


default search action
SEC 2003: Athens, Greece
- Dimitris Gritzalis, Sabrina De Capitani di Vimercati, Pierangela Samarati, Sokratis K. Katsikas:

Security and Privacy in the Age of Uncertainty, IFIP TC11 18th International Conference on Information Security (SEC2003), May 26-28, 2003, Athens, Greece. IFIP Conference Proceedings 250, Kluwer 2003, ISBN 1-4020-7449-2
Secure Networks and Distributed Systems
- Brian Toone, Michael Gertz, Premkumar T. Devanbu:

Trust Mediation for Distributed Information Systems. SEC 2003: 1-12 - Constantine Daicos, Scott Knight:

Concerning Enterprise Network Vulnerability to HTTP Tunneling. SEC 2003: 13-24 - Mohamed Sharif, Duminda Wijesekera:

Providing Voice Privacy Over Public Switched Telephone Networks. SEC 2003: 25-36 - Jose Antonio Onieva, Jianying Zhou, Mildrey Carbonell, Javier López:

A Multi-Party Non-Repudiation Protocol for Exchange of Different Messages. SEC 2003: 37-48 - Jing-Jang Hwang, Min-Hua Shao, Soushan Wu:

Establishing Chain of Evidence as a Base for Non-Repudiation Services. SEC 2003: 49-60
Content Protection
- Ernesto Damiani, Sabrina De Capitani di Vimercati:

Securing XML-based Multimedia Content. SEC 2003: 61-72 - Cheun Ngen Chong, Zhonghong Peng, Pieter H. Hartel:

Secure Audit Logging with Tamper-Resistant Hardware. SEC 2003: 73-84 - Heejae Park, Jong Kim:

PCMHoDC. A Scheme to Protect Copyright & Modification History of Digital Contents. SEC 2003: 85-96
Secure Multicast Communication and Secure Mobile Networks
- Nathan L. Clarke, Steven Furnell, Benn Lines, Paul L. Reynolds:

Using Keystroke Analysis as a Mechanism for Subscriber Authentication on Mobile Handsets. SEC 2003: 97-108 - Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis:

Introducing PKI to Enhance Security in Future Mobile Networks. SEC 2003: 109-120 - Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei:

A Time Driven Methodology for Key Dimensioning in Multicast Communications. SEC 2003: 121-132 - Claudiu Duma, Nahid Shahmehri, Patrick Lambrix:

A Flexible Category-Based Collusion-Restistant Key Management Scheme for Multicast. SEC 2003: 133-144
Security Management
- Maria Karyda, Spyros Kokolakis, Evangelos A. Kiountouzis:

Content, Context, Process Analysis of IS Security Policy Formation. SEC 2003: 145-156 - Ulrika Evertsson, Urban Örthberg, Louise Yngström:

Integrating Security into Systems Development. SEC 2003: 157-168 - Kerry-Lynn Thomson, Rossouw von Solms:

Integrating Information Security into Corporate Governance. SEC 2003: 169-180 - Meletis A. Belsis, Leonid Smalov:

Building an Enterprise IT Security Management System. SEC 2003: 181-192 - Mariki M. Eloff, Jan H. P. Eloff:

Information Security Management System: Processes and Products. SEC 2003: 193-204
Intrusion Prevention and Detection
- Scott Knight, Luciano Carosielli:

Detecting Malicious Use with Unlabelled Data Using Clustering and Outlier Analysis. SEC 2003: 205-216 - Kostas G. Anagnostakis, Spyros Antonatos, Evangelos P. Markatos, Michalis Polychronakis:

E2xB: A Domain-Specific String Matching Algorithm for Intrusion Detection. SEC 2003: 217-228 - Meng Yu, Peng Liu, Wanyu Zang:

Intrusion Masking for Distributed Atomic Operations. SEC 2003: 229-240 - Mehdi Shajari, Ali A. Ghorbani:

Using Fuzzy System to Manage False Alarms in Intrusion Detection. SEC 2003: 241-252 - James Bret Michael, Georgios Fragkos, Mikhail Auguston:

An Experiment in Software Decoy Design. SEC 2003: 253-264
Access Control Policies and Models
- Douglas E. Williams, Amgad Fayad, Sushil Jajodia, Daniel Calle:

A User Friendly Guard with Mobile Post-Release Access Control Policy. SEC 2003: 265-276 - Anas Abou El Kalam, Yves Deswarte:

Security Model for Health Care Computing and Communication Systems. SEC 2003: 277-288 - Longhua Zhang, Gail-Joon Ahn:

Constrained Role-based Delegation. SEC 2003: 289-300
Secure Information Systems
- Fredj Dridi, Michael Fischer, Günther Pernul:

CSAP - An Adaptable Security Module for the E-Government System Webocrat. SEC 2003: 301-312 - Theodore Tryfonas, Evangelos A. Kiountouzis:

Perceptions of Security Contributing to the Implementation of Secure IS. SEC 2003: 313-324 - Mikko T. Siponen:

New Directions on IS Security Methods. SEC 2003: 325-336 - Bart De Decker, Gregory Neven, Frank Piessens:

Secure Vickrey Auctions without a Trusted Third Party. SEC 2003: 337-348
Security Protocols
- Mauricio Papa, Oliver Bremer, John Hale, Sujeet Shenoi:

Integrating Logics and Process Calculi for Cryptographic Protocol Analysis. SEC 2003: 349-360 - Georgios Kalogridis, Chan Yeob Yeun, Gary Clemo:

Flexible Delegation Security for Improved Distribution in Ubiquitous Environments. SEC 2003: 361-372 - Magdy S. El-Soudani, Mohamed A. Eissa:

Cooperative Defense Firewall Protocol. SEC 2003: 373-384 - Stefan Lucks, Rüdiger Weis:

How to turn a PIN into an Iron Beam. SEC 2003: 385-396
Workshop on Information Security Management
- Lech J. Janczewski, Andrew M. Colarik:

World Framework for Security Benchmark Changes. SEC 2003: 397-400 - Cheryl Vroom, Rossouw von Solms:

Information Security: Auditing the Behaviour of the Employee. SEC 2003: 401-404 - Marcin Dobrucki, Teemupekka Virtanen:

Priorities in the Development of Network Intrusion Detection Systems. SEC 2003: 405-408 - Paul Gaunard, Eric Dubois:

Bridging the Gap between Risk Analysis and Security Policies. SEC 2003: 409-412 - Jochen Haller, Philip Robinson, Thomas Walter, Roger Kilian-Kehr:

Framework and Architecture for Secure Mobile Business Applications. SEC 2003: 413-416 - W. J. Brooks, Matthew J. Warren, William Hutchinson:

ISO 17799 and Australian Healthcare Organisations. SEC 2003: 417-420
Workshop on Privacy and Anonymity in Network & Distributed Systems
- George Danezis:

Statistical Disclosure Attacks. SEC 2003: 421-426 - Andrei Serjantov, Richard E. Newman:

On the Anonymity of Timed Pool Mixes. SEC 2003: 427-434 - R. J. Hulsebosch:

Privacy in Content Distribution Networks. SEC 2003: 435-440
Workshop on Small Systems Security
- Jaap-Henk Hoepman:

Security, Fault-Tolerance and their Verification for Ambient Systems. SEC 2003: 441-446 - Giannis Pikrammenos, Ghassan Sarkis, John Soldatos, Vasilios Anagnostopoulos:

Hidden Layer Authentication using Smart Card for WEP-based WLANS. SEC 2003: 447-451 - Jerry den Hartog, Jan Verschuren, Erik P. de Vink, Jaap de Vos, W. Wiersma:

PINPAS: A Tool for Power Analysis of Smartcards. SEC 2003: 453-457 - Yee Wei Law, Sandro Etalle, Pieter H. Hartel:

Assessing Security in Energy-Efficient Sensor Networks. SEC 2003: 459-463 - Engelbert Hubbers, Martijn Oostdijk, Erik Poll:

From Finite State Machines to Provably Correct Java Card Applets. SEC 2003: 465-470 - Bob Hulsebosch, Ernst-Jan Goedvolk, Wil Janssen:

Security Characteristics of E-Collaboration Environments. SEC 2003: 471-475 - Preetida Vinayakray-Jani:

Roadmap for Securing Handheld Devices. SEC 2003: 477-482
Workshop on Security and Control of IT in Society
- James Bret Michael, Thomas C. Wingfield:

Lawful Cyber Decoy Policy. SEC 2003: 483-488 - Juhani Paavilainen, Suzana Stojakovic-Celustka, Dagmar Brechlerova:

Electronic Signature as a part of Information Society Infrastructure. SEC 2003: 489-494

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














