


default search action
IAS 2008: Napoli, Italy
- Massimiliano Rak, Ajith Abraham, Valentina Casola:

Proccedings of the Fourth International Conference on Information Assurance and Security, IAS 2008, September 8-10, 2008, Napoli, Italy. IEEE Computer Society 2008, ISBN 978-0-7695-3324-7
Authentication and Access Control
- Lionel Habib, Mathieu Jaume, Charles Morisset:

A Formal Comparison of the Bell & LaPadula and RBAC Models. 3-8 - Xiaoming Wang, Huoyan Chen:

Threshold Proxy Signature Scheme with Strong Real-Time Efficiency. 9-14 - Hannan Xiao

, Bruce Christianson
, Ying Zhang
:
A Purchase Protocol with Live Cardholder Authentication for Online Credit Card Payment. 15-20 - Ali Nasrat Haidar, Ali E. Abdallah:

Comparison and Evaluation of Identity Management in Three Architectures for Virtual Organizations. 21-26 - Donato Impedovo

, Mario Refice:
Speaker Identification by Multi-Frame Generative Models. 27-32 - Ali E. Abdallah, Hassan Takabi:

Integrating Delegation with the Formal Core RBAC Model. 33-36 - Samrat Mondal

, Shamik Sural
:
Security Analysis of Temporal-RBAC Using Timed Automata. 37-40
Cryptographic Schemes and Applications
- Shu Yun Lim

, Meng-Hui Lim, Sanggon Lee, Hoonjae Lee:
Secure Hybrid Group Key Management for Hierarchical Self-Organizing Sensor Network. 43-49 - Przemyslaw Rodwald

, Janusz Stoklosa
:
PHAL-256 - Parameterized Hash Algorithm. 50-55 - Sajad Shirali-Shahreza, Mohammad Shirali-Shahreza:

Steganography in Textiles. 56-61 - Mohammad Shirali-Shahreza, Sajad Shirali-Shahreza:

Persian/Arabic Unicode Text Steganography. 62-66 - Sigurd Eskeland, Vladimir A. Oleshchuk:

Efficient Hierarchical Group-Oriented Key Establishment and Decryption. 67-72 - N. R. Sunitha

, B. B. Amberker:
Forward-Secure Proxy Signature Scheme for Multiple Proxy Signers Using Bellare-Miner Scheme with Proxy Revocation. 73-78 - Hao Luo, Fa-Xin Yu, Jeng-Shyang Pan

:
Data Hiding in Non-Expansion Visual Cryptography Based on Edge Enhancement Multitoning. 79-82 - Mohammad Abdullah-Al-Wadud

, Oksam Chae:
Skin Segmentation Using Color Distance Map and Water-Flow Property. 83-88 - Konstantinos Chalkias, Foteini Baldimtsi, Dimitrios Hristu-Varsakelis

, George Stephanides:
An Implementation Infrastructure for Server-Passive Timed-Release Cryptography. 89-94 - Zhengjun Cao, Lihua Liu:

A Group Key Agreement Scheme Revisited. 95-98 - Mohamed Abid

, Hossam Afifi:
Secure E-Passport Protocol Using Elliptic Curve Diffie-Hellman Key Agreement Protocol. 99-102 - Liaqat Ali Khan, Muhammad Shamim Baig:

A Server Based ASR Approach to Automated Cryptanalysis of Two Time Pads in Case of Speech. 103-107 - Mohamed Abo El-Fotouh, Klaus Diepold:

Dynamic Substitution Model. 108-111
Data Security and Privacy
- Bonnie Zhu, Shankar Sastry:

Data Fusion Assurance for the Kalman Filter in Uncertain Networks. 115-119 - A. V. Sarad, Sankar Kuppan, M. Vipin

:
A Time and Storage Efficient Solution to Remote File Integrity Check. 120-125 - Mohamed Abo El-Fotouh, Klaus Diepold:

A New Narrow Block Mode of Operations for Disk Encryption. 126-131 - Siddharta S. Gadang, Brajendra Panda, Joseph E. Hoag:

Provenance Tracking with Bit Vectors. 132-137
Intrusion Detection, Intrusion Prevention, Threat Modeling, and Analysis
- Mothanna Alkubeily, Hatem Bettahar, Abdelmadjid Bouabdallah:

Impact of Cheating and Non-Cooperation on the Stability and the Performances of Application-Level Multicast Sessions. 141-146 - Navneet Kumar Pandey, S. K. Gupta, Shaveta Leekha, Jingmin Zhou:

ACML: Capability Based Attack Modeling Language. 147-154 - Giampaolo Bella

, Francesco Librizzi, Salvatore Riccobene:
Realistic Threats to Self-Enforcing Privacy. 155-160 - Ulf Larson, Stefan Lindskog, Dennis K. Nilsson, Erland Jonsson:

Operator-Centric and Adaptive Intrusion Detection. 161-166 - Pantelis Kammas, Thodoros Komninos, Yannis C. Stamatiou

:
A Queuing Theory Based Model for Studying Intrusion Evolution and Elimination in Computer Networks. 167-171 - Václav Snásel, Jan Platos

, Pavel Krömer
, Ajith Abraham:
Matrix Factorization Approach for Feature Deduction and Design of Intrusion Detection Systems. 172-179 - Anazida Binti Zainal

, Mohd Aizaini Maarof, Siti Mariyam Hj. Shamsuddin, Ajith Abraham:
Ensemble of One-Class Classifiers for Network Intrusion Detection System. 180-185 - Susanta Nanda, Lap-Chung Lam, Tzi-cker Chiueh:

Web Application Attack Prevention for Tiered Internet Services. 186-191 - Mohd. Foad Rohani

, Mohd Aizaini Maarof, Ali Selamat, Houssain Kettani:
LoSS Detection Approach Based on ESOSS and ASOSS Models. 192-197 - Marios S. Andreou, Aad P. A. van Moorsel:

COTraSE: Connection Oriented Traceback in Switched Ethernet. 198-204 - Slobodan Petrovic, Sverre Bakke:

Improving the Efficiency of Misuse Detection by Means of the q-gram Distance. 205-208 - Feng Chen, Lingyu Wang, Jinshu Su

:
An Efficient Approach to Minimum-Cost Network Hardening Using Attack Graphs. 209-212
Security Tools Design
- Doaa Hassan, Sherif El-Kassas, Ibrahim Ziedan:

Developing a Security Typed Java Servlet. 215-220 - Franco Frattolillo

, Federica Landolfi:
Designing a DRM System. 221-226 - Doaa Hassan, Sherif El-Kassas, Ibrahim Ziedan:

Challenges for Security Typed Web Scripting Languages Design. 227-230 - Ji-Hee Jeoung, Eun-Ji Shin, Seng-Phil Hong, Sung-Hoon Kim, In-Ho Kim, Min-Woo Lee:

Systematic Website Verification for Privacy Protection. 231-234
Network Security and Sensor, Mobile and "ad hoc" Network Security
- Humberto J. Abdelnur, Tigran Avanesov, Michaël Rusinowitch, Radu State:

Abusing SIP Authentication. 237-242 - Shukor Abd Razak

, Normalia Samian
, Mohd Aizaini Maarof:
A Friend Mechanism for Mobile Ad Hoc Networks. 243-248 - Suleyman Kondakci

:
A Composite Network Security Assessment. 249-254 - Giampaolo Bella

, Gianpiero Costantino, Salvatore Riccobene:
Managing Reputation over MANETs. 255-260 - Riaz Ahmed Shaikh

, Hassan Jameel, Brian J. d'Auriol
, Sungyoung Lee, Young Jae Song, Heejo Lee:
Network Level Privacy for Wireless Sensor Networks. 261-266 - Adrian Leung, Chris J. Mitchell

:
A Device Management Framework for Secure Ubiquitous Service Delivery. 267-274 - Tadashi Araragi, Olivier Pereira:

Automatic Verification of Simulatability in Security Protocols. 275-280 - Osama A. Elshakankiry, Andy Carpenter, Ning Zhang

:
A New Secure Binding Management Protocol for Mobile IPv6 Networks. 281-286 - Jetzabel M. Serna, Jesus Luna, Manel Medina:

Geolocation-Based Trust for Vanet's Privacy. 287-290 - Ryma Abassi, Sihem Guemara El Fatmi:

An Automated Validation Method for Security Policies: The Firewall Case. 291-294 - Tobias Hoppe, Stefan Kiltz, Jana Dittmann:

Adaptive Dynamic Reaction to Automotive IT Security Incidents Using Multimedia Car Environment. 295-298 - Francesco Tamberi, Dario Maggiari, Daniele Sgandurra, Fabrizio Baiardi

:
Semantics-Driven Introspection in a Virtual Environment. 299-302
Security in Critical Infrastructure
- Michele Albano

, Stefano Chessa
, Roberto Di Pietro
:
Information Assurance in Critical Infrastructures via Wireless Sensor Networks. 305-310 - Maurizio Dusi, Francesco Gringoli

, Luca Salgarelli:
A Model for the Study of Privacy Issues in Secure Shell Connections. 311-317 - Claudio Mazzariello

:
IRC Traffic Analysis for Botnet Detection. 318-323
Quantum Cryptography
- Di Jin, Pramode K. Verma, Stamatios V. Kartalopoulos:

Key Distribution Using Dual Quantum Channels. 327-332 - Dazu Huang, Zhigang Chen:

Quantum Key Distribution Based on Multi-qubit Hadamard Matrices. 333-337 - Stamatios V. Kartalopoulos:

Chaotic Quantum Cryptography. 338-342

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














