


default search action
SECRYPT 2006: Setúbal, Portugal
- Manu Malek, Eduardo Fernández-Medina, Javier Hernando:

SECRYPT 2006, Proceedings of the International Conference on Security and Cryptography, Setúbal, Portugal, August 7-10, 2006, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications. INSTICC Press 2006, ISBN 972-8865-63-5
Invited Speakers
Keynote Lectures
- David A. Marca:

E-Business Strategy - Charting a Way through Uncertain Waters of Electronic Commerce. SECRYPT 2006 - Manu Malek:

IT Security Forensics: Promises and Shortcomings. SECRYPT 2006 - Les Barclay:

Wireless Communications, a new Emphasis for Effective Use of the Radio Spectrum. SECRYPT 2006 - Fernando Pereira:

Multimedia Representation in MPEG Standards: Achievements and Challenges. SECRYPT 2006 - Jan Jürjens:

Model-Based Security Engineering. SECRYPT 2006 - Anisse Taleb:

Advances in Speech and Audio Coding and its Applications for Mobile Multimedia. SECRYPT 2006 - Thomas Greene:

Redefining the Market Place: Only the Numbers are Different? SECRYPT 2006
Tutorial
- David A. Marca:

Project Management for E-Business Initiatives . Project Framework, Proven Practices, Coordinated Work, Focused Sub-Teams. SECRYPT 2006
Access Control and Intrusion Detection
Full Papers
- Behnam Sattarzadeh, Mahdi Asadpour, Rasool Jalili:

Security Enhancement for a Low Computation Cost User Authentication Scheme. SECRYPT 2006: 5-8 - R. Ricci, Gérard Chollet, M. V. Crispino, Sabah Jassim, Jacques C. Koreman, Andrew C. Morris, M. Olivar-Dimas, Sonia Garcia-Salicetti, Pedro Soria-Rodriguez:

The "SECUREPHONE" - A Mobile Phone with Biometric Authentication and e-Signature Support for Dealing Secure Transactions on the Fly. SECRYPT 2006: 9-16 - Javier Hernando, Mireia Farrús, Pascual Ejarque, Ainara Garde, Jordi Luque:

Person Verification by Fusion of Prosodic, Voice Spectral and Facial Parameters. SECRYPT 2006: 17-23 - Najla Arfaoui, Farah Jemili, Montaceur Zaghdoud, Mohamed Ben Ahmed:

Comparative Study between Bayesian Network and Possibilistic Network in Intrusion Detection. SECRYPT 2006: 24-31 - Nathalie Dagorn:

Intrusion Detection for Web Applications (Short Version). SECRYPT 2006: 32-39 - Zouheir Trabelsi, Khaled Shuaib:

Spoofed ARP Packets Detection in Switched LAN Networks. SECRYPT 2006: 40-47 - Abdoul Karim Ganame, Julien Bourgeois, Renaud Bidou, François Spies:

Evaluation of the Intrusion Detection Capabilities and Performance of a Security Operation Center. SECRYPT 2006: 48-55 - Juan Manuel García, Tomás Navarrete, Carlos Orozco:

Workload Hidden Markov Model for Anomaly Detection. SECRYPT 2006: 56-59
Short Papers
- Marianne Azer, Sherif El-Kassas, Magdy S. El-Soudani:

Using Attack Graphs in Ad Hoc Networks - For Intrusion Prediction Correlation and Detection. SECRYPT 2006: 63-68 - Chunren Lai, Chang N. Zhang:

Quantitative Analysis and Enforcement of the Principle of Least Privilege in Role-Based. SECRYPT 2006: 69-74 - Kun Huang, Dafang Zhang:

On the Self-Similarity of the 1999 DARPA/Lincoln Laboratory Evaluation Data. SECRYPT 2006: 75-79
Posters
- Wenhua Qi:

Access Control and Joint Management for Collaborative Peer Groups. SECRYPT 2006: 83-86 - Ahmed Réda Kaced, Jean-Claude Moissinac:

Protecting Adaptive Multimedia Delivery and Adaptation Using Proxy Based Approach. SECRYPT 2006: 87-90 - Rafael Martínez-Peláez, Francisco Rico-Novella, Luis A. Zarza-López:

Digital Pseudonym Identity for E-Commerce. SECRYPT 2006: 91-94
Network Security and Protocols
Full Papers
- Gregory V. Bard:

A Challenging but Feasible Blockwise-Adaptive Chosen-Plaintext Attack on SSL. SECRYPT 2006: 99-109 - Ines Feki, Xiaoli Zheng, Mohammed Achemlal, Ahmed Serhrouchni:

Internet Routing Security: An Approach to Detect and to React to Incorrect Advertisements. SECRYPT 2006: 110-117 - Amir Herzberg, Igal Yoffe:

Layered Architecture for Secure E-Commerce Applications. SECRYPT 2006: 118-125 - Adam Wierzbicki:

Trust Management without Reputation in P2P Games. SECRYPT 2006: 126-134 - Chuan-Wen Loe, Khoongming Khoo:

Protecting Cipher Block Chaining Against Adaptive Chosen Plaintext Attack. SECRYPT 2006: 135-140 - Kan Yasuda, Kazumaro Aoki, Eiichiro Fujisaki, Atsushi Fujioka:

Forward-Secure Authenticated-Encryption in Multi-Receiver Setting. SECRYPT 2006: 141-148 - Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro:

On the Design of a Low-Rate DoS Attack Against Iterative Servers. SECRYPT 2006: 149-156 - Pascal Urien, Mohamad Badra:

Secure Access Modules for Identity Protection over the EAP-TLS - Smartcard Benefits for User Anonymity in Wireless Infrastructures. SECRYPT 2006: 157-163
Short Papers
- Adrian Leung, Chris J. Mitchell:

A Service Discovery Threat Model for Ad Hoc Networks. SECRYPT 2006: 167-174 - Rehab K. El Nemr, Imane Aly Saroit Ismail, S. H. Ahmed:

Action-Triggered Public-Key System for GSM Using RSA with Phone-Dependent Encryption. SECRYPT 2006: 175-182 - Steffen Fries:

Security Considerations in Current VoIP Protocols. SECRYPT 2006: 183-191 - Ventzislav Nikov:

A DoS Attack Against the Integrity-Less ESP (IPSEC). SECRYPT 2006: 192-199
Posters
- Antonio Ruiz-Martínez, Antonio Fernandez Gómez-Skarmeta, Óscar Cánovas Reverte:

Combination of a Smartcard E-Purse and E-Coin to Make Electronic Payments on the Internet. SECRYPT 2006: 203-206 - Stefan Rass, Mohamed Ali Sfaxi, Solange Ghernaouti-Helie:

Achieving Unconditional Security in Existing Networks Using Quantum Cryptography. SECRYPT 2006: 207-210 - M. Amaç Güvensan, Ali Gökhan Yavuz:

Protocol Independent Lightweight Secure Communication. SECRYPT 2006: 211-217
Cryptographic Techniques and Key Management
Full Papers
- Hongxia Jin, Jeffrey B. Lotspiech, Mario Blaum:

Traitor Tracing for Subscription-Based Systems. SECRYPT 2006: 223-228 - Carlos Serrão, Miguel Sales Dias, Jaime Delgado:

Digital Object Rights Management - Interoperable Client-side DRM Middleware. SECRYPT 2006: 229-236 - Robert P. McEvoy, Colin C. Murphy:

Efficient All-or-Nothing Encryption Using CTR Mode. SECRYPT 2006: 237-245 - Lars R. Knudsen, Søren S. Thomsen:

Proposals for Iterated Hash Functions. SECRYPT 2006: 246-253 - Christophe Nègre:

Parallel Multiplication in F2n Using Condensed Matrix Representation. SECRYPT 2006: 254-259 - Markku-Juhani Olavi Saarinen:

Chosen-IV Statistical Attacks on eStream Ciphers. SECRYPT 2006: 260-266 - Wang Lianhai, Manu Malek:

Digital Contract Signature Scheme Based on Multiple Cryptosystem. SECRYPT 2006: 267-274
Short Papers
- Bartek Gedrojc, Kathy Cartrysse, Jan C. A. van der Lubbe:

Private Bidding for Mobile Agents. SECRYPT 2006: 277-282 - Hiroshi Toyoizumi:

An Infinite Phase-Size BMAP/M/1 Queue and its Application to Secure Group Communication. SECRYPT 2006: 283-288 - Christian Veigner, Chunming Rong:

On Use of Identity-Based Encryption for Secure Emailing. SECRYPT 2006: 289-296 - Chun-Hua Chen, Gwoboa Horng:

More Robust Private Information. SECRYPT 2006: 297-302 - Dumitru Dan Burdescu, Liana Stanescu:

An Algorithm for Authentication of Digital Images. SECRYPT 2006: 303-308
Posters
- Francisco Pimenta, Carlos Serrão:

Using OMA DRM 2.0 Protected Content - Ogg Vorbis Protected Audio under Symbian OS. SECRYPT 2006: 311-315 - Luis Zarza, Josep Pegueroles, Miguel Soriano, Rafael Martínez:

Design of Cryptographic Protocols by Means of Genetic Algorithms Techniques. SECRYPT 2006: 316-319 - Christophe Nègre:

Finite Field Multiplication in Lagrange Representation Using Fast Fourrier Transform. SECRYPT 2006: 320-323
Information Assurance
Full Papers
- Domenico Introna, Francescomaria Marino:

JASTEG2000 - Steganography for JPEG2000 Coded Images. SECRYPT 2006: 329-336
Short Papers
- Igor V. Kotenko, Mikhail Stepashkin:

Network Security Evaluation Based on Simulation of Malfactor's Behavior. SECRYPT 2006: 339-344
Posters
- Chun Qi, Haitao Zhou, Bin Long:

Smooth Blocks-Based Blind Watermarking Algorithm in Compressed DCT Domain. SECRYPT 2006: 347-350
Security in Information Systems
Full Papers
- Timothy E. Levin, Cynthia E. Irvine, Thuy D. Nguyen:

Least Privilege in Separation Kernels. SECRYPT 2006: 355-362 - Richard Whittaker, Gonzalo Argote-Garcia, Peter J. Clarke, Raimund K. Ege:

Collaboration Security for Modern Information Systems. SECRYPT 2006: 363-370 - Zheng Zhang, Walid Rjaibi:

Inter-Node Relationship Labeling: A Fine-Grained XML Access Control Implementation Using Generic Security Labels. SECRYPT 2006: 371-378 - Manuel Sánchez, Gabriel López, Antonio Fernandez Gómez-Skarmeta, Óscar Cánovas Reverte:

Using Microsoft Office Infopath to Generate XACML Policies. SECRYPT 2006: 379-386 - Jarrod Trevathan, Wayne Read:

Secure Online English Auctions. SECRYPT 2006: 387-396 - Masaki Inamura, Toshiaki Tanaka, Toshiyuki Fujisawa, Kazuto Ogawa, Takeshi Kimura:

Flexible License Transfer System Using Mobile Terminal. SECRYPT 2006: 397-404
Short Papers
- Takahito Tsukuba, Kenichiro Noguchi:

Extending XML Signature and Applying it to Web Page Signing. SECRYPT 2006: 407-412 - Kari Anne Haaland, Chunming Rong:

Securing Web Services Using Identity-Based Encryption (IBE). SECRYPT 2006: 413-418 - David Garcia Rosado, Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini:

Defining Viewpoints for Security Architectural Patterns. SECRYPT 2006: 419-424 - Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini:

Security Risk Analysis in Web Services Systems. SECRYPT 2006: 425-430 - Zaobin Gan, Vijay Varadharajan:

Design and Implementation of a Practical Secure Distributed Healthcare Application. SECRYPT 2006: 431-436 - Zaobin Gan, Dengwei Wei, Vijay Varadharajan:

Improving Software Security Through an Integrated Approach. SECRYPT 2006: 437-442 - Seyed Hamed Hassani, Mohammad Reza Aref:

A New (t, n) Multi-Secret Sharing Scheme Based on Linear Algebra. SECRYPT 2006: 443-449 - Jarrod Trevathan, Wayne Read:

Undesirable and Fraudulent Behaviour in Online Auctions. SECRYPT 2006: 450-458 - Sharon Nachtigal, Chris J. Mitchell:

Modelling E-Business Security Using Business Processes. SECRYPT 2006: 459-464
Posters
- Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini:

Secure Information Systems Development - Based on a Security Requirements Engineering Process. SECRYPT 2006: 467-470 - Yi-qun Zhu, Jianhua Li, Quan-hai Zhang:

An Extended Role-Based Access Control for Web Services. SECRYPT 2006: 471-474

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














