


default search action
Security and Management 2003: Las Vegas, Nevada, USA
- Hamid R. Arabnia, Youngsong Mun:

Proceedings of the International Conference on Security and Management, SAM '03, June 23 - 26, 2003, Las Vegas, Nevada, USA, Volume 1. CSREA Press 2003, ISBN 1-932415-16-5
Security Issues for Networks
- Michael G. Merideth, Priya Narasimhan:

Proactive Containment of Malice in Survivable Distributed Systems. Security and Management 2003: 3-9 - Hongmei Deng, Qing-An Zeng, Dharma P. Agrawal:

Network Intrusion Detection System Using Random Projection Technique. Security and Management 2003: 10-16 - Thomas Droste, Wolfgang Weber:

Additional Security Requirements to Integrate Wireless Networks. Security and Management 2003: 17-19 - Jinoh Kim, Ikkyun Kim, Kiyoung Kim, Jongsoo Jang, Sung Won Sohn, Koohong Kang:

An Integrated Network-Wide Defense Framework (INwDF) for Large Networks. Security and Management 2003: 20-26 - Alexandros G. Fragkiadakis, Nikolaos G. Bartzoudis, David J. Parish, Mark Sandford:

Hardware Support for Active Networking. Security and Management 2003: 27-33 - Kafi Hassan, Michael Conner:

Identifying Security Threats in Ad Hoc Wireless Network. Security and Management 2003: 34-40
Trust-Based Methodologies
- David Grawrock:

The Pull Model of Trust. Security and Management 2003: 41-47 - Ned M. Smith:

Prioritizing Facts for On-Line Trust Negotiation. Security and Management 2003: 48-54 - Todd A. Anderson, Vijay Tewari:

Establishing Confidence in Untrusted Storage Providers. Security and Management 2003: 55-64
Security: Management and Protocols
- Hassan Aljifri, Nizar Tyrewalla:

Security in Mobility Management. Security and Management 2003: 65-71 - Simeon Xenitellis, Pita Jarupunphol:

Security Vulnerabilities in the Trust-List PKI. Security and Management 2003: 72-77 - In-Seock Cho, Byung kwan Lee, Tai-Chi Lee:

An ISEP (Improved Secure Electronic Payment) Protocol Design Using 3BC Algorithm. Security and Management 2003: 78-84 - Gianluigi Me:

A Secure Mobile Local Payment Application Framework. Security and Management 2003: 85-92 - Ghita Kouadri Mostéfaoui:

Security in Pervasive Environments, What's Next? Security and Management 2003: 93-98
Authentication and Passwords
- Abhay Dharmadhikari, Uttam Sengupta, Ameen Ahmad, Roger Chandler:

SIM Based WLAN Authentication for Open Platforms. Security and Management 2003: 99-104 - Shushuang Man, Dawei Hong, Manton M. Matthews:

A Shoulder-Surfing Resistant Graphical Password Scheme - WIW. Security and Management 2003: 105-111 - Jung-Soo Lee, Han Ho Lee, Jong-Weon Kim:

Multi-Bits Image Watermarking Technique Against Geometrical Attacks. Security and Management 2003: 112-117 - Dennis Heimbigner:

A Tamper-Detecting Implementation of Lisp. Security and Management 2003: 118-124 - Zhuhan Jiang, Laxmikanth Gudipudi, Hiep Pham:

Distributed Resource Relay Under Personalized Firewalls. Security and Management 2003: 125-134
Security: Policies and Analysis
- Niklas Borselius, Chris J. Mitchell:

Securing FIPA Agent Communication. Security and Management 2003: 135-141 - Athanasios Agiannidis, Neil Glover, Kevin Warwick:

Behavior-Based Authentication in the Built Environment. Security and Management 2003: 142-148 - Regine Endsuleit, Thilo Mie:

Secure Multi-Agent Computations. Security and Management 2003: 149-155 - Anil Madhavapeddy, Alan Mycroft, David J. Scott, Richard Sharp:

The Case for Abstracting Security Policies. Security and Management 2003: 156-160 - Padmanabhan Krishnan, Robert Bannerman:

User Assisted Verification of Non-Repudiation and Similar Properties. Security and Management 2003: 161-170
Intrusion Detection
- Gerry V. Dozier:

IDS Vulnerability Analysis Using Genertia Red Teams. Security and Management 2003: 171-176 - Kyoung-Hwa Do, Kun-Won Jang, Sang-Hun Lee, Moon-Seog Jun:

The Design of WEB Stegodata Detection Systems Using Intrusion Detection Systems. Security and Management 2003: 177-182 - M. Ammar Rayes, Michael Cheung:

Security Management in IP Metro Ethernet/ETTx Networks. Security and Management 2003: 183-189 - Myung-Kyu Yi, MaengSoon Baik, Chong-Sun Hwang:

Design of a Fault-Tolerant Mechanism for Multi-Agent Based Intrusion Detection System. Security and Management 2003: 190-198
Architecture, Policy and Management
- Wayne A. Jansen, Tom Karygiannis, Michaela Iorga, Serban I. Gavrila, Vlad Korolev:

Security Policy Management for Handheld Devices. Security and Management 2003: 199-204 - Pavan K. Sura, Ravi Mukkamala:

A PKI Architecture for Academic Institutions: Design and Prototype. Security and Management 2003: 205-212 - Yan Yan, Yi Huang, Geoffrey C. Fox, Shrideep Pallickara, Marlon E. Pierce, Ali Kaplan, Ahmet E. Topcu:

Implementing a Prototype of the Security Framework for Distributed Brokering Systems. Security and Management 2003: 212-218 - Kyeong Ja Jeong, Moon Sun Shin, Hosung Moon, Keun Ho Ryu, Kiyoung Kim:

Alert Analysis Using Data Mining for Security Policy Server in Policy Based Network Security Management. Security and Management 2003: 219-225 - Tony White, Eugen M. Bacic:

Implementing Policy-Based Content Filtering for Web Servers. Security and Management 2003: 226-232 - Ron Forrester:

Trusted Platforms and Integrity Management: Scaling TCPA to the Enterprise. Security and Management 2003: 233-240
Algorithmic Techniques for Security
- Jing Wu, Tianbing Xia, Jennifer Seberry:

Construction of Highly Non-Linear Cubic Homogeneous Boolean Functions on GF2n+1(2). Security and Management 2003: 241-247 - Young-Jun Heo, Jongsoo Jang:

Defeating DoS Attacks Using Wavelet Analysis. Security and Management 2003: 248-252 - Mohannad Najjar:

Petra-r Cryptographic Hash Functions. Security and Management 2003: 253-259 - Hee Bong Choi, Hyoon Jae Lee, Choon Su Kim, Byung Hwa Chang, Dongho Won:

On Differential Power Analysis Attack on the Addition Modular 2N Operation of Smart Cards. Security and Management 2003: 260-266
Security Techniques and Applications
- Chun Ruan, Vijay Varadharajan, Yan Zhang:

Delegatable Authorization Program and Its Application. Security and Management 2003: 267-273 - Ok-Ran Jeong, Dong-Sub Cho:

Personalized Filtering Agent for E-Mail Classification. Security and Management 2003: 274-280 - Carol Taylor, Paul W. Oman, Axel W. Krings:

Assessing Power Substation Network Security and Survivability: A Work in Progress Report. Security and Management 2003: 281-287 - Sungsu Kim, Kyubum Wee:

Limits of Signature-Based Detection of Buffer Overflow Attacks. Security and Management 2003: 288-293 - JongSoon Park, YoungLok Lee, HyungHyo Lee, BongNam Noh:

A Role-Based Delegation Model Using Role Hierarchy Supporting Restricted Permission Inheritance. Security and Management 2003: 294-302
Models and Analyses for Security
- James F. Smith III:

Automated Resource Manager for Group Security. Security and Management 2003: 303-309 - Maheshkumar Sabhnani, Gürsel Serpen:

KDD Feature Set Complaint Heuristic Rules for R2L Attack Detection. Security and Management 2003: 310-316 - Yanet Manzano:

FDS Model: A Distributed Architectural Design for Management of Inbound Network Traffic on Web-Server Systems. Security and Management 2003: 317-323 - Kyoung-Ja Kim, Sung-Ock Hong, Tae-Mu Chang:

Agent Based Intrusion Tolerance Scheme in Ad Hoc Networks. Security and Management 2003: 324-329 - Manhee Lee, Sangkil Jung, Yoonjoo Kwon, KookHan Kim, Jeonghoon Moon, Okhwan Byeon:

Spanning Tree Search Model to Traceback DDoS Attack Using Netflow. Security and Management 2003: 330-333 - Yoon-Jung Jung, In-Jung Kim:

The Development for the Risk Assessment Methodology of Spiral Model. Security and Management 2003: 334-336 - Su-Hyung Jo, Jeong-Nyeo Kim, Sung Won Sohn:

Design of Policy-Based Security Management for Intrusion Detection. Security and Management 2003: 337-340 - Evon M. O. Abu-Taieh, Sattar J. Aboud:

A New Factoring Algorithm. Security and Management 2003: 341-347 - Peyman Nasirifard:

Web Services Security Overview and Security Proposal for UDDI Framework. Security and Management 2003: 348-351 - Moon-Ku Lee:

Stability Verification of Proxy Firewall Using Colored Petri Nets. Security and Management 2003: 352-358 - Lau Nga Sin, Moon-Chuen Lee:

Intrusion Detection System Models. Security and Management 2003: 359-366

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














