


default search action
SEC 2000: Beijing, China
- Sihan Qing, Jan H. P. Eloff:

Information Security for Global Information Infrastructures, IFIP TC11 Fifteenth Annual Working Conference on Information Security, August 22-24, 2000, Beijing, China. IFIP Conference Proceedings 175, Kluwer 2000, ISBN 0-7923-7914-4
Part one - Reviewed Papers
- Kai Rannenberg:

IT Security Certification and Criteria. Progress, Problems and Perspectives. SEC 2000: 1-10 - Mariki M. Eloff, Sebastiaan H. von Solms:

Information Security: Process Evaluation and Product Evaluation. SEC 2000: 11-18 - Helen L. Armstrong:

Managing Information Security in Healthcare - an Action Research Experience. SEC 2000: 19-28 - Rossouw von Solms, Helen van de Haar:

From Trusted Information Security Controls to a Trusted Information Security Environment. SEC 2000: 29-36 - Theodore Tryfonas, Dimitris Gritzalis, Spyros Kokolakis:

A Qualitative Approach to Information Availability. SEC 2000: 37-48 - Sokratis K. Katsikas:

A Postgraduate Programme on Information and Communication Systems Security. SEC 2000: 49-58 - Elmarie von Solms, Sebastiaan H. von Solms:

Information Security Management Through Measurement. SEC 2000: 59-68 - Jianchun Jiang, Weifeng Chen, Sihan Qing, Dengguo Feng:

The Defense Framework for Large-scale Computer Network System. SEC 2000: 69-78 - Wolfgang Eßmayr, Edgar R. Weippl:

Identity Mapping: An Approach to Unravel Enterprise Security Management Policies. SEC 2000: 79-88 - Herbert Leitold, Peter Lipp, Andreas Sterbenz:

Independent Policy Oriented Layering of Security Services. SEC 2000: 89-98 - Robert Willison:

Reducing Computer Fraud Through Situational Crime Prevention. SEC 2000: 99-109 - Mikko T. Siponen:

Policies for Construction of Information Systems' Security Guidelines: Five Approaches. SEC 2000: 111-120 - C. P. Louwrens, Sebastiaan H. von Solms:

"DNA-proofing" for Computer Systems - A New Approach to Computer Security? SEC 2000: 121-129 - Costas Lambrinoudakis:

Using Smart Cards in an Educational Environment: Services and Security Features. SEC 2000: 131-140 - Alida Liebenberg, Jan H. P. Eloff:

MASS: Model for an Auditing Security System. SEC 2000: 141-150 - Steven Dawson, Sabrina De Capitani di Vimercati, Patrick Lincoln, Pierangela Samarati:

Classifying Information for External Release. SEC 2000: 151-160 - Yongge Wang:

Using Mobile Agent Results to Create Hard-to-Detect Computer Viruses. SEC 2000: 161-170 - Jiahai Yang, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia:

CARDS: A Distributed System for Detecting Coordinated Attacks. SEC 2000: 171-180 - Petar Horvatic, Jian Zhao, Niels J. Thorwirth:

Robust Audio Watermarking Based on Secure Spread Spectrum and Auditory Perception Model. SEC 2000: 181-190 - Yongxing Sun, Xinmei Wang:

A Simple and Efficient Approach to Verfying Cryptographic Protocols. SEC 2000: 191-199 - Wenling Wu, Dengguo Feng, Sihan Qing:

Power Analysis of RC6 and Serpent. SEC 2000: 201-209 - Mingsheng Wang, Sihan Qing, Dengguo Feng:

A Simple Algorithm for Computing Several Sequences Synthesis. SEC 2000: 211-220 - Claudia Eckert, Florian Erhard, Johannes Geiger:

GSFS - A New Group-Aware Cryptographic File System. SEC 2000: 221-230 - Herbert Leitold, Wolfgang Mayerwieser, Udo Payer, Karl C. Posch, Reinhard Posch, Johannes Wolkerstorfer:

Robustness-Agile Encryptor for ATM Networks. SEC 2000: 231-240 - Jinhui Chao, Kazuto Matsuo, Shigeo Tsujii:

Fast Construction of Secure Discrete Logarithm Problems over Jacobian Varieties. SEC 2000: 241-250 - Johann Großschädl:

A New Serial/Parallel Architecture for a Low Power Modular Multiplier. SEC 2000: 251-260 - Haizhi Xu, Changwei Cui, Ying Lin, Tiejian Luo, Zhanqiu Dong:

Defending Against Null Calls Stream Attacks by Using a Double-Threshold Dynamic Filter. SEC 2000: 261-270 - Steve Kremer, Olivier Markowitch:

A Multi-Party Non-Repudiation Protocol. SEC 2000: 271-280 - Shaoquan Jiang, Dengguo Feng, Sihan Qing:

Analysis and Design of E-voting Protocol. SEC 2000: 281-290 - Vladimir I. Gorodetski, Igor V. Kotenko, Victor A. Skormin:

Integrated Multi-Agent Approach to Network Security Assurance: Models of Agents' Community. SEC 2000: 291-300 - Jussipekka Leiwo, Tuomas Aura, Pekka Nikander:

Towards Network Denial of Service Resistant Protocols. SEC 2000: 301-310 - Elton Saul, Andrew Hutchison:

A Generic Graphical Specification Environment for Security Protocol Modelling. SEC 2000: 311-320 - Rosanna Y. Chan, Jonathan C. Wong, Alex C. Chan:

Anonymous Electronic Voting System with Non-Transferable Voting Passes. SEC 2000: 321-330 - Olivier Paul, Maryline Laurent:

Improving Packet Filters Management through Automatic and Dynamic Schemes. SEC 2000: 331-340 - Damian G. Cholewka, Reinhardt A. Botha, Jan H. P. Eloff:

A Context-Sensitive Access Control Model and Prototype Implementation. SEC 2000: 341-350 - Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati:

Regulating Access To Semistructured Information on the Web. SEC 2000: 351-360 - Gregory Neven, Frank Piessens, Bart De Decker:

On the Practical Feasibiltiy of Secure Distributed Computing: A Case Study. SEC 2000: 361-370 - Michael Hitchens, Vijay Varadharajan:

Elements of a Language for Role-Based Access Control. SEC 2000: 371-380 - Jussipekka Leiwo, Christoph Hänle, Philip Homburg, Andrew S. Tanenbaum:

Disallowing Unauthorized State Changes of Distributed Shared Objects. SEC 2000: 381-390 - Ian R. Greenshields, Zhihong Yang:

Framework for Security Analysis and Access Control in a Distributed Service Medical Imaging Network. SEC 2000: 391-400 - Mikko T. Siponen:

On the Role of Human Morality in Information System Security: The Problems of Descriptivism and Non-descriptive Foundations. SEC 2000: 401-410 - Matthew J. Warren, William Hutchinson:

Information Warfare: Fact or Fiction? SEC 2000: 411-420 - Frans A. Lategan, Martin S. Olivier:

Enforcing Privacy by Withholding Private Information. SEC 2000: 421-430 - Gregory J. Kirsch, Tim Tingkang Xia:

The Changing Roles of Patent and Copyright Protection for Software and Communication Technology in the Internet Age. SEC 2000: 431-440 - Les Labuschagne:

A Framework for Electronic Commerce Security. SEC 2000: 441-450 - Feng Bao, Robert H. Deng, Jianying Zhou:

Electronic Payment Systems with Fair On-line Verification. SEC 2000: 451-460 - Fangguo Zhang, Futai Zhang, Yumin Wang:

Fair Electronic Cash Systems with Multiple Banks. SEC 2000: 461-470 - Anthony H. W. Chan, Caris K. M. Wong, Tsz Yeung Wong, Michael R. Lyu:

Securing Mobile Agents for Electronic Commerce: An Experiment. SEC 2000: 471-480 - Antonio Corradi, Rebecca Montanari, Cesare Stefanelli, Diana Berbecaru, Antonio Lioy, Fabio Maino:

A Flexible Management Framework for Certificate Status Validation. SEC 2000: 481-490 - Bart De Win, Jan Van den Bergh, Frank Matthijs, Bart De Decker, Wouter Joosen:

A Security Architecture for Electronic Commerce Applications. SEC 2000: 491-500
Part Two - Invited Papers
- Yiqun Lisa Yin:

On the Development of the Advanced Encryption Standard. SEC 2000: 503-504 - Xuejia Lai:

Public Key Infrastructure: Managing the e-Business Security. SEC 2000: 505-505

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














