


default search action
SEC 2004: Toulouse, France
- Yves Deswarte, Frédéric Cuppens, Sushil Jajodia, Lingyu Wang:

Security and Protection in Information Processing Systems, IFIP 18th WorldComputer Congress, TC11 19th International Information Security Conference, 22-27 August 2004, Toulouse, France. IFIP 147, Kluwer / Springer 2004, ISBN 1-4020-8142-1 - Mohamed Hamdi, Noureddine Boudriga:

An Abstract Reduction Model for Computer Security Risk. 1-16 - Vipin Swarup:

Remediation Graphs for Security Patch Management. 17-28 - Lam-for Kwok, Dennis Longley:

Security Modelling for Risk Analysis. 29-46 - Vincenzo Ciaschini, Roberto Gorrieri:

Contrasting Malicious Java Applets by Modifying the Java Virtual Machine. 47-64 - Gerrit Rothmaier, Andre Pohl, Heiko Krumm:

Analyzing Network Management Effects with SPIN and cTLA. 65-82 - Shuo Chen, Karthik Pattabiraman, Zbigniew Kalbarczyk, Ravishankar K. Iyer:

Formal Reasoning of Various Categories of Widely Exploited Security Vulnerabilities by Pointer Taintedness Semantics. 83-100 - Vijay Masurkar, Simone Fischer-Hübner, Morton Swimmer:

Meeting the Global Challenges of Security Incident Response. 101-118 - Petri Saloma, Ronja Addams-Moring, Teemupekka Virtanen:

Security in Globally Distributed Industrial Information Systems. 119-134 - Sebastiaan H. von Solms, M. P. Hertenberger:

A Case For Information Ownership in ERP Systems. 135-150 - Hristo Koshutanski, Fabio Massacci:

Interactive Access Control for Web Services. 151-166 - Yvo Desmedt, Mike Burmester:

Identity-based Key Infrastructures (IKI). 167-176 - Hiroaki Kikuchi, Junji Nakazato:

ModInt: Compact Modular Arithmatic Class Library Available on Cellular Phone and its Application to Secure Electronic Voting System. 177-192 - Semir Daskapan:

Dependable Security by Twisted Secret Sharing. 193-208 - Eric Totel, Bernard Vivinis, Ludovic Mé:

A Language Driven IDS for Event and Alert Correlation. 209-224 - Danny Nebenzahl, Avishai Wool

:
Install-time Vaccination of Windows Executables to Defend Against Stack Smashing Attacks. 225-240 - Yacine Bouzida, Sylvain Gombault:

Eigenconnections to Intrusion Detection. 241-258 - Stefan Axelsson:

Visualising Intrusions: Watching the Webserver. 259-274 - Paul Dowland

, Steven Furnell:
A Long-term Trial of Keystroke Profiling using Digraph, Trigraph and Keyword Latencies. 275-290 - Martín Abadi:

Trusted Computing, Trusted Third Parties, and Verified Communications. 291-308 - Andrew Fritz, Jehan-François Pâris:

Maille Authentication - A Novel Protocol for Distributed Authentication. 309-322 - Yong Song, Victor C. M. Leung, Konstantin Beznosov:

Supporting End-to-end Security across Proxies with Multiple-Channel SSL. 323-338 - Pei-Ling Yu, Pan-Lung Tsai, Chin-Laung Lei:

A Content-Protection Scheme for Multi-Layered Reselling Structure. 339-350 - Konstantinos Rantos, Constantinos Markantonakis:

An Asymmetric Cryptography Secure Channel Protocol for Smart Cards. 351-366 - Antti Nuopponen, Sami Vaarala, Teemupekka Virtanen:

IPsec Clustering. 367-380 - Olivier Heen, Jean-Pierre Andreaux, Nicolas Prigent:

Improving Secure Device Insertion in Home Ad-hoc Networks Keyword Latencies. 381-394 - Flavio D. Garcia, Jaap-Henk Hoepman, Jeroen van Nieuwenhuizen:

Spam Filter Analysis. 395-410 - Indrajit Ray, Eunjong Kim:

Collective Signature for Efficient Authentication of XML Documents. 411-424 - Prakash Reddy, Robert N. Mayo, Eamonn O'Brien-Strain, Jim Rowson, Yuhong Xiong:

Updating Encrypted XML Documents on Untrusted Machines. 425-440 - Lubica Liskova, Martin Stanek:

Efficient Simultaneous Contract Signing. 441-456 - Jacques Demerjian, Ahmed Serhrouchni:

DHCP Authentication Using Certificates. 457-472 - Aleksey Kurchuk, Angelos D. Keromytis:

Recursive Sandboxes: Extending Systrace To Empower Applications. 473-488 - Vipul Goyal:

Fast Digital Certificate Revocation. 489-500 - Robert Pinto, Lucila Ishitani, Virgílio A. F. Almeida, Wagner Meira Jr., Fabiano A. Fonseca, Fernando D. O. Castro:

MASKS: Managing Anonymity while Sharing Knowledge to Servers. 501-516 - Idir Fodil, Vincent Jardin:

Security and Differentiated Hotspot Services Through Policy-based Management Architecture. 517-532 - Ayan Roy Chowdhury, John S. Baras:

Key Management for Secure Multicast in Hybrid Satellite Networks. 533-548

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














