Search dblp for Publications

export results for "toc:db/conf/IEEEias/IEEEias2008.bht:"

 download as .bib file

@inproceedings{DBLP:conf/IEEEias/AbbassiF08,
  author       = {Ryma Abassi and
                  Sihem Guemara El Fatmi},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {An Automated Validation Method for Security Policies: The Firewall
                  Case},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {291--294},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.52},
  doi          = {10.1109/IAS.2008.52},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/AbbassiF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/AbdallahT08,
  author       = {Ali E. Abdallah and
                  Hassan Takabi},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {Integrating Delegation with the Formal Core {RBAC} Model},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {33--36},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.66},
  doi          = {10.1109/IAS.2008.66},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/AbdallahT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/AbdelnurARS08,
  author       = {Humberto J. Abdelnur and
                  Tigran Avanesov and
                  Micha{\"{e}}l Rusinowitch and
                  Radu State},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {Abusing {SIP} Authentication},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {237--242},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.29},
  doi          = {10.1109/IAS.2008.29},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/AbdelnurARS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/Abdullah-Al-WadudC08,
  author       = {Mohammad Abdullah{-}Al{-}Wadud and
                  Oksam Chae},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {Skin Segmentation Using Color Distance Map and Water-Flow Property},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {83--88},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.65},
  doi          = {10.1109/IAS.2008.65},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/Abdullah-Al-WadudC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/AbidA08,
  author       = {Mohamed Abid and
                  Hossam Afifi},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {Secure E-Passport Protocol Using Elliptic Curve Diffie-Hellman Key
                  Agreement Protocol},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {99--102},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.22},
  doi          = {10.1109/IAS.2008.22},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/AbidA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/AlbanoCP08,
  author       = {Michele Albano and
                  Stefano Chessa and
                  Roberto Di Pietro},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {Information Assurance in Critical Infrastructures via Wireless Sensor
                  Networks},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {305--310},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.54},
  doi          = {10.1109/IAS.2008.54},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/AlbanoCP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/AlkubeilyBB08,
  author       = {Mothanna Alkubeily and
                  Hatem Bettahar and
                  Abdelmadjid Bouabdallah},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {Impact of Cheating and Non-Cooperation on the Stability and the Performances
                  of Application-Level Multicast Sessions},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {141--146},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.43},
  doi          = {10.1109/IAS.2008.43},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/AlkubeilyBB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/AndreouM08,
  author       = {Marios S. Andreou and
                  Aad P. A. van Moorsel},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {COTraSE: Connection Oriented Traceback in Switched Ethernet},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {198--204},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.25},
  doi          = {10.1109/IAS.2008.25},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/AndreouM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/AraragiP08,
  author       = {Tadashi Araragi and
                  Olivier Pereira},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {Automatic Verification of Simulatability in Security Protocols},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {275--280},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.50},
  doi          = {10.1109/IAS.2008.50},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/AraragiP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/BellaCR08,
  author       = {Giampaolo Bella and
                  Gianpiero Costantino and
                  Salvatore Riccobene},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {Managing Reputation over MANETs},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {255--260},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.24},
  doi          = {10.1109/IAS.2008.24},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/BellaCR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/BellaLR08,
  author       = {Giampaolo Bella and
                  Francesco Librizzi and
                  Salvatore Riccobene},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {Realistic Threats to Self-Enforcing Privacy},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {155--160},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.23},
  doi          = {10.1109/IAS.2008.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/BellaLR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/CaoL08,
  author       = {Zhengjun Cao and
                  Lihua Liu},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {A Group Key Agreement Scheme Revisited},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {95--98},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.13},
  doi          = {10.1109/IAS.2008.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/CaoL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ChalkiasBHS08,
  author       = {Konstantinos Chalkias and
                  Foteini Baldimtsi and
                  Dimitrios Hristu{-}Varsakelis and
                  George Stephanides},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {An Implementation Infrastructure for Server-Passive Timed-Release
                  Cryptography},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {89--94},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.49},
  doi          = {10.1109/IAS.2008.49},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ChalkiasBHS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ChenWS08,
  author       = {Feng Chen and
                  Lingyu Wang and
                  Jinshu Su},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {An Efficient Approach to Minimum-Cost Network Hardening Using Attack
                  Graphs},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {209--212},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.38},
  doi          = {10.1109/IAS.2008.38},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ChenWS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/DusiGS08,
  author       = {Maurizio Dusi and
                  Francesco Gringoli and
                  Luca Salgarelli},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {A Model for the Study of Privacy Issues in Secure Shell Connections},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {311--317},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.46},
  doi          = {10.1109/IAS.2008.46},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/DusiGS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/El-FotouhD08,
  author       = {Mohamed Abo El{-}Fotouh and
                  Klaus Diepold},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {Dynamic Substitution Model},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {108--111},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.20},
  doi          = {10.1109/IAS.2008.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/El-FotouhD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/El-FotouhD08a,
  author       = {Mohamed Abo El{-}Fotouh and
                  Klaus Diepold},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {A New Narrow Block Mode of Operations for Disk Encryption},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {126--131},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.19},
  doi          = {10.1109/IAS.2008.19},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/El-FotouhD08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ElshakankiryCZ08,
  author       = {Osama A. Elshakankiry and
                  Andy Carpenter and
                  Ning Zhang},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {A New Secure Binding Management Protocol for Mobile IPv6 Networks},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {281--286},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.41},
  doi          = {10.1109/IAS.2008.41},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ElshakankiryCZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/EskelandO08,
  author       = {Sigurd Eskeland and
                  Vladimir A. Oleshchuk},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {Efficient Hierarchical Group-Oriented Key Establishment and Decryption},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {67--72},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.51},
  doi          = {10.1109/IAS.2008.51},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/EskelandO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/FrattolilloL08,
  author       = {Franco Frattolillo and
                  Federica Landolfi},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {Designing a {DRM} System},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {221--226},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.9},
  doi          = {10.1109/IAS.2008.9},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/FrattolilloL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/GadangPH08,
  author       = {Siddharta S. Gadang and
                  Brajendra Panda and
                  Joseph E. Hoag},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {Provenance Tracking with Bit Vectors},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {132--137},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.47},
  doi          = {10.1109/IAS.2008.47},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/GadangPH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/HabibJM08,
  author       = {Lionel Habib and
                  Mathieu Jaume and
                  Charles Morisset},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {A Formal Comparison of the Bell {\&} LaPadula and {RBAC} Models},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {3--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.18},
  doi          = {10.1109/IAS.2008.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/HabibJM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/HaidarA08,
  author       = {Ali Nasrat Haidar and
                  Ali E. Abdallah},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {Comparison and Evaluation of Identity Management in Three Architectures
                  for Virtual Organizations},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {21--26},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.67},
  doi          = {10.1109/IAS.2008.67},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/HaidarA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/HassanKZ08,
  author       = {Doaa Hassan and
                  Sherif El{-}Kassas and
                  Ibrahim Ziedan},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {Developing a Security Typed Java Servlet},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {215--220},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.31},
  doi          = {10.1109/IAS.2008.31},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/HassanKZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/HassanKZ08a,
  author       = {Doaa Hassan and
                  Sherif El{-}Kassas and
                  Ibrahim Ziedan},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {Challenges for Security Typed Web Scripting Languages Design},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {227--230},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.33},
  doi          = {10.1109/IAS.2008.33},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/HassanKZ08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/HoppeKD08,
  author       = {Tobias Hoppe and
                  Stefan Kiltz and
                  Jana Dittmann},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {Adaptive Dynamic Reaction to Automotive {IT} Security Incidents Using
                  Multimedia Car Environment},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {295--298},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.45},
  doi          = {10.1109/IAS.2008.45},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/HoppeKD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/HuangC08,
  author       = {Dazu Huang and
                  Zhigang Chen},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {Quantum Key Distribution Based on Multi-qubit Hadamard Matrices},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {333--337},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.40},
  doi          = {10.1109/IAS.2008.40},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/HuangC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ImpedovoR08,
  author       = {Donato Impedovo and
                  Mario Refice},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {Speaker Identification by Multi-Frame Generative Models},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {27--32},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.15},
  doi          = {10.1109/IAS.2008.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ImpedovoR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/JeoungSHKKL08,
  author       = {Ji{-}Hee Jeoung and
                  Eun{-}Ji Shin and
                  Seng{-}Phil Hong and
                  Sung{-}Hoon Kim and
                  In{-}Ho Kim and
                  Min{-}Woo Lee},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {Systematic Website Verification for Privacy Protection},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {231--234},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.48},
  doi          = {10.1109/IAS.2008.48},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/JeoungSHKKL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/JinVK08,
  author       = {Di Jin and
                  Pramode K. Verma and
                  Stamatios V. Kartalopoulos},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {Key Distribution Using Dual Quantum Channels},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {327--332},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.34},
  doi          = {10.1109/IAS.2008.34},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/JinVK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/KammasKS08,
  author       = {Pantelis Kammas and
                  Thodoros Komninos and
                  Yannis C. Stamatiou},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {A Queuing Theory Based Model for Studying Intrusion Evolution and
                  Elimination in Computer Networks},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {167--171},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.60},
  doi          = {10.1109/IAS.2008.60},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/KammasKS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/Kartalopoulos08,
  author       = {Stamatios V. Kartalopoulos},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {Chaotic Quantum Cryptography},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {338--342},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.32},
  doi          = {10.1109/IAS.2008.32},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/Kartalopoulos08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/KhanB08,
  author       = {Liaqat Ali Khan and
                  Muhammad Shamim Baig},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {A Server Based {ASR} Approach to Automated Cryptanalysis of Two Time
                  Pads in Case of Speech},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {103--107},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.14},
  doi          = {10.1109/IAS.2008.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/KhanB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/Kondakci08,
  author       = {Suleyman Kondakci},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {A Composite Network Security Assessment},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {249--254},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.59},
  doi          = {10.1109/IAS.2008.59},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/Kondakci08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LarsonLNJ08,
  author       = {Ulf Larson and
                  Stefan Lindskog and
                  Dennis K. Nilsson and
                  Erland Jonsson},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {Operator-Centric and Adaptive Intrusion Detection},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {161--166},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.42},
  doi          = {10.1109/IAS.2008.42},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LarsonLNJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LeungM08,
  author       = {Adrian Leung and
                  Chris J. Mitchell},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {A Device Management Framework for Secure Ubiquitous Service Delivery},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {267--274},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.28},
  doi          = {10.1109/IAS.2008.28},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LeungM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LimLLL08,
  author       = {Shu Yun Lim and
                  Meng{-}Hui Lim and
                  Sanggon Lee and
                  Hoonjae Lee},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {Secure Hybrid Group Key Management for Hierarchical Self-Organizing
                  Sensor Network},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {43--49},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.16},
  doi          = {10.1109/IAS.2008.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LimLLL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LuoYP08,
  author       = {Hao Luo and
                  Fa{-}Xin Yu and
                  Jeng{-}Shyang Pan},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {Data Hiding in Non-Expansion Visual Cryptography Based on Edge Enhancement
                  Multitoning},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {79--82},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.57},
  doi          = {10.1109/IAS.2008.57},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LuoYP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/Mazzariello08,
  author       = {Claudio Mazzariello},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {{IRC} Traffic Analysis for Botnet Detection},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {318--323},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.58},
  doi          = {10.1109/IAS.2008.58},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/Mazzariello08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/MondalS08,
  author       = {Samrat Mondal and
                  Shamik Sural},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {Security Analysis of Temporal-RBAC Using Timed Automata},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {37--40},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.10},
  doi          = {10.1109/IAS.2008.10},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/MondalS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/NandaLC08,
  author       = {Susanta Nanda and
                  Lap{-}Chung Lam and
                  Tzi{-}cker Chiueh},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {Web Application Attack Prevention for Tiered Internet Services},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {186--191},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.62},
  doi          = {10.1109/IAS.2008.62},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/NandaLC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/PandeyGLZ08,
  author       = {Navneet Kumar Pandey and
                  S. K. Gupta and
                  Shaveta Leekha and
                  Jingmin Zhou},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {{ACML:} Capability Based Attack Modeling Language},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {147--154},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.26},
  doi          = {10.1109/IAS.2008.26},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/PandeyGLZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/PetrovicB08,
  author       = {Slobodan Petrovic and
                  Sverre Bakke},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {Improving the Efficiency of Misuse Detection by Means of the q-gram
                  Distance},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {205--208},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.39},
  doi          = {10.1109/IAS.2008.39},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/PetrovicB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/RazakSM08,
  author       = {Shukor Abd Razak and
                  Normalia Samian and
                  Mohd Aizaini Maarof},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {A Friend Mechanism for Mobile Ad Hoc Networks},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {243--248},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.27},
  doi          = {10.1109/IAS.2008.27},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/RazakSM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/RodwaldS08,
  author       = {Przemyslaw Rodwald and
                  Janusz Stoklosa},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {{PHAL-256} - Parameterized Hash Algorithm},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {50--55},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.56},
  doi          = {10.1109/IAS.2008.56},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/RodwaldS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/RohaniMSK08,
  author       = {Mohd. Foad Rohani and
                  Mohd Aizaini Maarof and
                  Ali Selamat and
                  Houssain Kettani},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {LoSS Detection Approach Based on {ESOSS} and {ASOSS} Models},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {192--197},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.37},
  doi          = {10.1109/IAS.2008.37},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/RohaniMSK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/SaradSV08,
  author       = {A. V. Sarad and
                  Sankar Kuppan and
                  M. Vipin},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {A Time and Storage Efficient Solution to Remote File Integrity Check},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {120--125},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.30},
  doi          = {10.1109/IAS.2008.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/SaradSV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/SernaLM08,
  author       = {Jetzabel M. Serna and
                  Jesus Luna and
                  Manel Medina},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {Geolocation-Based Trust for Vanet's Privacy},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {287--290},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.21},
  doi          = {10.1109/IAS.2008.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/SernaLM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ShaikhJdLSL08,
  author       = {Riaz Ahmed Shaikh and
                  Hassan Jameel and
                  Brian J. d'Auriol and
                  Sungyoung Lee and
                  Young Jae Song and
                  Heejo Lee},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {Network Level Privacy for Wireless Sensor Networks},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {261--266},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.36},
  doi          = {10.1109/IAS.2008.36},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ShaikhJdLSL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/Shirali-ShahrezaS08,
  author       = {Sajad Shirali{-}Shahreza and
                  Mohammad Shirali{-}Shahreza},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {Steganography in Textiles},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {56--61},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.11},
  doi          = {10.1109/IAS.2008.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/Shirali-ShahrezaS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/Shirali-ShahrezaS08a,
  author       = {Mohammad Shirali{-}Shahreza and
                  Sajad Shirali{-}Shahreza},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {Persian/Arabic Unicode Text Steganography},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {62--66},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.12},
  doi          = {10.1109/IAS.2008.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/Shirali-ShahrezaS08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/SnaselPKA08,
  author       = {V{\'{a}}clav Sn{\'{a}}sel and
                  Jan Platos and
                  Pavel Kr{\"{o}}mer and
                  Ajith Abraham},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {Matrix Factorization Approach for Feature Deduction and Design of
                  Intrusion Detection Systems},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {172--179},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.53},
  doi          = {10.1109/IAS.2008.53},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/SnaselPKA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/SunithaA08,
  author       = {N. R. Sunitha and
                  B. B. Amberker},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {Forward-Secure Proxy Signature Scheme for Multiple Proxy Signers Using
                  Bellare-Miner Scheme with Proxy Revocation},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {73--78},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.55},
  doi          = {10.1109/IAS.2008.55},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/SunithaA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/TamberiMSB08,
  author       = {Francesco Tamberi and
                  Dario Maggiari and
                  Daniele Sgandurra and
                  Fabrizio Baiardi},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {Semantics-Driven Introspection in a Virtual Environment},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {299--302},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.17},
  doi          = {10.1109/IAS.2008.17},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/TamberiMSB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/WangC08,
  author       = {Xiaoming Wang and
                  Huoyan Chen},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {Threshold Proxy Signature Scheme with Strong Real-Time Efficiency},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {9--14},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.8},
  doi          = {10.1109/IAS.2008.8},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/WangC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/XiaoCZ08,
  author       = {Hannan Xiao and
                  Bruce Christianson and
                  Ying Zhang},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {A Purchase Protocol with Live Cardholder Authentication for Online
                  Credit Card Payment},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {15--20},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.44},
  doi          = {10.1109/IAS.2008.44},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/XiaoCZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ZainalMSA08,
  author       = {Anazida Zainal and
                  Mohd Aizaini Maarof and
                  Siti Mariyam Hj. Shamsuddin and
                  Ajith Abraham},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {Ensemble of One-Class Classifiers for Network Intrusion Detection
                  System},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {180--185},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.35},
  doi          = {10.1109/IAS.2008.35},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ZainalMSA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ZhuS08,
  author       = {Bonnie Zhu and
                  Shankar Sastry},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {Data Fusion Assurance for the Kalman Filter in Uncertain Networks},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {115--119},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.61},
  doi          = {10.1109/IAS.2008.61},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ZhuS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/IEEEias/2008,
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/4627042/proceeding},
  isbn         = {978-0-7695-3324-7},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics