


Остановите войну!
for scientists:


default search action
Security and Management 2008: Las Vegas, Nevada, USA
- Hamid R. Arabnia, Selim Aissi:
Proceedings of the 2008 International Conference on Security & Management, SAM 2008, Las Vegas, Nevada, USA, July 14-17, 2008. CSREA Press 2008, ISBN 1-60132-085-X
Cryptography
- Jian Huang, Jooheung Lee, Hao Li:
A Fast FPGA Implementation of Tate Pairing in Cryptography over Binary Field. Security and Management 2008: 3-9 - Behnam Bahrak, Taraneh Eghlidos, Mohammad Reza Aref:
Impossible Differential Cryptanalysis of Safer++. Security and Management 2008: 10-14 - Santosh Kumar Yadav:
Cryptographic Voter-Verifiability: Practical Approach. Security and Management 2008: 15-21 - Rigan Ap-apid:
Using a PC Camera to Generate Cryptographically Strong Random Numbers. Security and Management 2008: 22-27 - Mehrdad Sharbaf:
Exploration of Quantum Cryptography in Network Security: The Case Study of The DARPA Quantum Cryptography Network. Security and Management 2008: 28-33 - Krishna Subba Rao Pulugurta, Venkata Satyavathi Lakshmi Jagadamba Pulugurtha, Viswanadham Balla:
Invertibility Issues of Truncated Polynomials in NTRU Cryptosystems. Security and Management 2008: 34-37
Authentication
- Qikan Fang, Nandita Bhattacharjee:
Incremental Fingerprint Recognition Model for Distributed Authentication. Security and Management 2008: 41-47 - Hyungkyu Lee, Jongwook Han, Kyoil Chung:
How to Integrate Diverse Client Authentication Protocol with various authentication means. Security and Management 2008: 48-52 - Ben Salah Abderrazak:
Realization of Customer Authentication by SMS and a New Way to Pay in e-Commerce. Security and Management 2008: 53-57 - Masanori Nakakuni, Hiroshi Dozono, Eisuke Ito, Yoshiaki Kasahara:
A Method of Automatic User Authentication by Fulltime Monitoring of Keystroke Timings. Security and Management 2008: 58-63 - Senthilkumar Chinnappa Gounder Periaswamy, Dale R. Thompson, Jia Di:
Ownership Transfer of RFID Tags based on Electronic Fingerprint. Security and Management 2008: 64-67 - S. Giftson Selladurai, S. Aathi Lingam, J. Anish Jeo Blysis, Sylvia Lilly Jebarani:
E-mail Security and Authentication Using Captcha and DSA. Security and Management 2008: 68-74 - Jiafen Liu, Mingtian Zhou:
General Authentication Test. Security and Management 2008: 75-80 - Sarabjeet Singh Bedi, Harpreet Singh Sobti, Rabia Bano, Shekhar Verma:
Digital Watermarking Technique for Ownership Claim using Buyer Signature. Security and Management 2008: 81-86 - Ming-Jheng Li, Justie Su-tzu Juan:
Efficient Biometrics Remote User Authentication Scheme. Security and Management 2008: 87-90
Privacy and Passwords + Intrusion Detection and Firewalls
- Xianping Wu, Huy Hoang Ngo, Phu Dung Le, Balasubramaniam Srinivasan:
A Novel Group Key Management Scheme for Privacy Protection Sensitive Information Systems. Security and Management 2008: 93-99 - Chung S. Rhee, Shi Mei Jin Jin, Yong Zhen Li Li:
An Authorization Scheme Using partial ID for Privacy protection in RFID. Security and Management 2008: 100-105 - Geoff Skinner:
Making A CASE for PACE: Components of the Combined Authentication Scheme Encapsulation for a Privacy Augmented Collaborative Environment. Security and Management 2008: 106-112 - Mark Bedworth:
A Theory of Probabilistic One-Time Passwords. Security and Management 2008: 113-118 - Bogdan Hoanca, Kenrick J. Mock:
Password Entry Scheme Resistant to Eavesdropping. Security and Management 2008: 119-125 - Shashank Kaushik, Thomas Way:
Design of an Automatic Password Protection Mechanism for Digital Documents. Security and Management 2008: 126-132 - Mark Bedworth, Colin Allison:
Visual Applications of Probabilistic One-Time Passwords for Personal Authentication. Security and Management 2008: 133-138 - M. N. Doja, Naveen Kumar:
Virtual Password: Virtual Environment Based User Authentication. Security and Management 2008: 139-144 - Colin Allison, Mark Bedworth:
Experiments with a Visual Probabilistic One-Time Password Authentication System. Security and Management 2008: 145-148 - Boutheina A. Fessi, Mohamed Hamdi, Salah Benabdallah, Noureddine Boudriga:
Automated Intrusion Response System: Surveys and Analysis. Security and Management 2008: 149-155 - Olalekan Adeyinka:
IPSec Mechanism for Implementing VPN. Security and Management 2008: 156-160 - Seon Hwan Kim, Jang Su Park, Byoungchul Ahn:
Remote IP Addresses Based Intrusion Detection. Security and Management 2008: 161-164 - Jong-Hyuk Roh, Seunghun Jin:
Website Registration Using Link for Privacy. Security and Management 2008: 165-167
Information Security
- Wayne Jansen, Aurélien Delaitre:
Forensic Protocol Filtering of Phone Managers. Security and Management 2008: 171-177 - Heinz Lothar Grob, Gereon Strauch, Christian Buddendick:
Conceptual Modeling of Information Systems for Integrated IT-Risk and Security Management. Security and Management 2008: 178-184 - Jeong Ryou:
A Security Design for Information Sharing between Control System and Information System. Security and Management 2008: 185-189 - Ilze Murane:
Raising Awareness in Information Security: Everyone Should Participate. Security and Management 2008: 190-195 - Karthik Channakeshava, Kaigui Bian, Michael S. Hsiao, Jung-Min Park, Robert E. Crossler, France Bélanger, Payal Aggarwal, Janine S. Hiller:
On Providing Automatic Parental Consent over Information Collection from Children. Security and Management 2008: 196-202 - Benfano Soewito, Ning Weng:
Approximate Packet Pre-filtering to Accelerate Pattern Matching. Security and Management 2008: 203-209
Access Control and Signatures
- Masakatsu Nishigaki, Yoichi Shibata:
Physical Access Control with Biometric Keys. Security and Management 2008: 213-219 - Akira Yamada, Ayumu Kubota, Yutaka Miyake:
Service Independent Access Control Architecture for User Generated Content (UGC). Security and Management 2008: 220-226 - Harsh Kumar Verma, Kamalpreet Kaur, Raman Kumar:
Comparison of Threshold Proxy Signature Schemes. Security and Management 2008: 227-231 - Li Cao, Ye Ji, Lequan Min:
A Generalized Chaos Synchronization Based Digital Signature Scheme with Application. Security and Management 2008: 232-237 - Hoda Jannati, Javad Mohajeri, Mahmoud Salmasizadeh:
New Proxy Signature, Proxy Blind Signature and Blind Proxy Signature Based on the Okamoto Signature. Security and Management 2008: 238-242
Trust Models
- Patrick Henry Engebretson, Joshua J. Pauli, Kevin Streff:
Abstracting Parent Mitigations from the CAPEC Attack Pattern Dictionary. Security and Management 2008: 245-250 - Fen Yan, Yiqun Chen, Xinchun Yin, Hao Huang:
DDoS Attack Detection Based on Compensation Non-Parameter CUSUM Algorithm. Security and Management 2008: 251-257 - Zhiqian Xu, Hai Jiang:
A Framework of Decentralized PKI Key Management Based on Dynamic Trust. Security and Management 2008: 258-264
Systems and Implementations
- Heinz Lothar Grob, Jan Hermans, Gereon Strauch:
Design Principles of a Decision Support System for Critical Information Infrastructure Protection. Security and Management 2008: 267-273 - Chung-Han Chen:
TUVNL: An Experimental Network Security Lab for Research and Education. Security and Management 2008: 274-277 - Michaela Greiler, Peter Schartner:
Secure Resource Sharing in Ad hoc Networks. Security and Management 2008: 278-284 - Ghassan Jabbour, Daniel A. Menascé:
Securing Security Policies in Autonomic Computing Systems. Security and Management 2008: 285-291 - Khalid Abu Al-Saud, Hatim Mohd Tahir, Adel A. El-Zoghabi, Mohammad Saleh:
Performance Evaluation of Secured versus Non-Secured EIGRP Routing Protocol. Security and Management 2008: 292-297
Applications
- Robert F. Erbacher, Adele Cutler, Pranab Banerjee, Jim Marshall:
A Multi-Layered Approach to Botnet Detection. Security and Management 2008: 301-308 - Bahram Sadeghi Bigham, Sasha Chernin, Akram Madadi, Najmeh Madadi, Pedram Tavajoh:
Phishing Guard and Antivirus: A New Approach. Security and Management 2008: 309-312 - Ahmad Ghafarian:
Web Spoofing. Security and Management 2008: 313-317 - Robert F. Erbacher:
Steps for Improving Data Comprehension for Digital Security and Forensics. Security and Management 2008: 318-326 - Xiaowen Zhang, Li Shu, Ke Tang:
Multi-Map Orbit Hopping Chaotic Cipher. Security and Management 2008: 327-332 - Tobias Eggendorfer:
Combining the SMTP tar pit simulator with white listing. Security and Management 2008: 333-339 - Katalin Emese Bite:
Security at the Terminal Building at Airports. Security and Management 2008: 340-344 - Jun-woo Lee, Mi-kyung Han, Gil-heang Lee:
Considerations of the SLA management system. Security and Management 2008: 345-349 - Christoph Busch, Alexander Nouak:
3D Face Recognition for Unattended Border Control. Security and Management 2008: 350-356 - Scott Peterson, Ray Kresman:
A Client-Server Approach to Capture Web Browsing History. Security and Management 2008: 357-362 - Abdulrahman Alarifi:
Managing Diversity in Networks. Security and Management 2008: 363-373 - Vincent Zimmer:
System Isolation Beyond BIOS using the Unified Extensible Firmware Interface. Security and Management 2008: 374-380 - Ching-Ching Lee, Kamalendu Biswas:
Distributed Authorization Cache. Security and Management 2008: 381-386 - Md. Saifuddin Khalid, Md. Ruhul Amin:
Detection of Malicious User in Oracle 10g DBMS and Cost of Elimination. Security and Management 2008: 387-390 - Xiaowen Zhang:
The Multi-Map Orbit Hopping Mechanism. Security and Management 2008: 391-394
Emerging Technologies and Applications
- Yvonne Yao, Huiping Guo, Chengyu Sun:
An Improved Indexing Scheme for Range Queries. Security and Management 2008: 397-403 - Amir Stefan Abdul-Ahad, Baran Çürüklü, Waleed A. Mahmoud:
Robust Distance-Based Watermarking for Digital Image. Security and Management 2008: 404-409 - Keonwoo Kim, Dowon Hong, Jae-Cheol Ryou:
Forensic Data Acquisition from Cell Phones using JTAG Interface. Security and Management 2008: 410-414 - Xidong Wang, Charlie Gladden, Huirong Fu:
Secure Inter-Vehicle Vital Signal Communication via Short Dynamic Group Management. Security and Management 2008: 415-421 - Manuel Sánchez, Óscar Cánovas Reverte, Gabriel López:
Support for multiple federation technologies in a Single Sign On architecture. Security and Management 2008: 422-427 - Phillip Bradford, Daniel Ray:
Requirements for Digital Forensics Investigation Domain-Specific Languages. Security and Management 2008: 428-434
Algorithms and Protocols
- Anthony Weitekamp, Dulal Kar, Mario Garcia, George Tintera:
Synchronous Key Generation from Chaotic Systems. Security and Management 2008: 437-442 - Poonam Garg, Atul Garg:
Memetic & Genetic Algorithms: A Comparison between two approaches for the cryptanalysis of Simplified Data Encryption Standard algorithm. Security and Management 2008: 443-448 - Kiavash Bahreini:
Encryption and Decryption of Bitmap Images via Blowfish and Pseudo Triple DES Block Cipher Algorithms in Distributed Systems. Security and Management 2008: 449-455 - Shakir M. Hussain, Hussein Al-Bahadili:
DES Enhancement Using Key-Based Randomized Initial Permutation. Security and Management 2008: 456-459 - Mohammad Ibrahim Al-qudah Doa:
New S-box Design of Advance Encryption Standard, AES. Security and Management 2008: 460-465 - Mohamed K. Watfa, Marwa El-Ghali, Hiba Halabi:
A Scalable Security Protocol for Wireless Sensor Networks. Security and Management 2008: 466-472
Special Track on Applied Cryptology and Network Security
- Billy Bob Brumley:
Implementing Cryptography for Packet Level Authentication. Security and Management 2008: 475-480 - Sunghyuck Hong, Junghoon An:
Secure Authentication in Virtual Community by Using Media Access Control address (MAC). Security and Management 2008: 481-485 - Maryam Rajabzadeh Asaar, Javad Mohajeri, Mahmoud Salmasizadeh:
Security Modification for the Hwang-Wen-Hwang's E-voting Scheme. Security and Management 2008: 486-490 - Emre Celebi, Mesut Gozutok, Levent Ertaul:
Implementations of Montgomery Multiplication Algorithms in Machine Languages. Security and Management 2008: 491-497 - Levent Ertaul, Johan H. Yang:
Implementation of Domingo Ferrer's a New Privacy Homomorphism (DF a New PH) in Securing Wireless Sensor Networks (WSN). Security and Management 2008: 498-504 - Kevin Daimi, Ya-Chin Hsu, Yu-Ping Lin, Lingyun Zheng:
A Cryptographic Protocol for E-Voting Systems. Security and Management 2008: 505-513 - Esen Akkemik, Orhun Kara:
Real Time Cryptanalysis of Unsystematic Cipher. Security and Management 2008: 514-520
Developing Information Security Applications for Adversarial Environments
- Oleg Epelbaum, Afrand Agah, Mehran Asadi:
A Secure Online Chat System. Security and Management 2008: 523-531 - Stanley Perli, Mehran Asadi, Afrand Agah:
Developing Applications for Lego Robots Using Multiple Platforms. Security and Management 2008: 532-537 - Mehran Asadi, Manfred Huber:
Automatic Formation of Abstract State Space Representations for Reinforcement Learning Agents Agents with Hierarchical Skill Sets. Security and Management 2008: 538-543
Identity Theft Prevention - Privacy Preserving Protection of Digital Identity
- Seung-Hyun Kim, Seunghun Jin:
Decision Assistant Model for the Identity Selector in User-Centric Idm. Security and Management 2008: 547-554 - Danfeng Yao:
An Ad Hoc Trust Inference Model for Flexible and Controlled Information Sharing. Security and Management 2008: 555-561
Late Papers
- Yuhong Dong, Bing Wu:
Web Intrusion Detection Using a Graph-based Sequence Learning Algorithm. Security and Management 2008: 565-570 - Rabia Jafri, Hamid R. Arabnia, Kathy J. Simpson:
An Integrated Face-Gait System for Automatic Recognition of Humans. Security and Management 2008: 571-581 - Rahat Qureshi, Min Chang, Hesiri Weerasinghe, Huirong Fu:
Intrusion Detection System for Wireless Sensor Networks. Security and Management 2008: 582-585 - Andrzej Bialas:
Ontology-based Approach to the Common Criteria Compliant IT Security Development. Security and Management 2008: 586-592 - Andrew Woodward, Peter Hannay:
Forensic Implications of Using the Firewire Memory Exploit with Microsoft Windows XP. Security and Management 2008: 593-597 - Patricia A. H. Williams:
Is There an Ideal Forensic Process?. Security and Management 2008: 598-603 - Craig Valli, Andy Jones:
A Study into the Forensic Recoverability of Data from 2nd Hand Blackberry Devices: World-Class Security, Foiled by Humans. Security and Management 2008: 604-607 - Andrew Woodward:
What Artifacts do Current BitTorrent Clients Leave Behind?. Security and Management 2008: 608-613 - Justin Brown, Greg Baatard:
Integrating Forensics Capabilities into Web Applications: Teaching Students the Why and How. Security and Management 2008: 614-619 - Peter Hannay, Andrew Woodward:
Cold Boot Memory Acquisition: An Investigation into Memory Freezing and Data Retention Claims. Security and Management 2008: 620-622 - Eltayeb S. Abuelyaman, Abdul-Aziz S. Alsehibani:
A Comparison Between Residues of Prime Numbers and Arithmetic Modulo Powers of Two for S-Box Implementation. Security and Management 2008: 623-630 - Ngoc-Bao Tran, Dinh-Thuc Nguyen:
Matrix Cipher and Its Application in Computer Security. Security and Management 2008: 631-637 - Parman Sukarno, Nandita Bhattacharjee:
Authentication Architecture Based on Crypto-Biometric Systems. Security and Management 2008: 638-644 - Sofien Beji, Nabil El-Kadhi:
Towards a Mobile Applications Security Approach. Security and Management 2008: 645-654 - Maria Jesús Poza, Luis A. Puente, Belén Ruíz, Juan Miguel Gómez:
Identity Authentication Services. Security and Management 2008: 655-659 - Maria Jesús Poza, Luis A. Puente, Diego Carrero, Juan Miguel Gómez:
A Knowledge-Based Distributed Biometric Authentication Entity Mechanism. Security and Management 2008: 660-662 - Charlie Obimbo:
An Adaptive Coding Algorithm for Secret Transmission of Information. Security and Management 2008: 663-668 - Mohammed Misbahuddin, P. Premchand, A. Govardhan:
An Image-Based Website User Authentication Mechanism Using Smart Card. Security and Management 2008: 669-674 - Pedro Ashidani, Jamil Barbar, Luis Faina, Italo Tiago da Cunha:
Framework Proposal for Sender's Authentication. Security and Management 2008: 675-679

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.