


default search action
SEC 2006: Karlstad, Sweden
- Simone Fischer-Hübner, Kai Rannenberg, Louise Yngström, Stefan Lindskog:

Security and Privacy in Dynamic Environments, Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden. IFIP 201, Springer 2006, ISBN 0-387-33405-X
Privacy and Privacy-Enhancing Technologies I
- Inger Anne Tøndel:

Improving Availability of Emergency Health Information without Sacrificing Patient Privacy. 1-12 - George Yee, Larry Korba, Ronggong Song:

Ensuring Privacy for Buyer-Seller E-Commerce. 13-24 - Jan Camenisch, Dieter Sommer, Roger Zimmermann:

A General Certification Framework with Applications to Privacy-Enhancing Certificate Infrastructures. 25-37
Security in Mobile and Ad Hoc Networks
- Zinaida Benenson, Felix C. Freiling, Ernest Hammerschmidt, Stefan Lucks, Lexi Pimenidis:

Authenticated Query Flooding in Sensor Networks. 38-49 - Pietro Michiardi, Refik Molva

:
Identity Based Message Authentication for Dynamic Networks. 50-61 - Hassnaa Moustafa, Gilles Bourdon, Yvon Gourhant:

Providing Authentication and Access Control in Vehicular Network Environment. 62-73
Trust and Security Management
- Marijke Coetzee

, Jan H. P. Eloff:
A Framework for Web Services Trust. 74-86 - Stephen Flowerday

, Rossouw von Solms:
Trust: An Element of Information Security. 87-98 - Bill Tsoumas, Panagiotis Papagiannakopoulos, Stelios Dritsas, Dimitris Gritzalis:

Security-by-Ontology: A Knowledge-Centric Approach. 99-110
Privacy Enhancing Technologies I1
- Vincent Naessens, Bart De Decker:

A Methodology for Designing Controlled Anonymous Applications. 111-122 - Sandra Steinbrecher:

Design Options for Privacy-Respecting Reputation Systems within Centralised Internet Communities. 123-134 - Jan Camenisch:

Protecting (Anonymous) Credentials with the Trusted Computing Group's TPM V1.2. 135-147
Attacks, Vulnerability Analysis, and Tools
- Dinei A. F. Florêncio, Cormac Herley:

Analysis and Improvement of Anti-Phishing Schemes. 148-157 - Kameswari Kotapati, Peng Liu, Thomas F. La Porta:

CAT - A Practical Graph & SDL Based Toolkit for Vulnerability Assessment of 3G Networks. 158-170 - Nils Gruschka, Norbert Luttenberger:

Protecting Web Services from DoS Attacks by SOAP Message Validation. 171-182
Access Control and Authentication I
- Thierry Sans, Frédéric Cuppens, Nora Cuppens-Boulahia:

A Flexible and Distributed Architecture to Enforce Dynamic Access Control. 183-195 - Andreas K. Mattas, Ioannis Mavridis, Iason Pagkalos

:
A Paradigm for Dynamic and Decentralized Administration of Access Control in Workflow Applications. 196-207 - Claudio Agostino Ardagna

, Ernesto Damiani
, Sabrina De Capitani di Vimercati
, Fulvio Frati, Pierangela Samarati
:
CAS++: An Open Source Single Sign-On Solution for Secure e-Services. 208-220
Security Protocols
- Jianying Zhou, Jose Antonio Onieva

, Javier López
:
A Synchronous Multi-Party Contract Signing Protocol Improving Lower Bound of Steps. 221-232 - Michael Backes, Birgit Pfitzmann:

On the Cryptographic Key Secrecy of the Strengthened Yahalom Protocol. 233-245 - Kun Peng, Colin Boyd, Ed Dawson

:
Sealed-Bid Micro Auctions. 246-257
Intrusion Detection
- Yacine Bouzida, Frédéric Cuppens:

Detecting Known and Novel Network Intrusions. 258-270 - Oleksiy Mazhelis, Seppo Puuronen, Mika Raento:

Evaluating Classifiers for Mobile-Masquerader Detection. 271-283 - Xiaoxin Yin, William Yurcik, Adam J. Slagell:

VisFlowCluster-IP: Connectivity-Based Visual Clustering of Network Hosts. 284-295
Usability and Awareness
- Almut Herzog, Nahid Shahmehri:

A Usability Study of Security Policy Management. 296-306 - Steven Furnell

, Adila Jusoh, Dimitris Katsabas, Paul Dowland
:
Considering the Usability of End-User Security Software. 307-316 - Thuy D. Nguyen, Cynthia E. Irvine:

Utilizing the Common Criteria for Advanced Student Research Projects. 317-328
Privacy Enhancing Technologies III
- Rafael Accorsi:

On the Relationship of Privacy and Secure Remote Logging in Dynamic Systems. 329-339 - Huafei Zhu, Tieyan Li, Feng Bao:

Privacy-Preserving Shared-Additive-Inverse Protocols and Their Applications. 340-350
Access Control and Authentication II
- Darko Kirovski, Nebojsa Jojic, Paul Roberts:

Click Passwords. 351-363 - Milan Petkovic, Claudine Conrado, Malik Hammoutène:

Cryptographically Enforced Personalized Role-Based Access Control. 364-376
Access Control and Authentication III
- Yuri Demchenko

, Leon Gommans, Cees de Laat:
Using VO Concept for Managing Dynamic Security Associations. 377-388 - Martin Gilje Jaatun

, Inger Anne Tøndel, Frédéric Paint, Tor Hjalmar Johannessen, John Charles Francis, Claire Duranton:
Secure Fast Handover in an Open Broadband Access Network using Kerberos-style Tickets. 389-400
Forensics
- Chia Yuan Cho, Sin Yeung Lee, Chung Pheng Tan, Yong Tai Tan:

Network Forensics on Packet Fingerprints. 401-412 - Martin Karresand

, Nahid Shahmehri:
Oscar - File Type Identification of Binary Data in Disk Clusters and RAM Pages. 413-424
IFIP WG 11.1/11.8 Security Culture Workshop
- Anthonie B. Ruighaver, Sean B. Maynard

:
Organizational Security Culture: More Than Just an End-User Phenomenon. 425-430 - Benjamin D. Cone, Michael F. Thompson, Cynthia E. Irvine, Thuy D. Nguyen:

Cyber Security Training and Awareness Through Game Play. 431-436 - Omar Zakaria

:
Internalisation of Information Security Culture amongst Employees through Basic Security Knowledge. 437-441 - Jabiri Kuwe Bakari, Charles N. Tarimo, Christer Magnusson, Louise Yngström:

Bridging the Gap between General Management and Technicians - A Case Study in ICT Security. 442-447 - Lynette Drevin

, Hennie A. Kruger
, Tjaart Steyn:
Value-Focused Assessment of Information Communication and Technology Security Awareness in an Academic Environment. 448-453 - Ronald C. Dodge, Aaron J. Ferguson:

Using Phishing for User Email Security Awareness. 454-459
IFIP WG 11.4 I-NetSec'06 Workshop
- Jan Camenisch:

Anonymous Credentials: Opportunities and Challenges. 460 - Florian Kerschbaum:

Practical Private Regular Expression Matching. 461-470 - Siani Pearson

, Marco Casassa Mont
:
A System for Privacy-Aware Resource Allocation and Data Processing in Dynamic Environments. 471-482 - Gergely Tóth, Zoltán Hornák:

The APROB Channel: Adaptive Semi-Real-Time Anonymous Communication. 483-492

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














