


default search action
Security and Management 2008: Las Vegas, Nevada, USA
- Hamid R. Arabnia, Selim Aissi:

Proceedings of the 2008 International Conference on Security & Management, SAM 2008, Las Vegas, Nevada, USA, July 14-17, 2008. CSREA Press 2008, ISBN 1-60132-085-X
Cryptography
- Jian Huang, Jooheung Lee, Hao Li:

A Fast FPGA Implementation of Tate Pairing in Cryptography over Binary Field. Security and Management 2008: 3-9 - Behnam Bahrak, Taraneh Eghlidos, Mohammad Reza Aref:

Impossible Differential Cryptanalysis of Safer++. Security and Management 2008: 10-14 - Santosh Kumar Yadav:

Cryptographic Voter-Verifiability: Practical Approach. Security and Management 2008: 15-21 - Rigan Ap-apid:

Using a PC Camera to Generate Cryptographically Strong Random Numbers. Security and Management 2008: 22-27 - Mehrdad Sharbaf:

Exploration of Quantum Cryptography in Network Security: The Case Study of The DARPA Quantum Cryptography Network. Security and Management 2008: 28-33 - Krishna Subba Rao Pulugurta, Venkata Satyavathi Lakshmi Jagadamba Pulugurtha, Viswanadham Balla:

Invertibility Issues of Truncated Polynomials in NTRU Cryptosystems. Security and Management 2008: 34-37
Authentication
- Qikan Fang, Nandita Bhattacharjee:

Incremental Fingerprint Recognition Model for Distributed Authentication. Security and Management 2008: 41-47 - Hyungkyu Lee, Jongwook Han, Kyoil Chung:

How to Integrate Diverse Client Authentication Protocol with various authentication means. Security and Management 2008: 48-52 - Ben Salah Abderrazak:

Realization of Customer Authentication by SMS and a New Way to Pay in e-Commerce. Security and Management 2008: 53-57 - Masanori Nakakuni, Hiroshi Dozono, Eisuke Ito, Yoshiaki Kasahara:

A Method of Automatic User Authentication by Fulltime Monitoring of Keystroke Timings. Security and Management 2008: 58-63 - Senthilkumar Chinnappa Gounder Periaswamy, Dale R. Thompson, Jia Di:

Ownership Transfer of RFID Tags based on Electronic Fingerprint. Security and Management 2008: 64-67 - S. Giftson Selladurai, S. Aathi Lingam, J. Anish Jeo Blysis, Sylvia Lilly Jebarani:

E-mail Security and Authentication Using Captcha and DSA. Security and Management 2008: 68-74 - Jiafen Liu, Mingtian Zhou:

General Authentication Test. Security and Management 2008: 75-80 - Sarabjeet Singh Bedi, Harpreet Singh Sobti, Rabia Bano, Shekhar Verma:

Digital Watermarking Technique for Ownership Claim using Buyer Signature. Security and Management 2008: 81-86 - Ming-Jheng Li, Justie Su-tzu Juan:

Efficient Biometrics Remote User Authentication Scheme. Security and Management 2008: 87-90
Privacy and Passwords + Intrusion Detection and Firewalls
- Xianping Wu, Huy Hoang Ngo, Phu Dung Le, Balasubramaniam Srinivasan:

A Novel Group Key Management Scheme for Privacy Protection Sensitive Information Systems. Security and Management 2008: 93-99 - Chung S. Rhee, Shi Mei Jin Jin, Yong Zhen Li Li:

An Authorization Scheme Using partial ID for Privacy protection in RFID. Security and Management 2008: 100-105 - Geoff Skinner:

Making A CASE for PACE: Components of the Combined Authentication Scheme Encapsulation for a Privacy Augmented Collaborative Environment. Security and Management 2008: 106-112 - Mark Bedworth:

A Theory of Probabilistic One-Time Passwords. Security and Management 2008: 113-118 - Bogdan Hoanca, Kenrick J. Mock:

Password Entry Scheme Resistant to Eavesdropping. Security and Management 2008: 119-125 - Shashank Kaushik, Thomas Way:

Design of an Automatic Password Protection Mechanism for Digital Documents. Security and Management 2008: 126-132 - Mark Bedworth, Colin Allison:

Visual Applications of Probabilistic One-Time Passwords for Personal Authentication. Security and Management 2008: 133-138 - M. N. Doja, Naveen Kumar:

Virtual Password: Virtual Environment Based User Authentication. Security and Management 2008: 139-144 - Colin Allison, Mark Bedworth:

Experiments with a Visual Probabilistic One-Time Password Authentication System. Security and Management 2008: 145-148 - Boutheina A. Fessi, Mohamed Hamdi, Salah Benabdallah, Noureddine Boudriga:

Automated Intrusion Response System: Surveys and Analysis. Security and Management 2008: 149-155 - Olalekan Adeyinka:

IPSec Mechanism for Implementing VPN. Security and Management 2008: 156-160 - Seon Hwan Kim, Jang Su Park, Byoungchul Ahn:

Remote IP Addresses Based Intrusion Detection. Security and Management 2008: 161-164 - Jong-Hyuk Roh, Seunghun Jin:

Website Registration Using Link for Privacy. Security and Management 2008: 165-167
Information Security
- Wayne Jansen, Aurélien Delaitre:

Forensic Protocol Filtering of Phone Managers. Security and Management 2008: 171-177 - Heinz Lothar Grob, Gereon Strauch, Christian Buddendick:

Conceptual Modeling of Information Systems for Integrated IT-Risk and Security Management. Security and Management 2008: 178-184 - Jeong Ryou:

A Security Design for Information Sharing between Control System and Information System. Security and Management 2008: 185-189 - Ilze Murane:

Raising Awareness in Information Security: Everyone Should Participate. Security and Management 2008: 190-195 - Karthik Channakeshava, Kaigui Bian, Michael S. Hsiao, Jung-Min Park, Robert E. Crossler, France Bélanger, Payal Aggarwal, Janine S. Hiller:

On Providing Automatic Parental Consent over Information Collection from Children. Security and Management 2008: 196-202 - Benfano Soewito, Ning Weng:

Approximate Packet Pre-filtering to Accelerate Pattern Matching. Security and Management 2008: 203-209
Access Control and Signatures
- Masakatsu Nishigaki, Yoichi Shibata:

Physical Access Control with Biometric Keys. Security and Management 2008: 213-219 - Akira Yamada, Ayumu Kubota, Yutaka Miyake:

Service Independent Access Control Architecture for User Generated Content (UGC). Security and Management 2008: 220-226 - Harsh Kumar Verma, Kamalpreet Kaur, Raman Kumar:

Comparison of Threshold Proxy Signature Schemes. Security and Management 2008: 227-231 - Li Cao, Ye Ji, Lequan Min:

A Generalized Chaos Synchronization Based Digital Signature Scheme with Application. Security and Management 2008: 232-237 - Hoda Jannati, Javad Mohajeri, Mahmoud Salmasizadeh:

New Proxy Signature, Proxy Blind Signature and Blind Proxy Signature Based on the Okamoto Signature. Security and Management 2008: 238-242
Trust Models
- Patrick Henry Engebretson, Joshua J. Pauli, Kevin Streff:

Abstracting Parent Mitigations from the CAPEC Attack Pattern Dictionary. Security and Management 2008: 245-250 - Fen Yan, Yiqun Chen, Xinchun Yin, Hao Huang:

DDoS Attack Detection Based on Compensation Non-Parameter CUSUM Algorithm. Security and Management 2008: 251-257 - Zhiqian Xu, Hai Jiang:

A Framework of Decentralized PKI Key Management Based on Dynamic Trust. Security and Management 2008: 258-264
Systems and Implementations
- Heinz Lothar Grob, Jan Hermans, Gereon Strauch:

Design Principles of a Decision Support System for Critical Information Infrastructure Protection. Security and Management 2008: 267-273 - Chung-Han Chen:

TUVNL: An Experimental Network Security Lab for Research and Education. Security and Management 2008: 274-277 - Michaela Greiler, Peter Schartner:

Secure Resource Sharing in Ad hoc Networks. Security and Management 2008: 278-284 - Ghassan Jabbour, Daniel A. Menascé:

Securing Security Policies in Autonomic Computing Systems. Security and Management 2008: 285-291 - Khalid Abu Al-Saud, Hatim Mohd Tahir, Adel A. El-Zoghabi, Mohammad Saleh:

Performance Evaluation of Secured versus Non-Secured EIGRP Routing Protocol. Security and Management 2008: 292-297
Applications
- Robert F. Erbacher, Adele Cutler, Pranab Banerjee, Jim Marshall:

A Multi-Layered Approach to Botnet Detection. Security and Management 2008: 301-308 - Bahram Sadeghi Bigham, Sasha Chernin, Akram Madadi, Najmeh Madadi, Pedram Tavajoh:

Phishing Guard and Antivirus: A New Approach. Security and Management 2008: 309-312 - Ahmad Ghafarian:

Web Spoofing. Security and Management 2008: 313-317 - Robert F. Erbacher:

Steps for Improving Data Comprehension for Digital Security and Forensics. Security and Management 2008: 318-326 - Xiaowen Zhang, Li Shu, Ke Tang:

Multi-Map Orbit Hopping Chaotic Cipher. Security and Management 2008: 327-332 - Tobias Eggendorfer:

Combining the SMTP tar pit simulator with white listing. Security and Management 2008: 333-339 - Katalin Emese Bite:

Security at the Terminal Building at Airports. Security and Management 2008: 340-344 - Jun-woo Lee, Mi-kyung Han, Gil-heang Lee:

Considerations of the SLA management system. Security and Management 2008: 345-349 - Christoph Busch, Alexander Nouak:

3D Face Recognition for Unattended Border Control. Security and Management 2008: 350-356 - Scott Peterson, Ray Kresman:

A Client-Server Approach to Capture Web Browsing History. Security and Management 2008: 357-362 - Abdulrahman Alarifi:

Managing Diversity in Networks. Security and Management 2008: 363-373 - Vincent Zimmer:

System Isolation Beyond BIOS using the Unified Extensible Firmware Interface. Security and Management 2008: 374-380 - Ching-Ching Lee, Kamalendu Biswas:

Distributed Authorization Cache. Security and Management 2008: 381-386 - Md. Saifuddin Khalid, Md. Ruhul Amin:

Detection of Malicious User in Oracle 10g DBMS and Cost of Elimination. Security and Management 2008: 387-390 - Xiaowen Zhang:

The Multi-Map Orbit Hopping Mechanism. Security and Management 2008: 391-394
Emerging Technologies and Applications
- Yvonne Yao, Huiping Guo, Chengyu Sun:

An Improved Indexing Scheme for Range Queries. Security and Management 2008: 397-403 - Amir Stefan Abdul-Ahad, Baran Çürüklü, Waleed A. Mahmoud:

Robust Distance-Based Watermarking for Digital Image. Security and Management 2008: 404-409 - Keonwoo Kim, Dowon Hong, Jae-Cheol Ryou:

Forensic Data Acquisition from Cell Phones using JTAG Interface. Security and Management 2008: 410-414 - Xidong Wang, Charlie Gladden, Huirong Fu:

Secure Inter-Vehicle Vital Signal Communication via Short Dynamic Group Management. Security and Management 2008: 415-421 - Manuel Sánchez, Óscar Cánovas Reverte, Gabriel López:

Support for multiple federation technologies in a Single Sign On architecture. Security and Management 2008: 422-427 - Phillip G. Bradford, Daniel A. Ray:

Requirements for Digital Forensics Investigation Domain-Specific Languages. Security and Management 2008: 428-434
Algorithms and Protocols
- Anthony Weitekamp, Dulal C. Kar, Mario A. L. Garcia, George Tintera:

Synchronous Key Generation from Chaotic Systems. Security and Management 2008: 437-442 - Poonam Garg, Atul Garg:

Memetic & Genetic Algorithms: A Comparison between two approaches for the cryptanalysis of Simplified Data Encryption Standard algorithm. Security and Management 2008: 443-448 - Kiavash Bahreini:

Encryption and Decryption of Bitmap Images via Blowfish and Pseudo Triple DES Block Cipher Algorithms in Distributed Systems. Security and Management 2008: 449-455 - Shakir M. Hussain, Hussein Al-Bahadili:

DES Enhancement Using Key-Based Randomized Initial Permutation. Security and Management 2008: 456-459 - Mohammad Ibrahim Al-qudah Doa:

New S-box Design of Advance Encryption Standard, AES. Security and Management 2008: 460-465 - Mohamed K. Watfa, Marwa El-Ghali, Hiba Halabi:

A Scalable Security Protocol for Wireless Sensor Networks. Security and Management 2008: 466-472
Special Track on Applied Cryptology and Network Security
- Billy Bob Brumley:

Implementing Cryptography for Packet Level Authentication. Security and Management 2008: 475-480 - Sunghyuck Hong, Junghoon An:

Secure Authentication in Virtual Community by Using Media Access Control address (MAC). Security and Management 2008: 481-485 - Maryam Rajabzadeh Asaar, Javad Mohajeri, Mahmoud Salmasizadeh:

Security Modification for the Hwang-Wen-Hwang's E-voting Scheme. Security and Management 2008: 486-490 - Emre Celebi, Mesut Gozutok, Levent Ertaul:

Implementations of Montgomery Multiplication Algorithms in Machine Languages. Security and Management 2008: 491-497 - Levent Ertaul, Johan H. Yang:

Implementation of Domingo Ferrer's a New Privacy Homomorphism (DF a New PH) in Securing Wireless Sensor Networks (WSN). Security and Management 2008: 498-504 - Kevin Daimi, Ya-Chin Hsu, Yu-Ping Lin, Lingyun Zheng:

A Cryptographic Protocol for E-Voting Systems. Security and Management 2008: 505-513 - Esen Akkemik, Orhun Kara:

Real Time Cryptanalysis of Unsystematic Cipher. Security and Management 2008: 514-520
Developing Information Security Applications for Adversarial Environments
- Oleg Epelbaum, Afrand Agah, Mehran Asadi:

A Secure Online Chat System. Security and Management 2008: 523-531 - Stanley Perli, Mehran Asadi, Afrand Agah:

Developing Applications for Lego Robots Using Multiple Platforms. Security and Management 2008: 532-537 - Mehran Asadi, Manfred Huber:

Automatic Formation of Abstract State Space Representations for Reinforcement Learning Agents Agents with Hierarchical Skill Sets. Security and Management 2008: 538-543
Identity Theft Prevention - Privacy Preserving Protection of Digital Identity
- Seung-Hyun Kim, Seunghun Jin:

Decision Assistant Model for the Identity Selector in User-Centric Idm. Security and Management 2008: 547-554 - Danfeng Yao:

An Ad Hoc Trust Inference Model for Flexible and Controlled Information Sharing. Security and Management 2008: 555-561
Late Papers
- Yuhong Dong, Bing Wu:

Web Intrusion Detection Using a Graph-based Sequence Learning Algorithm. Security and Management 2008: 565-570 - Rabia Jafri, Hamid R. Arabnia, Kathy J. Simpson:

An Integrated Face-Gait System for Automatic Recognition of Humans. Security and Management 2008: 571-581 - Rahat Qureshi, Min Chang, Hesiri Weerasinghe, Huirong Fu:

Intrusion Detection System for Wireless Sensor Networks. Security and Management 2008: 582-585 - Andrzej Bialas:

Ontology-based Approach to the Common Criteria Compliant IT Security Development. Security and Management 2008: 586-592 - Andrew Woodward, Peter Hannay:

Forensic Implications of Using the Firewire Memory Exploit with Microsoft Windows XP. Security and Management 2008: 593-597 - Patricia A. H. Williams:

Is There an Ideal Forensic Process?. Security and Management 2008: 598-603 - Craig Valli, Andy Jones:

A Study into the Forensic Recoverability of Data from 2nd Hand Blackberry Devices: World-Class Security, Foiled by Humans. Security and Management 2008: 604-607 - Andrew Woodward:

What Artifacts do Current BitTorrent Clients Leave Behind?. Security and Management 2008: 608-613 - Justin Brown, Greg Baatard:

Integrating Forensics Capabilities into Web Applications: Teaching Students the Why and How. Security and Management 2008: 614-619 - Peter Hannay, Andrew Woodward:

Cold Boot Memory Acquisition: An Investigation into Memory Freezing and Data Retention Claims. Security and Management 2008: 620-622 - Eltayeb S. Abuelyaman, Abdul-Aziz S. Alsehibani:

A Comparison Between Residues of Prime Numbers and Arithmetic Modulo Powers of Two for S-Box Implementation. Security and Management 2008: 623-630 - Ngoc-Bao Tran, Dinh-Thuc Nguyen:

Matrix Cipher and Its Application in Computer Security. Security and Management 2008: 631-637 - Parman Sukarno, Nandita Bhattacharjee:

Authentication Architecture Based on Crypto-Biometric Systems. Security and Management 2008: 638-644 - Sofien Beji, Nabil El-Kadhi:

Towards a Mobile Applications Security Approach. Security and Management 2008: 645-654 - Maria Jesús Poza, Luis A. Puente, Belén Ruíz, Juan Miguel Gómez:

Identity Authentication Services. Security and Management 2008: 655-659 - Maria Jesús Poza, Luis A. Puente, Diego Carrero, Juan Miguel Gómez:

A Knowledge-Based Distributed Biometric Authentication Entity Mechanism. Security and Management 2008: 660-662 - Charlie Obimbo:

An Adaptive Coding Algorithm for Secret Transmission of Information. Security and Management 2008: 663-668 - Mohammed Misbahuddin, P. Premchand, A. Govardhan:

An Image-Based Website User Authentication Mechanism Using Smart Card. Security and Management 2008: 669-674 - Pedro Ashidani, Jamil Barbar, Luis Faina, Italo Tiago da Cunha:

Framework Proposal for Sender's Authentication. Security and Management 2008: 675-679

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














