


default search action
Security and Management 2004: Las Vegas, Nevada, USA
- Hamid R. Arabnia, Selim Aissi, Youngsong Mun:

Proceedings of the International Conference on Security and Management, SAM '04, June 21-24, 2004, Las Vegas, Nevada, USA. CSREA Press 2004, ISBN 1-932415-37-8
Architectural Designs & Frameworks
- Binh Q. Nguyen:

A Security Architecture for a Web Portal of Sensitive Archival Records. Security and Management 2004: 3-8 - Wayne A. Jansen, Serban I. Gavrila, Vlad Korolev:

A Unified Framework for Mobile Device Security. Security and Management 2004: 9-14 - Hiep Pham, Zhuhan Jiang:

Ontology-Based Framework for E-Survivability Analysis. Security and Management 2004: 15-24
Wireless & Mobile Security
- Patrick George:

User Authentication with Smart Cards in Trusted Computing Architecture. Security and Management 2004: 25-31 - Anand R. Prasad, Hu Wang:

A Protocol for Secure Seamless Handover. Security and Management 2004: 32-40
Trusted Computing Platforms
- Mary Rossell, Alan D. Ross:

Machine Authentication and Security Compliance. Security and Management 2004: 41-45 - Alan D. Ross, Dennis Morgan:

Malware Mitigation Using Host Intrusion Prevention in the Enterprise. Security and Management 2004: 46-54
Encryption & Authentication
- Dennis Heimbigner:

Managing Access Rights for Terminated Employees. Security and Management 2004: 55-60 - Farhan A. Qazi:

A Survey of Biometric Authentication Systems. Security and Management 2004: 61-67 - Soon Hwa Sung, Eunbae Kong:

Byzantine Agreement with Threshold Cryptography in Unknown Networks. Security and Management 2004: 68-74 - M. Ammar Rayes, Michael Cheung:

User Isolation and Policy-Based Security Management. Security and Management 2004: 75-79 - Hiroshi Dozono, Hiroaki Sanada, Masanori Nakakuni, Yoshio Noguchi:

The Analysis of Graffiti Input and Its Application to Personal Identification. Security and Management 2004: 80-83 - Taesung Kim, Sangrae Cho, Seunghun Jin:

Authentication and Authorization for Network Security Service. Security and Management 2004: 84-88 - Alexander Wiesmaier, Marcus Lippert, Vangelis Karatsiolis:

The Key Authority - Secure Key Management in Hierarchical Public Key Infrastructures. Security and Management 2004: 89-93 - Dawei Hong, Shushuang Man, Barbra Hawes, Manton M. Matthews:

A Graphical Password Scheme Strongly Resistant to Spyware. Security and Management 2004: 94-100 - Raghavan Subramanian:

2 Channel Authentication. Security and Management 2004: 101-108
Security Engineering
- Carlos Villarrubia, Eduardo Fernández-Medina, Mario Piattini:

Analysis of ISO/IEC 17799: 2000 to be Used in Security Metrics. Security and Management 2004: 109-117 - Jesús Arturo Pérez Díaz, Gerardo Del Valle Torres:

Vulnerabilities in 802.11b Wireless Local Area Networks. Security and Management 2004: 118-124 - Antonio Sarasa-Cabezuelo, Daniel Ruiz-Zorrilla Gonzalo, Marcos Muiños Martín:

Secure Business Processes Optimization System. Security and Management 2004: 125-134
Communication Networks
- Chunxiao Chigan, Rahul Bandaru:

Towards a Perfect Secure Routing Protocol for Mobile Ad Hoc Networks. Security and Management 2004: 135-140 - Giancarlo Ruffo:

Legal File and Profit Sharing in a Peer to Peer Network. Security and Management 2004: 141-146 - Farookh Khadeer Hussain, Elizabeth Chang, Tharam S. Dillon:

Repute Relationships for Reputation Management in Peer-to-Peer Communication - I. Security and Management 2004: 147-153 - Craig Valli, Peter Wolski:

802.11b Wireless Networks Insecure at Any Speed. Security and Management 2004: 154-158 - Sirisha Medidi, Muralidhar Medidi, Sireesh Gavini, Richard L. Griswold:

Detecting Packet Mishandling in MANETs. Security and Management 2004: 159-162 - Jing Wu, Jennifer Seberry, Tianbing Xia:

Secure IP Multicast for DMS. Security and Management 2004: 163-167 - Alexander Maslov:

Scenarios for Hijacking Execution Flow of .NET Managed Code. Security and Management 2004: 168-172 - Wonjoon Choi, Byeong-Hee Roh, Seung W. Yoo:

Measures for Detecting Network Attacks at the Aggregate Traffic Level on High-Speed Internet Backbone Links. Security and Management 2004: 173-178
Intrusion Management
- Robert F. Erbacher:

Analysis and Management of Intrusion Data Collection. Security and Management 2004: 179-185 - Brian J. d'Auriol, Kishore Surapaneni:

A State Transition Model Case Study for Intrusion Detection Systems. Security and Management 2004: 186-192 - Vasilis Chatzigiannakis, Georgios Androulidakis, Mary Grammatikou, Basil S. Maglaris:

An Architectural Framework for Distributed Intrusion Detection Using Smart Agents. Security and Management 2004: 193-199 - Hiep Pham, Zhuhan Jiang:

Intrusion-Based Survivability Architecture. Security and Management 2004: 200-206 - Luis Sardinha, Nuno Ferreira Neves, Paulo Veríssimo:

Tolerating Intrusions in Grid Systems. Security and Management 2004: 207-220
Emerging Research
- Namho Yoo, Hwajung Lee, Hyeong-Ah Choi:

An XML-Based Impact Analysis Using Security Management with IAVN. Security and Management 2004: 217-220 - Regine Endsuleit, Arno Wagner:

Possible Attacks on and Countermeasures for Secure Multi-Agent Computation. Security and Management 2004: 221-227 - Myron Sheu, Le Tang, Ravi Mukkamala:

A Systematic Approach to Security Deployment in a Networking Environment. Security and Management 2004: 228-234 - Albert Ball, Donald G. Cole, Michael L. Nelson:

Testing IPv6 Security. Security and Management 2004: 235-241 - Rodolfo Villarroel, Eduardo Fernández-Medina, Mario Piattini:

General Considerations on Data Warehouse Security. Security and Management 2004: 242-248 - In-Jung Kim, Yoon-Jung Jung, JoongGil Park, Dongho Won:

A Study on Security Risk Modeling over Information and Communication Infrastructure. Security and Management 2004: 249-253 - Sung-Ock Hong, Kyoung-Ja Kim, Tae-Mu Chang:

A Study on CRL Distribution for Response Time Reduction in Distributed OCSP. Security and Management 2004: 254-257 - Yoon-Jung Jung, In-Jung Kim, Namhoon Lee, JoongGil Park:

The Development of Risk Analysis Methodology for Information Asset on Network. Security and Management 2004: 258-261 - Yuhei Kawakoya, Yoichi Muraoka:

Proposal and Implementation of Router-Based Traceback Technique. Security and Management 2004: 262-266 - Ajmal S. Mian, Raja Iqbal:

Experimental Analysis of the Arcanum Key Exchange Protocol. Security and Management 2004: 267-271 - Tarek K. Alameldin, Amitesh Sinha:

Web Spoofing Techniques, Implementation and Solutions. Security and Management 2004: 272-277 - Matthew Benke, John Waite, Paul W. Oman, Ahmed Abdel-Rahim:

Survivable Systems Analysis for Real Time Control Systems in Critical Infrastructures. Security and Management 2004: 278-286
Algorithms
- Leon Pan, Chang N. Zhang:

Using Metadata to Protect the Audiovisual Contents in MPEG-7 Applications. Security and Management 2004: 287-293 - Tianbing Xia, Jennifer Seberry, Jing Wu:

Boolean Functions with Good Properties. Security and Management 2004: 294-299 - Yong-Seok Kim, Jun-Cheol Jeon, Jin-woo Jeon, Kee-Young Yoo:

An Efficient Access Control Model Based on User-Classification and Role-Division. Security and Management 2004: 300-304 - Jin Shu, Fengyu Liu, Manwu Xu:

NSPPM: A Node Sampling Approach to Probabilistic Packet Marking-Based IP Traceback. Security and Management 2004: 305-311 - Hee Bong Choi, Jong-Gil Kim, Sang-Yun Han, Mung-Gil Choi, Chun-Soo Kim, Hyoon Jae Lee:

DPA Methods of Smart Cards. Security and Management 2004: 312-317 - Yi-Jung Chen, Dyi-Rong Duh, Yunghsiang S. Han:

A New Modulo (2n+1) Multiplier for IDEA. Security and Management 2004: 318-324 - Kyoung-Ja Kim, Tae-Mu Chang:

A ZRP Based Reliable Route Discovery Scheme in Ad-Hoc Networks. Security and Management 2004: 325-331 - Phen-Lan Lin, Juen-Lin Huang, Ting-Jung Chang:

CAPTCHA-Based Anti-Spam Mail Model. Security and Management 2004: 332-340
Applications
- Nick Antonopoulos, Tatjana Bitzakidis, Roger M. A. Peel:

ASAM: An Automated System for Authorisation Data Change Management in GRID Environments. Security and Management 2004: 341-347 - Jeff Adams, Ranjit Abbadasari, Ravi Mukkamala:

EZ-Park: An Innovative Secure M-Commerce Application. Security and Management 2004: 348-352 - Yongwha Chung, Byung-Hee Hwang, Woo-Yong Choi, Daesung Moon, Sung Bum Pan, Sang-Hwa Chung:

A Hardware Implementation of Speaker Verification Using Support Vector Machine. Security and Management 2004: 353-358 - Madiha Zafar, S. M. H. Zaidi:

TCP SYN Flood Sensor for Internet Backbone. Security and Management 2004: 359-364 - Vamshi Krishna Venapally, William S. Harrison, Nadine Hanebutte:

KLADS: Unix Based Kernel Level Anomaly Detection System. Security and Management 2004: 365-368 - Mathias Fonkam, Chamraj Bathirappan:

JxPS2 - An Intelligent, Portable and Pluggable Security Service for Web Applications Using Java, XML and JIProlog (Java Internet Prolog). Security and Management 2004: 369-375 - Patrick R. Merry, Axel W. Krings, Paul W. Oman:

Survivable Systems Analysis of the North American Power Grid Communications Infrastructure. Security and Management 2004: 376-386
Late Papers
- Young-Jun Heo, Keol-Woo Ryu:

Abnormal Traffic Detection for Network Intrusion Detection. Security and Management 2004: 387-390 - Fariborz Farahmand, Shamkant B. Navathe, Gunter P. Sharp, Philip H. Enslow Jr.:

Data Confidentiality in E-Government and E-Commerce. Security and Management 2004: 391-394 - Ned M. Smith:

A Comparison of the trusted Computing Group Security Model with Clark-Wilson. Security and Management 2004: 395-401 - Najib Saylani:

A Proposal for an Automated Approach to Real Time Profiling of IT Security Compromises. Security and Management 2004: 402-407 - Mun-Kyu Lee, Dowon Hong:

An Efficient Protocol for Mutual Authentication and Key Agreement Using the Subscriber Identity Module. Security and Management 2004: 408-413 - Ghasem S. Alijani, Nam Tran, J. Steven Welsh:

Processing Biometric Information for Smart Cards Using a Dedicated Hash Function. Security and Management 2004: 414-420 - Mira Kwak, Dong-Sub Cho:

Modeling Host Status Transition for Network Intrusion Detection. Security and Management 2004: 421-426 - Shamila Makki, Niki Pissinou, Hui Huang:

The Security Issues in the Ad-Hoc on Demand Distance Vector Routing Protocol (AODV). Security and Management 2004: 427-

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














