


default search action
ISPEC 2005: Singapore
- Robert H. Deng

, Feng Bao, HweeHwa Pang
, Jianying Zhou:
Information Security Practice and Experience, First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings. Lecture Notes in Computer Science 3439, Springer 2005, ISBN 3-540-25584-2
Network Security
- Stephan Riebach, Erwin P. Rathgeb, Birger Tödtmann:

Risk Assessment of Production Networks Using Honeynets - Some Practical Experience. 1-12 - Philip Robinson, Christian Schaefer, Thomas Walter:

POSSET - Policy-Driven Secure Session Transfer. 13-24 - Debabrata Nayak, Deepak B. Phatak, Ved Prakash Gulati:

Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Method: A Novel Approach. 25-35 - Zhongchao Yu, Chuk-Yang Seng, Tao Jiang, Xue Wu, William A. Arbaugh:

Robust Routing in Malicious Environment for Ad Hoc Networks. 36-47
Cryptographic Techniques I
- Patrick P. Tsang, Victor K. Wei:

Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation. 48-60 - Marcel Fernandez, Miguel Soriano, Josep Cotrina Navau:

Tracing Traitors by Guessing Secrets. The q-Ary Case. 61-73 - Heejin Park, Sang-Kil Park, Ki-Ryong Kwon, Dong Kyue Kim:

Probabilistic Analyses on Finding Optimal Combinations of Primality Tests in Real Applications. 74-84 - Mustapha Hedabou, Pierre Pinel, Lucien Bénéteau:

Countermeasures for Preventing Comb Method Against SCA Attacks. 85-96
Secure Architecture I
- Stelios Sidiroglou, John Ioannidis, Angelos D. Keromytis, Salvatore J. Stolfo:

An Email Worm Vaccine Architecture. 97-108 - Bin Liang, Heng Liu, Wenchang Shi, Yanjun Wu:

Enforcing the Principle of Least Privilege with a State-Based Privilege Control Model. 109-120 - Yanjun Wu, Wenchang Shi, Hongliang Liang, Qinghua Shang, Chunyang Yuan, Bin Liang:

Security On-demand Architecture with Multiple Modules Support. 121-131 - Hågen Hasle, Yngve Kristiansen, Ketil Kintel, Einar Snekkenes:

Measuring Resistance to Social Engineering. 132-143
Access Control
- Frode Hansen, Vladimir A. Oleshchuk:

Conformance Checking of RBAC Policy and its Implementation. 144-155 - Kung Chen, Chih-Mao Huang:

A Practical Aspect Framework for Enforcing Fine-Grained Access Control in Web Applications. 156-167 - Xu Liao, Li Zhang, Stephen Chi-fai Chan:

A Task-Oriented Access Control Model for WfMS. 168-177
Intrusion Detection
- Zonghua Zhang, Hong Shen:

A Brief Observation-Centric Analysis on Anomaly-Based Intrusion Detection. 178-191 - Rasool Jalili, Fatemeh Imani-Mehr, Morteza Amini, Hamid Reza Shahriari

:
Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks. 192-203 - André Adelsbach, Sebastian Gajek, Jörg Schwenk:

Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures. 204-216 - Zhuowei Li, Amitabha Das, Sabu Emmanuel:

Model Redundancy vs. Intrusion Detection. 217-229
Applications and Case Studies
- Kerstin Lemke, Ahmad-Reza Sadeghi, Christian Stüble:

An Open Approach for Designing Secure Electronic Immobilizers. 230-242 - Mikael Linden, Inka Vilpola:

An Empirical Study on the Usability of Logout in a Single Sign-on System. 243-254 - André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi:

Secure Software Delivery and Installation in Embedded Systems. 255-267 - Joseph K. Liu, Duncan S. Wong:

A Restricted Multi-show Credential System and Its Application on E-Voting. 268-279
Secure Architecture II
- Hany A. Samuel, Yasser H. Dakroury, Hussein I. Shahein:

Recard: Using Recommendation Cards Approach for Building Trust in Peer-to-Peer Networks. 280-292 - Wenbao Jiang, Chen Li, Shuang Hao, Yiqi Dai:

Using Trust for Restricted Delegation in Grid Environments. 293-301 - Tao Zhang, Mingzeng Hu, Xiao-chun Yun, Yongzheng Zhang:

Computer Vulnerability Evaluation Using Fault Tree Analysis. 302-313 - Xiaoqin Huang, Lin Chen, Linpeng Huang, Minglu Li:

An Identity-Based Grid Security Infrastructure Model. 314-325
Data Security
- Ahmad-Reza Sadeghi, Christian Stüble:

Towards Multilateral-Secure DRM Platforms. 326-337 - Chin-Chen Chang, Chun-Sen Tseng, Chia-Chen Lin

:
Hiding Data in Binary Images. 338-349 - Yanmei Fang, Limin Gu, Jiwu Huang:

Performance Analysis of CDMA-Based Watermarking with Quantization Scheme. 350-361 - Fangyong Hou, Zhiying Wang, Kui Dai, Yun Liu:

Protecting Mass Data Basing on Small Trusted Agent. 362-373
Cryptographic Techniques II
- Zuowen Tan, Zhuojun Liu, Mingsheng Wang:

On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes. 374-385 - Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo

:
Token-Controlled Public Key Encryption. 386-397 - Marcel Fernandez, Miguel Soriano, Josep Cotrina Navau:

A New Class of Codes for Fingerprinting Schemes. 398-409 - Qianhong Wu, Bo Qin, Changjie Wang, Xiaofeng Chen, Yumin Wang:

t-Out-of-n String/Bit Oblivious Transfers Revisited. 410-421

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














