


default search action
Security and Management 2006: Las Vegas, Nevada, USA
- Hamid R. Arabnia, Selim Aissi:

Proceedings of the 2006 International Conference on Security & Management, SAM 2006, Las Vegas, Nevada, USA, June 26-29, 2006. CSREA Press 2006, ISBN 1-60132-001-9
Policies + Guidelines + Service Oriented Systems + Attack Detection
- Rune Gustavsson:

Ensuring Dependability in Service Oriented Computing. Security and Management 2006: 3-11 - Kenichi Takahashi, Kouichi Sakurai:

A Framework for the User-Oriented Personal Information Protection. Security and Management 2006: 12-19 - Andrzej Bialas:

A Semiformal Approach to the Security Problem of the Target of Evaluation (TOE) Modeling. Security and Management 2006: 19-25 - Norbik Bashah Idris, Bharanidharan Shanmugam:

Novel Attack Detection Using Fuzzy Logic and Data Mining. Security and Management 2006: 26-31 - Omer Mahmood:

Custom Plugin - A Solution to Phishing and Pharming Attacks. Security and Management 2006: 32-37 - Eunjin Ko, Yongsun Ryu, Gilhaeng Lee, Youngsun Kim:

The Fault Detecting Method for Supporting SLA Fault Metrics of IPTV Service. Security and Management 2006: 38-43 - Guannan Gong, Liang Hu, Kuo Zhao, Jinxin He, Yuefeng Xu, Ying Duan:

SPS-VN: Research on the Security Policy System for Virtual Network. Security and Management 2006: 44-47 - Gang Shin Lee, Mi Hyun Ahn, Ho-Seong Kim, Jae-il Lee:

The Information Security Guideline for SMEs in Korea. Security and Management 2006: 48-56
Biometric Authentication + Steganographic Algorithms
- Shahram Latifi, Nimalan Solayappan:

A Survey of Unimodal Biometric Methods. Security and Management 2006: 57-63 - Hesham Elzouka:

A New Robust and Secure Steganographic System for Greyscale Images. Security and Management 2006: 64-71 - Kevin Daimi, Katherine Snyder:

Security Requirements for Multimodal Biometric Systems. Security and Management 2006: 72-77 - Yoshifumi Ueshige, Kouichi Sakurai:

A Proposal of One-Time Biometric Authentication. Security and Management 2006: 78-83 - Xuan-Hien Dang, Krishna C. S. Kota:

Case Study: An Implementation of a Secure Steganographic System. Security and Management 2006: 84-90
Authentication Systems + Authorization Issues + Verification
- Jonathan White, Dale Thompson:

Using Synthetic Decoys to Digitally Watermark Personally-Identifying Data and to Promote Data Security. Security and Management 2006: 91-99 - Hiroshi Dozono, Yoshio Noguchi, Masanori Nakakuni, Hisao Tokushima:

The Analyses of Key Stroke Timings using Self Organizing Maps and its Application to Authentication. Security and Management 2006: 100-105 - Kun-Won Jang, Chan-Kil Park, Jung-Jae Kim, Moon-Seog Jun:

A Study on DRM System for On/Off Line Key Authentication. Security and Management 2006: 106-111 - Wilfrid J. Mirville, Jamie Kobie, Michael L. Nelson:

MRAS: A Multi-Layered Remote Authentication System. Security and Management 2006: 112-117 - Jinxin He, Gaochao Xu, Zhiguo Zhou, Guannan Gong:

A New Approach For Source Authentication Of Multicast Data. Security and Management 2006: 118-121 - Huang-Ju Chen, Jyh-Ming Huang, Lei Wang:

Efficient and Secure Authentication Protocols for Mobile VoIP Communications. Security and Management 2006: 122-128 - Hao Wang, Zhongfu Wu, Xin Tan:

A New Secure Authentication Scheme Based Threshold ECDSA For Wireless Sensor Network. Security and Management 2006: 129-133 - Haibo Tian, Yumin Wang:

Security Analysis of the Digital Transmission Copy Protection Specification. Security and Management 2006: 134-137 - Zemao Zhao, Xiangxong Tang, Bin Li, Longhai Zhu:

An ID-based Anonymous Proxy Signature From Bilinear Pairings. Security and Management 2006: 138-144
Encryption and Key Management
- Danilo Gligoroski, Svein J. Knapskog, Suzana Andova:

Cryptcoding - Encryption and Error-Correction Coding in a Single Step. Security and Management 2006: 145-151 - Levent Ertaul, Vaidehi Kedlaya:

Finding Minimum Optimal Path Securely Using Homomorphic Encryption Schemes in Computer Networks. Security and Management 2006: 152-158 - Li Lu, Lei Hu:

Pairing-Based Multi-Recipient Public Key Encryption. Security and Management 2006: 159-165 - Sunghyuck Hong, Noé Lopez-Benitez:

Enhanced Group Key Generation Protocol. Security and Management 2006: 166-171 - Levent Ertaul, Jayalalitha Panda:

Mobile Agent Security. Security and Management 2006: 172-178 - Mykola Karpinskyy, Lesya Vasylkiv, Marcin Gizycki:

Secret Key Leakage Caused by Hamming-weight Timing Analysis on Modular Exponentiation. Security and Management 2006: 179-185 - Tae Ho Kim, Jong Jin Kim, Chang Hoon Kim, Chun Pyo Hong:

Flexible Cryptographic Component Design for Secure Web Applications. Security and Management 2006: 186-192
Network Security + Intrusion Detection + Related Issues
- Norbert Lehmann, Reinhard Schwarz, Jörg Keller:

FireCrocodile: A Checker for Static Firewall Configurations. Security and Management 2006: 193-199 - Hongmei Deng, Roger Xu, Frank Zhang, Chiman Kwan, Leonard Haynes:

Agent-based Distributed Intrusion Detection Methodology for MANETs. Security and Management 2006: 200-206 - Grant A. Jacoby, Thadeus Hickman, Stuart Warders, Barak Griffin, Aaron Darensburg, Daniel Castle:

Gibraltar: A Mobile Host-Based Intrusion Protection System. Security and Management 2006: 207-212 - Thawatchai Chomsiri, Chotipat Pornavalai:

Firewall Rules Analysis. Security and Management 2006: 213-219 - Shuangbao Wang, Fengjing Shao, Robert S. Ledley:

Connputer - A Framework of Intrusion-Free Secure Computer Architecture. Security and Management 2006: 220-225 - Wen Ouyang, Kun-Ming Yu, Wen-Ping Lee:

Design and Implementation of a High-Performance Active Network Security System. Security and Management 2006: 226-232 - Omer Demir, Ping Ji, Jinwoo Kim:

Session Based Logging (SBL) for IP-Traceback on Network Forensics. Security and Management 2006: 233-239 - Richard Wasniowski:

Network Intrusion Detection System with Data Mart. Security and Management 2006: 240-244 - Jun Qian, Chao Xu, Meilin Shi:

Remodeling and Simulation of Intrusion Detection Evaluation Dataset. Security and Management 2006: 245-251 - Johnnes Arreymbi:

Modelling to Enhance GSM Network Security. Security and Management 2006: 252-260 - Kuo Zhao, Liang Hu, Guannan Gong, Meng Zhang, Kexin Yang:

Comparison of Two Sampling-Based Data Collection Mechanisms for Intrusion Detection System. Security and Management 2006: 261-265 - Hsun-Jung Cho, Li-Yen Hsu:

Integrating the Generalized-Honeycomb-Torus for Sustainable Parking Structures in the Globalizing Age. Security and Management 2006: 266-271 - Yan-ning Huang, Yong Jiang:

Firewall Design: Understandable, Designable and Testable. Security and Management 2006: 272-278
Applications + Algorithms + Software Tools
- Anil Kumar Venkataiahgari, Mourad Debbabi, J. William Atwood:

Secure E-commerce Protection Profile. Security and Management 2006: 279-285 - Pierre K. Y. Lai, Siu-Ming Yiu, Kam-Pui Chow, C. F. Chong, Lucas Chi Kwong Hui:

An Efficient Bloom Filter Based Solution for Multiparty Private Matching. Security and Management 2006: 286-292 - Mohammad Chowdhury, Bon Sy, Rasheed Ahmad:

Application of Gaussian Estimation for Devising Reliable Vulnerability Assessment on SIP-based VoIP Infrastructure. Security and Management 2006: 293-299 - Jörg Keller, Tobias Eggendorfer:

Combining SMTP and HTTP tar Pits to Proactively Reduce Spam. Security and Management 2006: 300-306 - Dongwan Shin:

Modeling Role-based Trust and Authority in Open Environments. Security and Management 2006: 307-313 - Li-Yen Hsu, Shin-Shin Kao:

Developing Dual-Surveillance Based Vehicle Security Management with Generalized Honeycomb Tori. Security and Management 2006: 314-320 - Bernard Kaddour, Joël Quinqueton:

Using Aspects and Compilation Techniques to Dynamically Manage Applications. Security and Management 2006: 321-327 - Michael LeMay, Jack Tan:

Acoustic Surveillance of Physically Unmodified PCs. Security and Management 2006: 328-334 - Xiaodong Yuan, Dajiong Yue:

Software Vaccine Technique and Its Application in Early Virus. Security and Management 2006: 335-340 - Jianwu Zheng, Mingsheng Liu, Hui Liu:

On Achieving Trustworthy SOA-Based Web Services. Security and Management 2006: 341-350
Integrated Security
- Satish Baddelpeli, Gregory Vert:

Adaptive Security Metrics for Computer Systems. Security and Management 2006: 351-356 - Rajasekhar Yakkali, Gregory Vert:

Architectural Framework Design for Authentication Mechanism in Mobile Adhoc Networks (MANETs). Security and Management 2006: 357-363 - Gregory Vert, Manaf Alfize:

An Enhanced Pretty Good Privacy (EPGP) System with Mutual Non-Repudiation. Security and Management 2006: 364-370 - Sara Nasser, Sergiu Dascalu, Gregory Vert:

User Interface Design of the Interactive Fingerprint Recognition (INFIR) System. Security and Management 2006: 371-377 - Arthur Reloj, Gregory Vert:

Optical Wireless: Chromatic Encoded Visual Data Transfer. Security and Management 2006: 378-383 - Gregory Vert, Nic Herndon:

Secure Simultaneous Search of Distributed, Heterogeneous Bioinformatics Databases. Security and Management 2006: 384-389 - Amit Mathur, Suneuy Kim, Mark Stamp:

Role Based Access Control and the JXTA Peer-to-Peer Framework. Security and Management 2006: 390-398
Securing Medical Information
- Christopher Bolan:

Do No Harm: The Use of RFID Tags in a Medical Environment. Security and Management 2006: 399-403 - Andrew Woodward:

Data Security and wireless networks: mutually exclusive? Security and Management 2006: 404-409 - Craig Valli:

The Insider Threat to Medical Records; Has the Network Age Changed Anything? Security and Management 2006: 410-414 - Patricia A. H. Williams:

The Role of Standards in Medical Information Security: An Opportunity for Improvement. Security and Management 2006: 415-420 - Craig Valli:

SQL Injection - Threats to Medical Systems: The Issues and Countermeasures. Security and Management 2006: 421-425 - Patricia A. H. Williams:

Security Immunization Using Basic Countermeasures. Security and Management 2006: 426-434
Late Papers
- Gregory Vert, Sergiu M. Dascalu, Frederick C. Harris Jr., Sermsak Buntha:

A Visual Environment for Characterization of State Changes in Computer Systems. Security and Management 2006: 435-440 - Ebrahim Khosravi, Brandy Tyson:

Increasing Security in Mobile Ad Hoc Networks by Incentives to Cooperate and Secure Routing. Security and Management 2006: 441-447 - Jinqiao Yu, Y. V. Ramana Reddy, Sumitra Reddy:

TRINETR: Facilitating Alerts Analysis and Response Decision Making. Security and Management 2006: 448-455 - Shamila Makki, Wunnava V. Subbarao:

On Security in TCP/IP over Wireless Network. Security and Management 2006: 456-461 - Okbin Lee, Seongyeol Kim:

Conference Key Agrement Protocol Employing a Symmetric Balanced Incomplete Block Design. Security and Management 2006: 462-467 - Yoichi Shibata, Masahiro Mimura, Kenta Takahashi, Masakatsu Nishigaki:

Mechanism-Based PKI - A Real-Time Key Generation from Fingerprints. Security and Management 2006: 468-474 - Cesar Monroy, Rayford B. Vaughn:

Keeping An Educational Network Healthy: Differentiating Malicious And Naive Students On An Educational Network Environment. Security and Management 2006: 475-481 - Vivek Kumar Sehgal:

Stochastic Modeling of Worm Propagation in Trusted Networks. Security and Management 2006: 482-488 - Ali Berrached, André de Korvin:

Reinforcing Access Control Using Fuzzy Relation Equations. Security and Management 2006: 489-493 - Rajarshi Sanyal:

Framework for realizing Mobile and Computer Communications through Color Signals. Security and Management 2006: 494-500 - Manoj B. Sastry, Michael J. Covington, Deepak J. Manohar:

Securing Collaborative Applications. Security and Management 2006: 501-508 - Rongzhen Yang, Liang He, Shoufeng Yang, Forni Gary, Fei Liu, Jiayue Chang, Manxue Guo:

The Value of Hardware-Based Security Solutions and its Architecture for Security Demanding Wireless Services. Security and Management 2006: 509-514 - Robert Thibadeau, Michael Willett:

Trusted Storage: Focus on Use Cases. Security and Management 2006: 515-521 - Pravesh Gaonjur, Chandradeo Bokhoree:

Risk of Insider Threats in Information Technology Outsourcing: Can Deceptive Techniques be Applied? Security and Management 2006: 522-

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














