


default search action
InfraSec 2002: Bristol, UK
- George I. Davida, Yair Frankel, Owen Rees:

Infrastructure Security, International Conference, InfraSec 2002 Bristol, UK, October 1-3, 2002, Proceedings. Lecture Notes in Computer Science 2437, Springer 2002, ISBN 3-540-44309-6
Biometrics
- John Armington, Purdy Ho, Paul Koznek, Richard Martinez:

Biometric Authentication in Infrastructure Security. 1-18 - Luciano Rila:

Denial of Access in Biometrics-Based Authentication Systems. 19-29
Identification, Authentication, and Process
- Carlo Blundo, Paolo D'Arco, Alfredo De Santis

, Clemente Galdi:
A Novel Approach to Proactive Password Checking. 30-39 - Jan De Clercq:

Single Sign-On Architectures. 40-58 - Marco Casassa Mont, Richard Brown:

Active Digital Credentials: Dynamic Provision of Up-to-Date Identity Information. 59-72
Analysis Process
- Stuart E. Schechter:

How to Buy Better Testing. 73-87 - Neil A. McEvoy, Andrew Whitcombe:

Structured Risk Analysis. 88-103 - E. S. Siougle, Vasilios Zorkadis:

A Model Enabling Law Compliant Privacy Protection through the Selection and Evaluation of Appropriate Security Controls. 104-114
Mobile Networks
- Prakash Reddy, Venky Krishnan, Kan Zhang, Devaraj Das:

Authentication and Authorization of Mobile Clients in Public Data Networks. 115-128 - Paulo S. Pagliusi:

A Contemporary Foreword on GSM Security. 129-144
Vulnerability Assessment and Logs
- HyungJong Kim, KyungHee Koh, DongHoon Shin, HongGeun Kim:

Vulnerability Assessment Simulation for Information Infrastructure Protection. 145-161 - Ulrich Flegel:

Pseudonymizing Unix Log Files. 162-179
System Design
- Pascal Fenkam, Harald C. Gall, Mehdi Jazayeri, Christopher Krügel:

DPS : An Architectural Style for Development of Secure Software. 180-198 - Matthias Enzmann, Thomas Kunz, Markus Schneider:

A New Infrastructure for User Tracking Prevention and Privacy Protection in Internet Shopping. 199-213 - Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta

, Humberto Martínez Barberá
, Gregorio Martínez Pérez:
Different Smartcard-Based Approaches to Physical Access Control. 214-226
Formal Methods
- Sigrid Gürgens, Peter Ochsenschläger, Carsten Rudolph:

Authenticity and Provability - A Formal Framework. 227-245 - Javier López, Juan J. Ortega, José M. Troya:

Protocol Engineering Applied to Formal Analysis of Security Systems. 246-259
Cryptographic Techniques
- Liqun Chen

, Keith Harrison, David Soldera, Nigel P. Smart:
Applications of Multiple Trust Authorities in Pairing Based Cryptosystems. 260-275 - Mark Chapman, George I. Davida:

Plausible Deniability Using Automated Linguistic Stegonagraphy. 276-287 - Taekyoung Kwon:

Virtual Software Tokens - A Practical Way to Secure PKI Roaming. 288-302 - Hyun-Sung Kim, Kee-Young Yoo:

Bit-Serial AOP Arithmetic Architectures over GF (2m). 303-313 - William A. Adamson, Olga Kornievskaia:

A Practical Distributed Authorization System for GARA. 314-324 - Javier López, José A. Montenegro, Rodrigo Roman, Jorge Dávila:

Design of a VPN Software Solution Integrating TCP and UDP Services. 325-338

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














