design of a virtual computer security lab. Communication, Network, and Information Security 2006: 211-215 - Yaxuan Qi, Jun Li:
Towards effective packet classification. Communication, Network, and Information Security 2006: 216-223 - Leonardo Mattes, João Antonio Zuffo:
Access control platform for submitted jobs in computational grid environment. Communication, Network, and Information Security 2006: 224-229
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.