


default search action
MMM-ACNS 2003: St. Petersburg, Russia
- Vladimir Gorodetsky, Leonard J. Popyack, Victor A. Skormin:

Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings. Lecture Notes in Computer Science 2776, Springer 2003, ISBN 3-540-40797-9
Invited Papers
- Kulesh Shanmugasundaram, Nasir D. Memon

, Anubhav Savant, Hervé Brönnimann:
ForNet: A Distributed Forensics Network. 1-16 - Ravi S. Sandhu, Jaehong Park:

Usage Control: A Vision for Next Generation Access Control. 17-31 - Thumrongsak Kosiyatrakul, Susan Older, Polar Humenn

, Shiu-Kai Chin:
Implementing a Calculus for Distributed Access Control in Higher Order Logic and HOL. 32-46 - Anatol Slissenko:

Complexity Problems in the Analysis of Information Systems Security. 47-56 - Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu:

A Behavior-Based Approach to Securing Email Systems. 57-81 - Shambhu J. Upadhyaya:

Real-Time Intrusion Detection with Emphasis on Insider Attacks. 82-85
Mathematical Models and Architectures for Computer Network Security
- Stefano Bistarelli

, Iliano Cervesato, Gabriele Lenzini, Fabio Martinelli:
Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols. 86-99 - Lazaros Gymnopoulos

, Stelios Dritsas, Stefanos Gritzalis, Costas Lambrinoudakis
:
GRID Security Review. 100-111 - Spyros Kokolakis, Costas Lambrinoudakis

, Dimitris Gritzalis:
A Knowledge-Based Repository Model for Security Policies Management. 112-121 - Fabio Martinelli:

Symbolic Partial Model Checking for Security Analysis. 122-134 - Michael Smirnov:

Rule-Based Systems Security Model. 135-146 - Peter D. Zegzhda

, Dmitry P. Zegzhda, Maxim O. Kalinin:
Logical Resolving for Security Evaluation. 147-156
Intrusion Detection
- Salem Benferhat, Fabien Autrel, Frédéric Cuppens:

Enhanced Correlation in an Intrusion Detection Process. 157-170 - John Bigham, David Gamez

, Ning Lu:
Safeguarding SCADA Systems with Anomaly Detection. 171-182 - Igor V. Kotenko

, Evgeny Man'kov:
Experiments with Simulation of Attacks against Computer Networks. 183-194 - Victor A. Skormin, Douglas H. Summerville, James Moronski:

Detecting Malicious Codes by the Presence of Their "Gene of Self-replication". 195-205 - Kyubum Wee, Byungeun Moon:

Automatic Generation of Finite State Automata for Detecting Intrusions Using System Call Sequences. 206-216
Public Key Distribution, Authentication, Access Control
- Steve Barker:

Distributed Access Control: A Logic-Based Approach. 217-228 - Dae Hyun Yum, Jae Eun Kang, Pil Joong Lee:

Advanced Certificate Status Protocol. 229-240 - Antonio Lain, Viacheslav Borisov:

Key History Tree: Efficient Group Key Management with Off-Line Members. 241-254 - Jose L. Muñoz, Jordi Forné

, Oscar Esparza
, Miguel Soriano:
A Certificate Status Checking Protocol for the Authenticated Dictionary. 255-266 - Ruben Wolf, Markus Schneider:

Context-Dependent Access Control for Web-Based Collaboration Environments with Role-based Approach. 267-278
Cryptography
- Mohamed Al-Ibrahim

:
A Signcryption Scheme Based on Secret Sharing Technique. 279-288 - Pino Caballero-Gil

, Candelaria Hernández-Goya:
A Zero-Knowledge Identification Scheme. 289-297 - Youngdai Ko, Deukjo Hong, Seokhie Hong, Sangjin Lee, Jongin Lim:

Linear Cryptanalysis of SPECTR-H64 with Higher Order Differential Property. 298-307 - Valery I. Korzhik, Viktor Yakovlev

, Alexander Sinuk:
Achievability of the Key-Capacity in a Scenario of Key Sharing. 308-315 - Nick A. Moldovyan:

On Cipher Design Based on Switchable Controlled Operations. 316-327 - Alexander Rostovtsev, Elena Makhovenko:

Elliptic Curve Point Multiplication. 328-336 - Nicolas Sklavos, Alexander A. Moldovyan, Odysseas G. Koufopavlou:

Encryption and Data Dependent Permutations: Implementation Cost and Performance Evaluation. 337-348
Steganography
- Vladimir Gorodetsky, Vladimir Samoilov:

Simulation-Based Exploration of SVD-Based Technique for Hidden Communication by Image Steganography Channel. 349-359 - Kaiwen Zhang, Shuozhong Wang, Xinpeng Zhang:

Detection and Removal of Hidden Data in Images Embedded with Quantization Index Modulation. 360-370 - Valery I. Korzhik, Guillermo Morales-Luna, Irina Marakova, Carlos Patiño-Ruvalcaba:

Digital Watermarking under a Filtering and Additive Noise Attack Condition. 371-382 - Shuozhong Wang, Xinpeng Zhang, Kaiwen Zhang:

Data Hiding in Digital Audio by Frequency Domain Dithering. 383-394 - Xinpeng Zhang, Shuozhong Wang, Kaiwen Zhang:

Steganography with Least Histogram Abnormality. 395-406 - Xinpeng Zhang, Shuozhong Wang, Kaiwen Zhang:

Multi-bit Watermarking Scheme Based on Addition of Orthogonal Sequences. 407-418
Short Papers
- Mohamed Al-Ibrahim, Anton Cerný:

Authentication of Anycast Communication. 419-423 - Ruo Ando, Yoshiyasu Takefuji

:
Two-Stage Orthogonal Network Incident Detection for the Adaptive Coordination with SMTP Proxy. 424-427 - Alexander A. Grusho, Elena E. Timonina:

Construction of the Covert Channels. 428-431 - Lilian Mitrou, Konstantinos Moulinos:

Privacy and Data Protection in Electronic Communications. 432-435 - Hyun-Sung Kim, Sung-Ho Hwang:

Multiplier for Public-Key Cryptosystem Based on Cellular Automata. 436-439 - Sri Kumar, Vladimir Marbukh:

A Game Theoretic Approach to Analysis and Design of Survivable and Secure Systems and Protocols. 440-443 - Francisco J. Martín, Enric Plaza:

Alert Triage on the ROC. 444-448 - Nick D. Goots, Boris V. Izotov, Alexander A. Moldovyan, Nick A. Moldovyan:

Fast Ciphers for Cheap Hardware: Differential Analysis of SPECTR-H64. 449-452 - Yuri Melnikov, Alexander O. Tarakanov:

Immunocomputing Model of Intrusion Detection. 453-456 - Gustavo Santana, Leonid Sheremetov, Miguel Contreras:

Agent Platform Security Architecture. 457-460 - Taeshik Shon, Taewoo Noh, Jongsub Moon:

Support Vector Machine Based ICMP Covert Channel Attack Detection. 461-464 - Svetlana P. Sokolova, Ruslan S. Ivlev:

Computer Immunology System with Variable Configuration. 465-468

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














