


default search action
Security and Management 2007: Las Vegas, Nevada, USA
- Selim Aissi, Hamid R. Arabnia:

Proceedings of the 2007 International Conference on Security & Management, SAM 2007, Las Vegas, Nevada, USA, June 25-28, 2007. CSREA Press 2007, ISBN 1-60132-048-5
Intrusion Detection
- Maitreya Natu, Adarshpal S. Sethi:

Intrusion Detection System to Detect Wormhole Using Fault Localization Techniques. Security and Management 2007: 3-9 - Hong Nguyen, Ravi Palaniappan, Nevin Aydin, Shiyuan Jin, Damla Turgut:

Intrusion Detection in Wireless Sensor Networks. Security and Management 2007: 10-16 - Wei Wang, Sylvain Gombault:

Distance Measures for Anomaly Intrusion Detection. Security and Management 2007: 17-23 - Jun Lu, Chong-Jun Wang, Jun Wang, Shifu Chen:

An Intrusion Detection Model Based on Intention Modeling. Security and Management 2007: 24-29 - Réginalds Lips, Nabil El-Kadhi:

Intelligent Mobile Agent for Intrusion Detection System. Security and Management 2007: 30-38
Biometric, Authentication, Steganography
- Slobodan Dokic, Andrea Kulesh, Megha Dombal, Huirong Fu:

An Overview of Multi-modal Biometrics for Authentication. Security and Management 2007: 39-44 - Yoichi Shibata, Masahiro Mimura, Kenta Takahashi, Masakatsu Nishigaki:

A study on biometric key generation from fingerprints: Fingerprint-key generation from stable feature value. Security and Management 2007: 45-51 - Guillermo Martínez-Silva, Francisco Rodríguez-Henríquez, Nareli Cruz Cortés, Levent Ertaul:

On the Generation of X.509v3 Certificates with Biometric Information. Security and Management 2007: 52-57 - Takumi Yamamoto, Atsushi Harada, Takeo Isarida, Masakatsu Nishigaki:

Improvement of User Authentication Using Schema of Visual Memory: Guidance by Verbal Cue. Security and Management 2007: 58-64 - Ashutosh Saxena, Shailaja Gummadidala, Phani Kumar Kancharla:

An Efficient Authentication Protocol for GSM. Security and Management 2007: 65-69 - Atluri Kavitha, Dhavala Lalitha Bhaskari, Peri S. Avadhani:

Combinatorial Approach For Authentication Based on Face Recognition. Security and Management 2007: 70-75 - J. Octavio Gutiérrez-García, Félix F. Ramos Corchado, Herwig Unger:

User Authentication via Mouse Biometrics and the usage of Graphic User Interfaces: An Application Approach. Security and Management 2007: 76-82 - Kannan Karthik, Dimitrios Hatzinakos:

A Unified Approach To Construct Non-perfect Secret Sharing And Traitor Tracing Schemes. Security and Management 2007: 83-89 - Nu-El Choi, Eun-Jun Yoon, Hyun-Jin Park, Kee-Young Yoo:

Visual Multi-Secret Sharing Scheme with Cheater Identification. Security and Management 2007: 90-96 - Behnam Rahnama, Atilla Elçi:

ParseKey+: A Five-Way Strong Authentication Procedure as an Approach to Client/Server Impersonation Avoidance using Steganography for Key Encryption. Security and Management 2007: 97-106 - Hayk Ghazaryan:

Steganographic File System Development Based On The Information Hiding Scheme By Permutation Of Sequence Elements. Security and Management 2007: 107-111 - Jujia Wang, Yoichi Muraoka:

Proposal on Automatic Authentication of Cellular Phones by Using Force Sensor. Security and Management 2007: 112-117 - Hyun-Jin Park, Eun-Jun Yoon, Kee-Young Yoo:

A New Steganography Scheme using a Frame. Security and Management 2007: 118-122 - Paul Seymer, George Dimitoglou:

Performance Optimization of Close-Color Pair Steganalysis. Security and Management 2007: 123-130
Cryptography
- Jyh-haw Yeh:

A Time-Bound Hierarchical Key Assignment Cryptosystem with No Lifetime Limit. Security and Management 2007: 131-137 - Feng Yi, Daoshun Wang, Xiaobo Li, Yiqi Dai:

Colored Probabilistic Visual Cryptography Scheme with Reversing. Security and Management 2007: 138-141 - Levent Ertaul, Nitu Chavan:

RSA and Elliptic Curve- ElGamal Threshold Cryptography (ECCEG-TC) Implementations for Secure Data Forwarding in MANETs. Security and Management 2007: 142-146 - Hilal M. Yousif Al-Bayatti, Abdul Monem S. Rahma, Hala Bahjat Abdul Wahab:

Using Generated Digital Images to Modify the PGP Cryptography Protocol. Security and Management 2007: 147-151 - Sara Mohamadrezaei, Bahram Sadeghi Bigham:

Solving Semantic Problems in Chaff and Winnowing Problem by Using Cryptography. Security and Management 2007: 152-156 - Liaqat Ali Khan, Muhammad Shamim Baig, M. Ashraf Ashraf:

Exploiting Silence for Ciphertext Only Cryptanalysis of Stream Ciphered Digitized Voice. Security and Management 2007: 157-164
Security and Privacy
- Mahjoub Langar, Mohamed Mejri, Kamel Adi:

A Formal Approach for Security Policy Enforcement in Concurrent Programs. Security and Management 2007: 165-171 - Lizzie Coles-Kemp, Richard E. Overill:

Triangulating the Views of Human and Non-Human Stakeholders in Information System Security Risk Assessment. Security and Management 2007: 172-178 - Wei Wang:

Security Based Heuristic SAX for XML Parsing. Security and Management 2007: 179-185 - Jan vom Brocke, Heinz Lothar Grob, Gereon Strauch, Christian Buddendick:

Calculating the Return on Security Investments - An Approach Based on Principles of Capital Budgeting. Security and Management 2007: 186-191 - Shoua Yang, Shanti Sukumaran, Dipali Yermalkar, Hesiri Weerasinghe, Huirong Fu:

Security and Privacy: Open Issues with RFID. Security and Management 2007: 192-197 - Martin Schaffer, Peter Schartner, Stefan Rass:

Universally Unique Identifiers: How To Ensure Uniqueness While Protecting The Issuer's Privacy. Security and Management 2007: 198-204 - Valli Kumari Vatsavayi, K. V. S. V. N. Raju:

Enhanced User Privacy on Trusted Processors. Security and Management 2007: 205-210 - Adam Nowicki, Artur Rot, Leszek Ziora:

Implementation of Protections as the Element of Information System Security Management. Experiences of Polish Enterprises. Security and Management 2007: 211-216 - Habtamu Bogale, Jigang Liu:

Secure Web Applications: A Systematic Approach. Security and Management 2007: 217-222 - Andrzej Bialas:

Modeling the Security Objectives According to the Common Criteria Methodology. Security and Management 2007: 223-229 - Li-Yen Hsu, Shin-Shin Kao:

Extending Security/Sustainability through Pervasive Spider Web Networks in Urbanism. Security and Management 2007: 230-235 - Ki-Hyang Hong, Gang Shin Lee, Jae-il Lee, Ik-Sub Lee:

Advance Diagnosis of Information Security for the Mobile RFID Service. Security and Management 2007: 236-241 - Jin-Sub Park, Young-Sun Shin, Jung-Jin Park, Sung-Gi Kang:

A Study of Estimate Risk Level Model Based on Security Maturity. Security and Management 2007: 242-247 - Ben Salah Abderrazak:

More Security on Tunisian e-Commerce Payments by Using SMS for Customer's Authenticity With National Post Office. Security and Management 2007: 248-254 - Sarah M. North, Max M. North:

A Brief Study of Students' Attitudes, Curiosity, Interest, and Perceptions of Information and National Security. Security and Management 2007: 255-259 - Min Guo, Meng Cao:

A Key-Set Label Model for Protecting Information Security. Security and Management 2007: 260-266 - Dongmin Choi, Yeojin Lee, Choongyong Cho, Okbin Lee, Yongkeun Bae, Ilyong Chung:

A Secure Key Distribution Scheme in Wireless Sensor Networks Using Dynamic Clustering Algorithms. Security and Management 2007: 267-273 - Shima Izadpanahi, Muhammad Reza Fatemi:

Enhanced Multi-Level Security: Secure Sharing. Security and Management 2007: 274-276 - Guoqing Tu, Pingxiang Li:

A Trusted Domain-based Approach for Authorization and Delegation on Mobile Distributed System. Security and Management 2007: 277-281 - Marcin Szczodrak, Jinwoo Kim:

4G and Manet, Wireless Network of Future Battlefield. Security and Management 2007: 282-290
Analysis and Evaluation
- Mohammed Ketel:

Economic Evaluation of IT Security. Security and Management 2007: 291-297 - Gregory Vert, Phanid Dogiparthi:

A Generic Metric for Evaluation of Database Security. Security and Management 2007: 298-305 - Eltayeb Abuelyaman, Mohammed Ahmed El-Affendi:

Evaluation of the S-Box Construction Using Arithmetic Modulo Prime Numbers. Security and Management 2007: 306-309 - Hareesh Khattri, Salvador Mandujano:

On the Security of 802.11 and 802.1X: Evaluating an Embedded Network Stack. Security and Management 2007: 310-316 - Bo Chen, Baohua Zhao, Chao Lu:

Analysis of Probabilistic Information Flow Security Properties. Security and Management 2007: 317-322 - Ronggong Song, Larry Korba, George Yee:

Analysis of Smart Card-Based Remote User Authentication Schemes. Security and Management 2007: 323-329 - Qijun Gu:

Analysis of Software Vulnerability in Sensor Nodes. Security and Management 2007: 330-336 - Hiroshi Dozono, Shinsuke Ito, Hisao Tokushima, Masanori Nakakuni:

The Analysis of Key Typing Sounds using Self Organizing Maps. Security and Management 2007: 337-341 - Hesham Elzouka, Fatma Zada:

A Survey on Digital Watermarking Technologies. Security and Management 2007: 342-349 - Luigi Alcuri, Pietro Cassarà:

A Study about DDoS Attacks in SIP Environments. Security and Management 2007: 350-357 - EunJoung Byun, SungJin Choi, Chong-Sun Hwang, SangKeun Lee:

Survey on Reputation Management Systems in P2P Network. Security and Management 2007: 358-366
Systems and Algorithms
- Bin Fu, Sai Aravalli, John Abraham:

Software Protection by Hardware and Obfuscation. Security and Management 2007: 367-373 - Fatiha Benali, Véronique Legrand, Stéphane Ubéda:

An Ontology for the Management of Heteregenous Alerts of Information System. Security and Management 2007: 374-380 - Manghui Tu, Dongfeng Wang, Peng Li, Nasser Tadayon:

Allocation of Partitioned Data by Using A Neural Network Based Approach. Security and Management 2007: 381-387 - Tobias Eggendorfer:

Reducing Spam Using Network Management Techniques. Security and Management 2007: 388-394 - Ihor V. Vasyltsov, Eduard Hambardzumyan:

Immunity to Passive Attacks on Generic RNG Model. Security and Management 2007: 395-399 - Vincent Zimmer:

Platform Trust Beyond BIOS Using the Unified Extensible Firmware Interface. Security and Management 2007: 400-405 - Nguyen Ngoc Diep, Sungyoung Lee, Young-Koo Lee, Heejo Lee:

Contextual Risk-Based Access Control. Security and Management 2007: 406-412 - Ming-Jheng Li, Justie Su-tzu Juan:

A Practical English Auction Based on the Discrete Logarithms. Security and Management 2007: 413-419 - Meixing Le, Jiajin Le:

Efficient Encrypted Storage Structure for Prevention of Information Leakage. Security and Management 2007: 420-425 - Phillip G. Bradford, Daniel A. Ray:

Finding the Change-Point in a Binary Stream with Two Unknown, but Distant, Distributions. Security and Management 2007: 426-431 - Se-Min Kim, Jun-Cheol Jeon, Byung-Heon Kang, Sang-Ho Shin, Kee-Young Yoo:

Non-linear and Non-group Cellular Automata for Cryptographic Applications. Security and Management 2007: 432-438
Applied Cryptology and Network Security
- Chih-Hung Wang, Chien-Chang Feng:

A Secure E-cash Scheme with Optional Traceability. Security and Management 2007: 439-445 - Danilo Gligoroski, Smile Markovski, Ljupco Kocarev:

Totally Asynchronous Stream Ciphers + Redundancy = Cryptcoding. Security and Management 2007: 446-451 - Efrén Clemente-Cuervo, Francisco Rodríguez-Henríquez, Daniel Ortiz Arroyo, Levent Ertaul:

A PDA Implementation of an Off-line e-Cash Protocol. Security and Management 2007: 452-458 - Sunghyuck Hong, Noé Lopez-Benitez:

Design and Performance Analysis of an Enhanced Group Key Generation Protocol. Security and Management 2007: 459-466
Security of Supercomputing Clusters
- A. Palagin, N. Alishov, George Markowsky, Anatoly Sachenko, Volodymyr Turchenko:

Security Tools for GRID- Systems. Security and Management 2007: 467-473 - George Markowsky, Linda Markowsky:

Survey of Supercomputer Cluster Security Issues. Security and Management 2007: 474-480 - George Markowsky:

RF Eavesdropping Beowulf Clusters. Security and Management 2007: 481-488
Securing Medical Information
- Rachel J. Mahncke, Patricia A. H. Williams:

The Issues Involved in Securing Electronic Health Information in Transit. Security and Management 2007: 489-495 - Danny Ng, Andrew Woodward:

Implications for Use of Different Encryption Algorithms on Power Consumption for Mobile Devices in the Healthcare Industry. Security and Management 2007: 496-500 - Andrew Woodward, Patricia A. H. Williams:

Wireless Rx - Risk Assessment and Recommendations for Securing a Wireless Network in a Medical Practice. Security and Management 2007: 501-505 - Craig Valli:

IT Sharps: Issues Relating to Securely Disposing of Hard Disks from Medical Information Systems. Security and Management 2007: 506-509 - Patricia A. H. Williams:

A Holistic Perspective on Models for Medical Information Security. Security and Management 2007: 510-519 - Christopher Bolan:

KILL Features of RFID Tags in a Medical Environment: Boon or Burden? Security and Management 2007: 520-526
Late Papers
- Fernanda Mendes, Jamil Salem Barbar, Gustavo S. B. do Carmo:

The Use of Watermark for the Authentication of Digital Images Mapped Through the Use of the Wavelet Transform. Security and Management 2007: 527-533 - Rabia Jafri, Hamid R. Arabnia:

PCA-Based Methods for Face Recognition. Security and Management 2007: 534-541 - Richard A. Wasniowski:

Using Honeynets and Alerts Correlation for Intrusion Detection and Prevention. Security and Management 2007: 542-545 - Kooshiar Azimian, Javad Mohajeri, Mahmoud Salmasizadeh:

A New Public Key Encryption Scheme Equivalent to Factoring. Security and Management 2007: 546-552 - Amit Jain:

Enhancement of Information Hiding Using XML. Security and Management 2007: 553-558 - Dan T. F. Chan, Siu-Ming Yiu, Lucas Chi Kwong Hui:

Remote Group User Authentication with Forward Secrecy and Key Agreement with Smartcard. Security and Management 2007: 559-565 - Lifeng Guo, Guilin Wang, Duncan S. Wong, Lei Hu:

Further Discussions on the Security of a Nominative Signature Scheme. Security and Management 2007: 566-572 - Haixin Wang, Yao Yue, Chunming Zhang, Guoqiang Bai, Hongyi Chen:

A Novel Unified Control Architecture for a High-Performance Network Security Accelerator. Security and Management 2007: 573-579 - Guishan Dong, Xin Li, Xianliang Lu:

A MLS Cooperation System Based on Virtual Machine Monitor. Security and Management 2007: 580-584 - Chung-Han Chen, Hira N. Narang:

Education in Software Security. Security and Management 2007: 585-590 - Brian J. d'Auriol, Tuyen Nguyen, Vo Quoc Hung, Duc Thang, Hassan Jameel, Le Xuan Hung, Syed Muhammad Khaliq-ur-Rahman Raazi, Dao Phuong Thuy, Ngo Trong Canh, Adil Mehmood Khan, Sunghyun Kim, Lei Shu, Sakib Pathan, Tran Van Phuong, Sungyoung Lee, Young-Koo Lee:

Embedded Processor Security. Security and Management 2007: 591-

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














