


default search action
Security and Management 2003: Las Vegas, Nevada, USA
- Hamid R. Arabnia, Youngsong Mun:

Proceedings of the International Conference on Security and Management, SAM '03, June 23 - 26, 2003, Las Vegas, Nevada, USA, Volume 2. CSREA Press 2003, ISBN 1-932415-17-3
Networks, Operating Systems, Web Services and Mobility
- Choon-Han Youn, Marlon E. Pierce, Geoffrey C. Fox:

Developing Secure Web Services for Computational Portals. Security and Management 2003: 367-372 - Geonlyang Kim, Jung-Chan Na, Seung Won Sohn:

Design of a LDAP Schema Based on Network Security Policy Information Model for Storing Security Policy. Security and Management 2003: 373-377 - Prabhaker Mateti, Sowgandh Sunil Gadi:

Prevention of Buffer Overflow Exploits in IA-32 Based Linux. Security and Management 2003: 378-384 - Kyechan Lee, Kyubum Wee:

Detection of Loadable Kernel Module Rootkit. Security and Management 2003: 385-389 - Maheshkumar Sabhnani, Gürsel Serpen:

Formulation of a Heuristic Rule for Misuse and Anomaly Detection for U2R Attacks in Solaris Operating System Environment. Security and Management 2003: 390-396 - Sang-Kil Park, Jongsoo Jang, BongNam Noh:

Supporting Interoperability to Multi Intrusion Detection System in Secure Networking Framework. Security and Management 2003: 397-401 - Alexander Buchmann, Harald Görl, Sven Lachmund:

Placement of Cryptographic Mechanisms in Operating Systems. Security and Management 2003: 402-408 - Bo-Heung Chung, Jeong-Nyeo Kim, Sung Won Sohn:

Improve Network Security with Kernel-Level Intrusion Detection Sensor. Security and Management 2003: 409-414 - Su-Hong Min, Ok-Ran Jeong, Dong-Sub Cho:

A Web-Based Login System Using the Time Based Password (TBP). Security and Management 2003: 415-420 - José R. Herrero, David Benlliure:

Operating System Support for Process Confinement. Security and Management 2003: 421-425 - Jong Tak Kim, Chan Koh, Jin Tak Choi:

A Protection of Mobile System in Network Systems. Security and Management 2003: 426-432 - Jongwook Moon, Hakbong Cho, Changseok Choi, Gihyun Jung, Younkwang Jung, Kyunghee Choi:

Accelerating Firewall. Security and Management 2003: 433-437 - Hyunchul Kang, Gil-Haeng Lee, Dae-Ung Kim:

Fault Management Model and Implementation for Customer Network Management. Security and Management 2003: 438-443 - Hye-Young Kim, Hwa-Sun Kim, Heung-Sik Kim, Sang-Gyun Kim, Heung-Kook Choi:

Cyber-Lecture Management System for XML-Based Secondary Education. Security and Management 2003: 444-448 - Jangbok Kim, Hosung Lim, Kyunghee Choi, Gihyun Jung:

A New Architecture for Enhancing the Security of E-Mail System. Security and Management 2003: 449-454 - Taeshik Shon, Jongsub Moon, Cheolwon Lee, Eul-Gyu Im, Jung-Taek Seo:

Safe Patch Distribution Architecture in Intranet Environments. Security and Management 2003: 455-460 - Boleslaw Fabisiak:

Threats, Vulnerabilities and Exposures to Networked Manufacturing Systems. Security and Management 2003: 461-468
Design and Analysis of Protocols and Performance Evaluation + Systems
- Holly Xiao:

Trust Management for Mobile IPv6 Binding Update. Security and Management 2003: 469-474 - Wonjoo Park, Dong-il Seo, Daeyoung Kim:

The Methods of IPsec Applying Between MN and HA in Mobile IPv6. Security and Management 2003: 475-478 - Yeojin Lee, Taehoon Lee, Ilyong Chung:

A Secure Mobile Agent System Based on Identity-Based Digital Signature Scheme. Security and Management 2003: 479-485 - Yoe-Sub Shin, Yang-Gyu Kim, Haeng-Seok Ko, Dong-Heyok Jang, TaeJoo Chang, Oh-Seok Kwon:

A Study on the High Crypto-System for the Multi-Sessions. Security and Management 2003: 486-490 - Dong-Ho Kang, Dong-il Seo, Jongsoo Jang:

A Study on Bandwidth Consumption DDoS: Attack Defense. Security and Management 2003: 491-494 - Leonardo Mattes, Frank Meylan, Adilson Eduardo Guelfi, João Antonio Zuffo:

Performance Analysis of a Security Manager for Multi-Service Communication Middleware. Security and Management 2003: 495-501 - Misun Kim, Sangjin Park, Youngsong Mun:

QoS Guaranteed Service Model in Mobile IPv6. Security and Management 2003: 502-507 - Sang-Hun Lee, Kyoung-Hwa Do, Kun-Won Jang, Moon-Seog Jun:

VDTS: The Design of Real-Time Virus Detection and Tracing Systems. Security and Management 2003: 508-513 - Bernhard Thurm:

Analysis of Web Service Performance for Network Management. Security and Management 2003: 514-520 - Mira Kwak, Dong-Sub Cho:

Extended Probabilistic Packet Marking Scheme for IP Traceback. Security and Management 2003: 521-526
Security Techniques, Models and Applications
- Gang Zhu, Jie Dai:

Economic Perspective of Information Security. Security and Management 2003: 527-533 - Shin-Kyung Lee, Tae-wan Kim, Dae-Ung Kim:

The Subscriber Management of CO-LAN Gateway System. Security and Management 2003: 534-538 - Darryl A. White, Ghasem S. Alijani:

Identifying Requirements for Network Security Software. Security and Management 2003: 539-543 - Remus Chua Choong Hee, Jianping Chen, Ben M. Chen:

The Development of Network Security Suite for Windows-Based Servers. Security and Management 2003: 544-550 - Miyoun Yoon, Kiyoung Kim, Yongtae Shin:

Robust Multimedia Authentication in Mobile Multicast Environment. Security and Management 2003: 551-557 - Chung-E Wang:

Simultaneous Data Compression and Encryption. Security and Management 2003: 558-563 - Sang-Hyun Bae, Hae Kyung Seong, Kang Hyeon Rhee:

Color Level Logo Image Watermarking on Multi Color Space. Security and Management 2003: 564-569 - Viktor Bunimov, Manfred Schimmler, Wolfgang Bziuk:

Key Generation for Secure High Speed Communication. Security and Management 2003: 570-576 - Dong-Hwan Shin, Jong-Weon Kim, Jong-Uk Choi:

Semi-Fragile Image Watermarking Based on Block Mean Difference. Security and Management 2003: 577-583 - Simon McNicol, Serdar Boztas:

Randomized Traitor Tracing Algorithms for Broadcast Security. Security and Management 2003: 584-590 - Young-Ho Suh, Won Gyum Kim, Jong-Weon Kim, Chi-Jung Hwang:

Image Fingerprinting with Multi-Bits Watermark. Security and Management 2003: 591-594 - Han Ho Lee, Jung-Soo Lee, Nam Yong Lee, Jong-Weon Kim:

The Fingerprinting Algorithm for Digital Image and Video. Security and Management 2003: 595-600 - Young-Shil Kim, Young-Mi Kim, Seong-Jin Park, Doo-Kwon Baik:

Design and Implementation of Stego WaveK Through Improved Lowbit Encoding Method. Security and Management 2003: 601-606 - Sangwoo Lee, Yun-kyung Lee, Youngsae Kim, Youngsoo Park, Sung-Ik Jun, Kyo-Il Chung:

Implementation of an Elliptic Curve Cryptography Hardware Accelerator for Smart Cards. Security and Management 2003: 607-610 - Soon Hwa Sung, Eunbae Kong:

Efficient Electronic Voting System with Secure Multiparty Fault-Detection Protocol. Security and Management 2003: 611-617 - F. Sang-Ju Song, S. Doo-Sung Lee, T. Sun-Hyung Kim:

Development of Digital Content Viewer with Tracing Capability by Use of the Watermarking Technique. Security and Management 2003: 618-625 - Jong-Weon Kim, Jung-Soo Lee, Jong-Uk Choi:

A New Multi-Layer Copyright Protection by Using Digital Watermarking. Security and Management 2003: 626-632
Late Papers and Post-Conference Papers
- Wei-Kuei Chen:

Efficient On-Line Electronic Checks. Security and Management 2003: 633-636 - Tom Coffey, Reiner Dojen, Tomas Flanagan:

On Different Approaches to Establish the Security of Cryptographic Protocols. Security and Management 2003: 637-643 - Guillermo A. Francia III, Aditya Kilaru, Le Phuong, Mehul B. Vashi:

A Performance Comparison of Encryption Algorithms. Security and Management 2003: 644-649 - Randy Justice, Sumitra Mukherjee:

Inferential Disclosure Limitation in Multivariate Categorical Databases. Security and Management 2003: 650-653 - Tom Cribb, Asha Rao:

An Information Security Management Model. Security and Management 2003: 654-657 - Scott F. Smith:

Similarity Searches in Computer Security. Security and Management 2003: 658-662 - Willy Susilo, Yi Mu:

On Fail-Stop Verifiable Secret Sharing Schemes. Security and Management 2003: 663-667 - Willy Susilo, Jianyong Huang, Jennifer Seberry:

On Using Fast Exponentiation Algorithm in PDAs (or: How Secure is the Discrete Logarithm Problem Assumption in PDAs?). Security and Management 2003: 668-674 - Prashant Dewan, Partha Dasgupta, Vijay Karamcheti:

Defending Against Denial of Service Attacks Using Secure Name Resolution. Security and Management 2003: 675-681

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














