


default search action
Security and Management 2009: Las Vegas, Nevada, USA
- Hamid R. Arabnia, Kevin Daimi:

Proceedings of the 2009 International Conference on Security & Management, SAM 2009, July 13-16, 2009, Las Vegas Nevada, USA, 2 Volumes. CSREA Press 2009, ISBN 1-60132-126-0
Information and Computer Security
- Alex Hai Wang, Su Yan:

A Stochastic Model of the Damage Propagation in Database Systems. Security and Management 2009: 3-9 - Hassan Rasheed, Randy Y. C. Chow:

Adaptive Risk-Aware Application-Level Access Control. Security and Management 2009: 10-16 - Max M. North, Greg Quinet, Robert Thacker, DeAnthony Perryman, John Crunk, Sarah M. North:

Investigation of Computer Security and Ethics Awareness in University Environment. Security and Management 2009: 17-21 - Karim Mohammed Rezaul, Mohammad Rahman, Aliar Hossain:

Information Security and Threats: A study on E-Commerce. Security and Management 2009: 22-27 - Michael Pollard, Gejuan Clements, Max M. North, Sarah M. North, Greg Quinet:

A Translation of NIST Security Controls Into DBMS Security Procedures (FISMA Compliance). Security and Management 2009: 28-30 - Breno Silva Pinto, Varin Khera, Lance Chun Che Fung:

Detecting Anomalies in Network Traffic with Entropy based MA-RMSE Algorithms. Security and Management 2009: 31-36 - Ahmad Ghafarian, Jason Garruto:

An Analysis of Data Protection Strategies. Security and Management 2009: 37-41 - Gevorg Margarov, Vahan Markarov, Ashot Khachaturov:

Steganographic System with Dynamically Reconfigurable Structure. Security and Management 2009: 43-45 - Ilze Murane:

A New Element in Information Security Process Security Aware Smart Household Employee. Security and Management 2009: 46-51 - Pavel Minarík, Zdenek Vrbka, Marek Winkler:

Advanced Network Traffic Visualization in the Service of Network Security. Security and Management 2009: 52-55 - Michel Kamel, Romain Laborde, François Barrère, Abdelmalek Benzekri:

An organizational pattern for contributing to the deployment of secure Virtual Enterprises. Security and Management 2009: 56-61 - Eric Ke Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu:

A New Practical Scheme for Protecting Web Content. Security and Management 2009: 62-66 - Artur Rot:

Computer Support of Risk Analysis in Information Technology Environment. Security and Management 2009: 67-71 - Levent Ertaul, Omicel Catambay:

Today & Tomorrow: IEEE 802.11 WLAN Security. Security and Management 2009: 73-77
Cryptography + Key Management Strategies
- Artan Luma, Bujar Raufi:

New Data Encryption Algorithm and its Implementation for Online User Authentication. Security and Management 2009: 81-85 - Ronggong Song, Khalil El-Khatib, Peter C. Mason:

Analysis of Chinese Remainder Theorem Based Group Key Management Protocols. Security and Management 2009: 86-92 - Phillip D. Colbert, Ben A. Juliano:

A Performance Comparison of Microsoft SQL Server 2008 Transparent Data Encryption and NetLib Encryptionizer. Security and Management 2009: 93-98 - Seungmin Lee, Jaehoon Nah, Dongil Seo:

Security Requirements for Scalable IPTV Services. Security and Management 2009: 99-102 - Kevin Daimi:

A Framework for Online Examination Security Based on Cryptology and Biometrics. Security and Management 2009: 103-112 - Adbelfatah Yahya, Ayman M. Abdalla:

An AES-Based Encryption Algorithm with Shuffling. Security and Management 2009: 113-116 - Le Thi Hoai An, Pham Dinh Tao, Sarra Bouallagui:

Cryptanalysis of an Identification Scheme Based on the Perceptron Problem using a Hybridization of Deterministic Optimization and Genetic Algorithm. Security and Management 2009: 117-123 - Sharma Abhishek Srinivasan, Ravi Mukkamala, K. Venkataramaniah:

Design and Anlysis of Cryptographically Strong S-Boxes: A Novel Approach. Security and Management 2009: 124-129 - Alessandro Brawerman, Jose W. Bohner Jr., Victor D. Ribeiro:

A Secure Intranet VoIP Framework. Security and Management 2009: 130-135 - Ping Luo, Haijian Zhou, Daoshun Wang, Yiqi Dai:

Cryptanalysis of RSA with Constrained Low Public Exponent. Security and Management 2009: 136-142 - Siddharth Sharma, Akshay Atrey, Saurabh Jain:

A Novel And Efficient Algorithm To Enhance The Complexity Of Elliptic Curve Cryptography. Security and Management 2009: 143-148 - Mani Arora, Poonamjeet Kaur, Nishima Gakhar, Gauravjeet Singh:

Metrics for Analysis of Cryptograhic Algorithms. Security and Management 2009: 149-156 - Gevorg Margarov, Siranush Chopuryan, Yeghisabet Alaverdyan:

Cryptanalysis of Finite Automata Public Key Cryptosystems. Security and Management 2009: 157-161 - Leidy Marcela Giraldo Castano, Edward Yesid Villegas Pulgarin:

Optical Encryption with Jigsaw Transform using Matlab. Security and Management 2009: 162-165 - Robert Okonigene, Isimhemen Oborkhale:

Design of a Cryptographic Software for Wireless Network Security. Security and Management 2009: 166-169
Authentication + Biometrics
- Joon Park, Yasir Shaikh, Rohit Mahajan:

Prevention of ATM Fraud Using F-PIN. Security and Management 2009: 173-178 - Eric Ke Wang, Yi Jun He, Lucas Chi Kwong Hui, Siu-Ming Yiu:

A Practical SMS-based Mutual Authentication Protocol for Secure Online Banking. Security and Management 2009: 179-183 - Pino Caballero-Gil, Candelaria Hernández-Goya, Amparo Fúster-Sabater:

Differentiated Services to Provide Efficient Node Authentication in VANETs. Security and Management 2009: 184-187 - Takumi Yamamoto, Yuko Kojima, Masakatsu Nishigaki:

A Shoulder-Surfing-Resistant Image-Based Authentication System with Temporal Indirect Image Selection. Security and Management 2009: 188-194 - Hiroshi Dozono, Masanori Nakakuni, Takayuki Inoue, Hidetaka Nozaki:

Study of Biometric Authentication Method Using Behavior Characteristics on Game Consoles. Security and Management 2009: 195-200 - Yong-Zhong He, Zhen Han, Huirong Fu:

Usage Control in Conditional Access System with malicious Set-top Box. Security and Management 2009: 201-205 - Naveen Kumar:

Secure Authentication Using Visual Cryptography. Security and Management 2009: 206-210 - Gevorg Margarov, Maha Tolba:

Fingerprint Biometric Solution for Securely Secret Sharing. Security and Management 2009: 211-213 - Stella C. Chiemeke, Olumide B. Longe:

Conditional Access Systems for Internet Content Protection. Security and Management 2009: 214-219 - Woei-Jiunn Tsaur, You-Mine Lin:

An Agent-Based Single Sign-On Scheme for Web Services Environments. Security and Management 2009: 220-226 - Guiyue Jin, Eun Young Jeong, Ho-Youl Jung, Ki Dong Lee:

RFID Authentication Protocol Conforming to EPC Class-1 Generation-2 Standard. Security and Management 2009: 227-231 - Sunil V. K. Gaddam, Manohar Lal:

An Effective Method for Revocable Biometric Key Generation. Security and Management 2009: 232-237 - Sunghyuck Hong:

A Secure Certificate for Secure Group Communication. Security and Management 2009: 238-240 - Veronica Akwukwuma, Annie Egwali:

Authentication Practices At The User Interface: Vulnerability Of Users And Organizations In Nigeria. Security and Management 2009: 241-247
Privacy Issues + Intrusion Detection and Firewalls + Attack Prevention
- Ossama Toutonji, Seong-Moo Yoo:

Realistic Approach against Worm Attack on Computer Networks by Emulating Human Immune System. Security and Management 2009: 251-257 - Ryu Watanabe, Toshiaki Tanaka:

Denial of Service Attack Resilience on Area Expanded WLAN Services. Security and Management 2009: 258-264 - Richard Lundeen, Charles Burns:

Simplified Single Packet Authorization. Security and Management 2009: 265-270 - Farah Barika, Karim Hadjar, Nabil El-Kadhi:

Artificial Neural Network for IDS Solution. Security and Management 2009: 271-277 - Andrzej Bialas:

Validation of the Specification Means Ontology on the Simple Firewall Case. Security and Management 2009: 278-284 - Charlie Obimbo:

An Intrusion Detection System for Mobile Ad-Hoc Networks. Security and Management 2009: 285-290 - Eun-Ae Cho, Chang-Joo Moon, Dae-Ha Park, Jeong-Oog Lee, Doo-Kwon Baik:

A Database Firewall Server Using Data Masking. Security and Management 2009: 291-296 - Samuel Shepard, Larry A. Dunning, Ray Kresman:

Data Mining and Anonymous Opt-out. Security and Management 2009: 297-303
Access Control and Signatures
- Starsky H. Y. Wong, Zoe Lin Jiang, Lucas Chi Kwong Hui, Siu-Ming Yiu:

Two Efficient Proxy Signature Schemes for Delegation Chains with Nonrepudiation and Untraceability. Security and Management 2009: 307-313 - Jérôme Dossogne, Olivier Markowitch:

A Tripartite Strong Designated Verifier Scheme Based On Threshold RSA Signatures. Security and Management 2009: 314-317 - Mohammad M. Rasheed, Norita Md Norwawi, Mohammed M. Kadhum, Osman Ghazali:

Intelligent Anti-Internet Worm Automatically Detect and Update Signatures Server. Security and Management 2009: 318-322 - Qingshui Xue, Fengying Li, Yuan Zhou, Jiping Zhang, Zhenfu Cao, Haifeng Qian:

Bilinear-pairings Based Designated-verifier Threshold Proxy Signature Scheme. Security and Management 2009: 323-327
Novel Systems + Implementation Issues
- Vincent Zimmer:

Cloud Net-Booting Beyond BIOS Using the Unified Extensible Firmware Interface. Security and Management 2009: 331-339 - Tobias Wegner:

A Secure Multi-Provider OSGi Platform Enabling Process-Isolation by Using Distribution. Security and Management 2009: 340-345 - Greg Vert, Evangelos Triantaphyllou:

Security Level Determination Using Branes for Contextual Based Global Processing: An Architecture. Security and Management 2009: 346-350 - Vincent Zimmer:

Access Control Beyond BIOS Using the Unified Extensible Firmware Interface. Security and Management 2009: 351-359
Protocols and Related Issues
- Levent Ertaul, Dilraba Ibrahim:

Evaluation of Secure Routing Protocols in Mobile Ad Hoc Networks (MANETs). Security and Management 2009: 363-369 - Xiaowen Zhang, Qinghai Gao, Mohamed K. Saad:

Analysis of RFID Authentication Protocols Based on Static and Dynamic Shared Secret. Security and Management 2009: 370-376
Security Issues + Applications + Algorithms + Management Strategies + Policies
- Hiroyuki Sato:

A Service Framework based on Grades of IdPs and SPs. Security and Management 2009: 379-385 - Michael R. Grimaila, Larry Fortson, Janet Sutton:

Design Considerations for a Cyber Incident Mission Impact Assessment (CIMIA) Process. Security and Management 2009: 386-391 - DongHo Kang, BoHeung Jung, KyoungSon Jhang, KiYoung Kim:

USB Data leakage prevention Using hardware based data inspection technique. Security and Management 2009: 392-396 - Mikhail I. Gofman, Ruiqi Luo, Jian He, Yingbin Zhang, Ping Yang:

Incremental Information Flow Analysis of Role Based Access Control. Security and Management 2009: 397-403 - Rattikorn Hewett, Phongphun Kijsanayothin:

Location Contexts in Role-based Security Policy Enforcement. Security and Management 2009: 404-410 - Francis Manning:

Securing the Environment: A Methodology for Weighting and Analyzing Attack Graphs. Security and Management 2009: 411-416 - Byoung-Koo Kim, Seungyong Yoon, Ikkyun Kim, Jintae Oh:

Multi-region based Clustering Analysis Method for Unknown Malicious Code Detection. Security and Management 2009: 417-422 - Kanaka Rajanala, Huiping Guo, Chengyu Sun:

Tamper Detection and Localization for Categorical Data Using Fragile Watermarks for Multi Owner Databases. Security and Management 2009: 423-428 - Siranush Chopuryan:

The Stability of Trapdoor One Way Function Based on Finite Automata. Security and Management 2009: 429-433 - Nabil El-Kadhi, Sofien Beji:

Ontology Driven Security for Mobile Applications. Security and Management 2009: 434-440 - Guillermo A. Francia III, Suprasith Jarupathirun:

Security Metrics-Review and Research Directions. Security and Management 2009: 441-446 - Priscilla Hope, Jason Bowling, Kathy Liszka:

Artificial Neural Networks as a Tool for Identifying Image Spam. Security and Management 2009: 447-451 - Seungyong Yoon, Byoung-Koo Kim, Hwashin Moon, Ikkyun Kim, Jintae Oh:

Abnormal Traffcic Detection using Flow-based Traffic Measuring Scheme. Security and Management 2009: 452-456 - Seung-Hyun Kim, Daeseon Choi, Seunghun Jin:

Digital ID Wallet: Provide Selective Disclosure and Users Control of Identity Information. Security and Management 2009: 457-462 - Hicham Tout, William Hafner, Wei Li, Easwar A. Nyshadham:

Phishpin: An Integrated Anti-Phishing Framework. Security and Management 2009: 463-468 - Lucas Vespa, Ning Weng:

Split-DFA (SDFA) for Scalable Pattern Matching in Network Security. Security and Management 2009: 469-474 - Robert F. Erbacher:

Visualization for Rapid Assessment and Projection in Cyber Situational Awareness. Security and Management 2009: 475-480 - Ye Liu, Zhihui Li, Rui Guo:

A Multi-secret Sharing Scheme in an Access Structure. Security and Management 2009: 481-484 - Sungdo Park, Bokman Jang, Hyokyung Chang, Bong-hoi Kim, Eui-In Choi:

Rule-Based Auditing System for Security Assurance in Ubiquitous Computing. Security and Management 2009: 485-489 - Anton Romanov, Eiji Okamoto:

A Framework for Building and Managing Secured ERP Landscape. Security and Management 2009: 490-495 - Madhavi Nidamarthy, Huiping Guo, Chengyu Sun:

Multiple Watermarking for Relational Data. Security and Management 2009: 496-500 - Michael Workman:

A Matter of Trust: Studies of Organizational Systems of Justice Perceptions on Attitudes about Corporate Surveillance. Security and Management 2009: 501-508 - Erlo Meister, Elmarie Biermann:

Increasing Security Awareness: Designing a Socially Engineered E-mail Worm. Security and Management 2009: 509-514 - Anand Singh, David J. Lilja:

Using a Statistical Approach for Optimal Security Parameter Determination. Security and Management 2009: 515-520 - Rune Steinsmo Ødegård, Danilo Gligoroski:

On the Randomness and Regularity of Reduced Edon-R Compression Function. Security and Management 2009: 521-525
Workshop on Ubiquitous Computing Security - UC-Sec 09
- Hossein Rezaei Ghaleh, Mohammad-Ali Doostari:

Improving the Client Security Using the Smart Card and Trusted Server. Security and Management 2009: 529-534 - Seung-Hee Oh, Deok-Gyu Lee, Jong Wook Han, Jong Hyuk Park:

The Detection and Response Mechanism against Abnormal Traffic Attack in ATN Network. Security and Management 2009: 535-540 - Wan S. Yi, Woong Go, Sookyun Kim, Dongho Won, Jin Kwak:

Fingerprint Based Secure Authentication Protocol using OTP in e-Banking. Security and Management 2009: 541-546 - Wan S. Yi, Dongbum Lee, Sang-Soo Yeo, Dongho Won, Jin Kwak:

Security and Efficiency Analyses of Security Mechanisms in e-Passport Systems. Security and Management 2009: 547-553
Special Track on Applied Cryptology and Network Security
- Ali Akbar Sobhi Afshar, Alireza Sharifi, Taraneh Eghlidos:

On the Security and Efficiency of Secure Channel Coding Schemes Based on Punctured Codes. Security and Management 2009: 557-562 - Fernando Hernández Álvarez, Luis Hernández Encinas, Carmen Sanchez-Avila:

Biometric Fuzzy Extractor Scheme for Iris Templates. Security and Management 2009: 563-569 - Yasuo Hatano, Kunihiko Miyazaki, Toshinobu Kaneko:

A Study on Multi-Resipient Encryptions for Selective Disclosure. Security and Management 2009: 570-575 - Raúl Durán Díaz, Fernando Hernández Álvarez, Luis Hernández Encinas:

Graphic Multisecret Sharing Schemes with One-Dimensional Cellular Automata. Security and Management 2009: 576-582 - Amadou Moctar Kane:

On the use of Continued Fractions for Stream Ciphers. Security and Management 2009: 583-589
Late Papers
- Mahadevan Gomathisankaran, Ruby B. Lee:

Tantra: A Fast PRNG Algorithm and its Implementation. Security and Management 2009: 593-598 - Muhammad Ali, Deepthi Jangum:

The Development of a Security Engineering Course at Tuskegee University. Security and Management 2009: 599-602 - Vladimir S. Zaborovsky, Anton Titov:

Specialized Solutions for Improvement of Firewall Performance and Conformity to Security Policy. Security and Management 2009: 603-608 - Peter Hannay:

Fun & Games: An Introduction to Console Forensics. Security and Management 2009: 609-612 - Craig Valli, Andrew Woodward:

SCADA Security - Slowly Circling a Disaster Area. Security and Management 2009: 613-617 - Craig Valli:

Snort IDS for SCADA Networks. Security and Management 2009: 618-621 - Andrew Woodward:

Do Current BitTorrent Clients Running on Windows 7 Beta Leave Behind Meaningful Data? Security and Management 2009: 622-617 - Lei Hou, Hai-Xin Duan, Jianping Wu:

Selecting Trust Peers Based on Updated Credit Value in Peer-to-Peer Networks. Security and Management 2009: 628-634 - Peter Hannay, Andrew Woodward:

Firewire Forensics in Modern Operating Systems. Security and Management 2009: 635-638 - Zhiqian Xu, Hai Jiang:

Data Protection in Object-based Storage Devices. Security and Management 2009: 639-644 - Arnur G. Tokhtabayev, Victor A. Skormin, Andrey M. Dolgikh, Mamirbek Beisenbi, Moldir Kargaldayeva:

Detection of Specific Semantic Functionalities, such as Self-Replication Mechanism, in Malware Using Colored Petri Nets. Security and Management 2009: 645-651 - Mohssen M. Z. E. Mohammed, H. Anthony Chan, Neco Ventura, Mohsin Hashim, Izzeldin Amin:

A modified Knuth-Morris-Pratt Algorithm for Zero-day Polymorphic Worms Detection. Security and Management 2009: 652-657 - Hala Bahjat Abdul Wahab, Abdul Monem S. Rahma, Hilal M. Yousif Al-Bayatti:

Proposed New Quantum Cryptography System Using Quantum Description Techniques for Generated Curves. Security and Management 2009: 658-664 - Mousa Farajallah, Rushdi Hamamreh:

Self Generating Multi Keys Cryptosystem Model for Non-Invertible Matrices based on Hill Cipher. Security and Management 2009: 665-672

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














