- Daniel Feledi, Stefan Fenz:
Challenges of Web-Based Information Security Knowledge Sharing. ARES 2012: 514-521 - Peter Frühwirt, Peter Kieseberg, Sebastian Schrittwieser, Markus Huber, Edgar R. Weippl:
InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs. ARES 2012: 625-633 - Nan Guo, Tianhan Gao, Bin Zhang:
BPVrfy: Hybrid Cryptographic Scheme Based - Federate Identity Attributes Verification Model for Business Processes. ARES 2012: 417-424 - Safaà Hachana, Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquín García-Alfaro:
Towards Automated Assistance for Mined Roles Analysis in Role Mining Applications. ARES 2012: 123-132 - Kirsi Helkala:
Disabilities and Authentication Methods: Usability and Security. ARES 2012: 327-334 - Amir Herzberg, Haya Schulmann:
Oblivious and Fair Server-Aided Two-Party Computation. ARES 2012: 75-84 - Amir Herzberg, Haya Schulmann:
Antidotes for DNS Poisoning by Off-Path Adversaries. ARES 2012: 262-267 - Midori Hirose, Akira Utsumi, Isao Echizen, Hiroshi Yoshiura:
A Private Information Detector for Controlling Circulation of Private Information through Social Networks. ARES 2012: 473-478 - Stefan Hofbauer, Kristian Beckers, Gerald Quirchmayr:
A Privacy preserving Approach to Call Detail Records Analysis in VoIP Systems. ARES 2012: 307-316 - Jostein Jensen:
Federated Identity Management Challenges. ARES 2012: 230-235 - Anca Jurcut, Tom Coffey, Reiner Dojen:
Symmetry in Security Protocol Cryptographic Messages - A Serious Weakness Exploitable by Parallel Session Attacks. ARES 2012: 410-416 - Tomoko Kajiyama, Isao Echizen:
Evaluation of an Improved Visualization System for Helping Children Identify Risky Websites. ARES 2012: 495-498 - Abdel Alim Kamal, Amr M. Youssef:
A Scan-Based Side Channel Attack on the NTRUEncrypt Cryptosystem. ARES 2012: 402-409 - Hossein Khezripour, Saadat Pourmozaffari:
Fault Tolerance and Power Consumption Analysis on Chip-Multi Processors Architectures. ARES 2012: 301-306 - Elmar Kiesling, Christine Strauss, Christian Stummer:
A Multi-objective Decision Support Framework for Simulation-Based Security Control Selection. ARES 2012: 454-462 - Aleksandar Kircanski, Amr M. Youssef:
On the Weak State in GGHN-like Ciphers. ARES 2012: 397-401 - Changwei Liu, Anoop Singhal, Duminda Wijesekera:
Using Attack Graphs in Forensic Examinations. ARES 2012: 596-603 - Steffen Logen, Hans Höfken, Marko Schuba:
Simplifying RAM Forensics: A GUI and Extensions for the Volatility Framework. ARES 2012: 620-624 - Thomas Ludescher, Thomas Feilhauer, Peter Brezany:
Security Concept and Implementation for a Cloud Based E-science Infrastructure. ARES 2012: 280-285 - Yue Ma, Wei Jiang, Nan Sang, Ziguo Zhong:
An Adaptive Risk Control and Security Management for Embedded Real-Time System. ARES 2012: 11-17 - Federico Mancini, Samson Gejibo, Khalid A. Mughal, Remi Valvik, Jørn Klungsøyr:
Secure Mobile Data Collection Systems for Low-Budget Settings. ARES 2012: 196-205 - Lee V. Mangold:
Using Ontologies for Adaptive Information Security Training. ARES 2012: 522-524 - Per Håkon Meland, Erlend Andreas Gjære:
Representing Threats in BPMN 2.0. ARES 2012: 542-550 - Peter Membrey, Keith C. C. Chan, Canh Ngo, Yuri Demchenko, Cees de Laat:
Trusted Virtual Infrastructure Bootstrapping for On Demand Services. ARES 2012: 350-357 - Daniel Migault, Daniel Palomares, Emmanuel Herbert, Wei You, Gabriel Ganne, Ghada Arfaoui, Maryline Laurent:
E2E: An Optimized IPsec Architecture for Secure and Fast Offload. ARES 2012: 365-374 - David A. Mundie, Robin Ruefle:
Building an Incident Management Body of Knowledge. ARES 2012: 507-513 - Amanda Sávio Nascimento, Fernando Castor, Cecília M. F. Rubira, Rachel Burrows:
An Empirical Study on Design Diversity of Functionally Equivalent Web Services. ARES 2012: 236-241 - Stephan Neumann, Melanie Volkamer:
Civitas and the Real World: Problems and Solutions from a Practical Point of View. ARES 2012: 180-185 - Canh Ngo, Peter Membrey, Yuri Demchenko, Cees de Laat:
Policy and Context Management in Dynamically Provisioned Access Control Service for Virtualized Cloud Infrastructures. ARES 2012: 343-349 - Hoang-Quoc Nguyen-Son, Quoc-Binh Nguyen, Minh-Triet Tran, Dinh-Thuc Nguyen, Hiroshi Yoshiura, Isao Echizen:
Automatic Anonymization of Natural Languages Texts Posted on Social Networking Services and Automatic Detection of Disclosure. ARES 2012: 358-364