:facetid:toc:\"db/conf/secrypt/secrypt2006.bht\"OK:facetid:toc:db/conf/secrypt/secrypt2006.bhtNajla ArfaouiFarah JemiliMontaceur ZaghdoudMohamed Ben AhmedComparative Study between Bayesian Network and Possibilistic Network in Intrusion Detection.SECRYPT24-312006Conference and Workshop Papersunavailableconf/secrypt/ArfaouiJZA06https://dblp.org/rec/conf/secrypt/ArfaouiJZA06URL#5783119Marianne AzerSherif El-KassasMagdy S. El-SoudaniUsing Attack Graphs in Ad Hoc Networks - For Intrusion Prediction Correlation and Detection.SECRYPT63-682006Conference and Workshop Papersunavailableconf/secrypt/AzerEE06https://dblp.org/rec/conf/secrypt/AzerEE06URL#5783120Les BarclayWireless Communications, a new Emphasis for Effective Use of the Radio Spectrum.SECRYPT2006Conference and Workshop Papersunavailableconf/secrypt/Barclay06https://dblp.org/rec/conf/secrypt/Barclay06URL#5783121Gregory V. BardA Challenging but Feasible Blockwise-Adaptive Chosen-Plaintext Attack on SSL.SECRYPT99-1092006Conference and Workshop Papersunavailableconf/secrypt/Bard06https://dblp.org/rec/conf/secrypt/Bard06URL#5783122Dumitru Dan BurdescuLiana StanescuAn Algorithm for Authentication of Digital Images.SECRYPT303-3082006Conference and Workshop Papersunavailableconf/secrypt/BurdescuS06https://dblp.org/rec/conf/secrypt/BurdescuS06URL#5783123Chun-Hua ChenGwoboa HorngMore Robust Private Information.SECRYPT297-3022006Conference and Workshop Papersunavailableconf/secrypt/ChenH06https://dblp.org/rec/conf/secrypt/ChenH06URL#5783124Nathalie DagornIntrusion Detection for Web Applications (Short Version).SECRYPT32-392006Conference and Workshop Papersunavailableconf/secrypt/Dagorn06https://dblp.org/rec/conf/secrypt/Dagorn06URL#5783125Ines FekiXiaoli ZhengMohammed AchemlalAhmed SerhrouchniInternet Routing Security: An Approach to Detect and to React to Incorrect Advertisements.SECRYPT110-1172006Conference and Workshop Papersunavailableconf/secrypt/FekiZAS06https://dblp.org/rec/conf/secrypt/FekiZAS06URL#5783126Steffen FriesSecurity Considerations in Current VoIP Protocols.SECRYPT183-1912006Conference and Workshop Papersunavailableconf/secrypt/Fries06https://dblp.org/rec/conf/secrypt/Fries06URL#5783127Zaobin GanVijay VaradharajanDesign and Implementation of a Practical Secure Distributed Healthcare Application.SECRYPT431-4362006Conference and Workshop Papersunavailableconf/secrypt/GanV06https://dblp.org/rec/conf/secrypt/GanV06URL#5783128Zaobin GanDengwei WeiVijay VaradharajanImproving Software Security Through an Integrated Approach.SECRYPT437-4422006Conference and Workshop Papersunavailableconf/secrypt/GanWV06https://dblp.org/rec/conf/secrypt/GanWV06URL#5783129Abdoul Karim GanameJulien BourgeoisRenaud BidouFrançois SpiesEvaluation of the Intrusion Detection Capabilities and Performance of a Security Operation Center.SECRYPT48-552006Conference and Workshop Papersunavailableconf/secrypt/GanameBBS06https://dblp.org/rec/conf/secrypt/GanameBBS06URL#5783130Juan Manuel GarcíaTomás NavarreteCarlos OrozcoWorkload Hidden Markov Model for Anomaly Detection.SECRYPT56-592006Conference and Workshop Papersunavailableconf/secrypt/GarciaNO06https://dblp.org/rec/conf/secrypt/GarciaNO06URL#5783131Bartek GedrojcKathy CartrysseJan C. A. van der LubbePrivate Bidding for Mobile Agents.SECRYPT277-2822006Conference and Workshop Papersunavailableconf/secrypt/GedrojcCL06https://dblp.org/rec/conf/secrypt/GedrojcCL06URL#5783132Thomas GreeneRedefining the Market Place: Only the Numbers are Different?SECRYPT2006Conference and Workshop Papersunavailableconf/secrypt/Greene06https://dblp.org/rec/conf/secrypt/Greene06URL#5783133Carlos GutiérrezEduardo Fernández-MedinaMario PiattiniSecurity Risk Analysis in Web Services Systems.SECRYPT425-4302006Conference and Workshop Papersunavailableconf/secrypt/GutierrezFP06https://dblp.org/rec/conf/secrypt/GutierrezFP06URL#5783134M. Amaç GüvensanAli Gökhan YavuzProtocol Independent Lightweight Secure Communication.SECRYPT211-2172006Conference and Workshop Papersunavailableconf/secrypt/GuvensanY06https://dblp.org/rec/conf/secrypt/GuvensanY06URL#5783135Kari Anne HaalandChunming RongSecuring Web Services Using Identity-Based Encryption (IBE).SECRYPT413-4182006Conference and Workshop Papersunavailableconf/secrypt/HaalandR06https://dblp.org/rec/conf/secrypt/HaalandR06URL#5783136Seyed Hamed HassaniMohammad Reza ArefA New (t, n) Multi-Secret Sharing Scheme Based on Linear Algebra.SECRYPT443-4492006Conference and Workshop Papersunavailableconf/secrypt/HassaniA06https://dblp.org/rec/conf/secrypt/HassaniA06URL#5783137Javier HernandoMireia FarrúsPascual EjarqueAinara GardeJordi LuquePerson Verification by Fusion of Prosodic, Voice Spectral and Facial Parameters.SECRYPT17-232006Conference and Workshop Papersunavailableconf/secrypt/HernandoFEGL06https://dblp.org/rec/conf/secrypt/HernandoFEGL06URL#5783138Amir HerzbergIgal YoffeLayered Architecture for Secure E-Commerce Applications.SECRYPT118-1252006Conference and Workshop Papersunavailableconf/secrypt/HerzbergY06https://dblp.org/rec/conf/secrypt/HerzbergY06URL#5783139Kun Huang 0003Dafang ZhangOn the Self-Similarity of the 1999 DARPA/Lincoln Laboratory Evaluation Data.SECRYPT75-792006Conference and Workshop Papersunavailableconf/secrypt/HuangZ06https://dblp.org/rec/conf/secrypt/HuangZ06URL#5783140Masaki InamuraToshiaki TanakaToshiyuki FujisawaKazuto OgawaTakeshi KimuraFlexible License Transfer System Using Mobile Terminal.SECRYPT397-4042006Conference and Workshop Papersunavailableconf/secrypt/InamuraTFOK06https://dblp.org/rec/conf/secrypt/InamuraTFOK06URL#5783141Domenico IntronaFrancescomaria MarinoJASTEG2000 - Steganography for JPEG2000 Coded Images.SECRYPT329-3362006Conference and Workshop Papersunavailableconf/secrypt/IntronaM06https://dblp.org/rec/conf/secrypt/IntronaM06URL#5783142Hongxia JinJeffrey B. LotspiechMario BlaumTraitor Tracing for Subscription-Based Systems.SECRYPT223-2282006Conference and Workshop Papersunavailableconf/secrypt/JinLB06https://dblp.org/rec/conf/secrypt/JinLB06URL#5783143Jan JürjensModel-Based Security Engineering.SECRYPT2006Conference and Workshop Papersunavailableconf/secrypt/Jurjens06https://dblp.org/rec/conf/secrypt/Jurjens06URL#5783144Ahmed Réda KacedJean-Claude MoissinacProtecting Adaptive Multimedia Delivery and Adaptation Using Proxy Based Approach.SECRYPT87-902006Conference and Workshop Papersunavailableconf/secrypt/KacedM06https://dblp.org/rec/conf/secrypt/KacedM06URL#5783145Lars R. KnudsenSøren S. ThomsenProposals for Iterated Hash Functions.SECRYPT246-2532006Conference and Workshop Papersunavailableconf/secrypt/KnudsenT06https://dblp.org/rec/conf/secrypt/KnudsenT06URL#5783146Igor V. KotenkoMikhail StepashkinNetwork Security Evaluation Based on Simulation of Malfactor's Behavior.SECRYPT339-3442006Conference and Workshop Papersunavailableconf/secrypt/KotenkoS06https://dblp.org/rec/conf/secrypt/KotenkoS06URL#5783147Chunren LaiChang N. ZhangQuantitative Analysis and Enforcement of the Principle of Least Privilege in Role-Based.SECRYPT69-742006Conference and Workshop Papersunavailableconf/secrypt/LaiZ06https://dblp.org/rec/conf/secrypt/LaiZ06URL#5783148