Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/sec/sec2008.bht:"
@inproceedings{DBLP:conf/sec/AhnKS08, author = {Gail{-}Joon Ahn and Moonam Ko and Mohamed Shehab}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {Portable User-Centric Identity Management}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {573--587}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_37}, doi = {10.1007/978-0-387-09699-5\_37}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/AhnKS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/AlawnehA08, author = {Muntaha Alawneh and Imad M. Abbadi}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {Software Licence Protection and Management for Organisations}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {509--523}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_33}, doi = {10.1007/978-0-387-09699-5\_33}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/AlawnehA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/AlthebyanP08, author = {Qutaibah Althebyan and Brajendra Panda}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {A Knowledge-Based Bayesian Model for Analyzing a System after an Insider Attack}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {557--571}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_36}, doi = {10.1007/978-0-387-09699-5\_36}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/AlthebyanP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/BaekTZW08, author = {Joonsang Baek and Han Chiang Tan and Jianying Zhou and Jun Wen Wong}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {Realizing Stateful Public Key Encryption in Wireless Sensor Network}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {95--107}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_7}, doi = {10.1007/978-0-387-09699-5\_7}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/BaekTZW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/BattistoniBPFM08, author = {Roberto Battistoni and Alessandro Di Biagio and Roberto Di Pietro and Matteo Formica and Luigi V. Mancini}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {A Live Digital Forensic system for Windows networks}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {653--667}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_42}, doi = {10.1007/978-0-387-09699-5\_42}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/BattistoniBPFM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/BellettiniR08, author = {Carlo Bellettini and Julian L. Rrushi}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {A Product Machine Model for Anomaly Detection of Interposition Attacks on Cyber-Physical Systems}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {285--300}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_19}, doi = {10.1007/978-0-387-09699-5\_19}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/BellettiniR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/BenferhatT08, author = {Salem Benferhat and Karim Tabia}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {Classification features for detecting Server-side and Client-side Web attacks}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {729--733}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_53}, doi = {10.1007/978-0-387-09699-5\_53}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/BenferhatT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/ColajanniGM08, author = {Michele Colajanni and Daniele Gozzi and Mirco Marchetti}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {Collaborative architecture for malware detection and analysis}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {79--93}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_6}, doi = {10.1007/978-0-387-09699-5\_6}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/ColajanniGM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/ColantonioPO08, author = {Alessandro Colantonio and Roberto Di Pietro and Alberto Ocello}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {Leveraging Lattices to Improve Role Mining}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {333--347}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_22}, doi = {10.1007/978-0-387-09699-5\_22}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/ColantonioPO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/CramptonL08, author = {Jason Crampton and Hoon Wei Lim}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {Role Signatures for Access Control in Open Distributed Systems}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {205--220}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_14}, doi = {10.1007/978-0-387-09699-5\_14}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/CramptonL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/Cuppens-BoulahiaCHD08, author = {Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Diala Abi Haidar and Herv{\'{e}} Debar}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {Negotiation of Prohibition: An Approach Based on Policy Rewriting}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {173--187}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_12}, doi = {10.1007/978-0-387-09699-5\_12}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sec/Cuppens-BoulahiaCHD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/DadeauPT08, author = {Fr{\'{e}}d{\'{e}}ric Dadeau and Marie{-}Laure Potet and R{\'{e}}gis Tissot}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {A {B} Formal Framework for Security Developments in the Domain of Smart Card Applications}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {141--155}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_10}, doi = {10.1007/978-0-387-09699-5\_10}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/DadeauPT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/DavanzoMB08, author = {Giorgio Davanzo and Eric Medvet and Alberto Bartoli}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {A Comparative Study of Anomaly Detection Techniques in Web Site Defacement Detection}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {711--716}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_50}, doi = {10.1007/978-0-387-09699-5\_50}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sec/DavanzoMB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/DessiFB08, author = {Nicoletta Dess{\`{\i}} and Maria Grazia Fugini and R. A. Balachandar}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {Policies and Security Aspects For Distributed Scientific Laboratories}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {221--235}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_15}, doi = {10.1007/978-0-387-09699-5\_15}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/DessiFB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/Dondo08, author = {Maxwell G. Dondo}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {A Vulnerability Prioritization System Using {A} Fuzzy Risk Analysis Approach}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {525--540}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_34}, doi = {10.1007/978-0-387-09699-5\_34}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/Dondo08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/DritsasSTMG08, author = {Stelios Dritsas and Yannis Soupionis and Marianthi Theoharidou and Yannis Mallios and Dimitris Gritzalis}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {{SPIT} Identification Criteria Implementation: Effectiveness and Lessons Learned}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {381--395}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_25}, doi = {10.1007/978-0-387-09699-5\_25}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/DritsasSTMG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/EspelidNKH08, author = {Yngve Espelid and Lars{-}Helge Netland and Andr{\'{e}} N. Klingsheim and Kjell J{\o}rgen Hole}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {Robbing Banks with Their Own Software-an Exploit Against Norwegian Online Banks}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {63--77}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_5}, doi = {10.1007/978-0-387-09699-5\_5}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/EspelidNKH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/FujiharaMY08, author = {Yasuhiro Fujihara and Yuko Murayama and Kentarou Yamaguchi}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {A user survey on the sense of security, Anshin}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {699--703}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_48}, doi = {10.1007/978-0-387-09699-5\_48}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/FujiharaMY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/Gkoulalas-DivanisV08, author = {Aris Gkoulalas{-}Divanis and Vassilios S. Verykios}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {A Parallelization Framework for Exact Knowledge Hiding in Transactional Databases}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {349--363}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_23}, doi = {10.1007/978-0-387-09699-5\_23}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/Gkoulalas-DivanisV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/GuptaNR08, author = {Kapil Kumar Gupta and Baikunth Nath and Kotagiri Ramamohanarao}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {User Session Modeling for Effective Application Intrusion Detection}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {269--284}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_18}, doi = {10.1007/978-0-387-09699-5\_18}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/GuptaNR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/HamiltonH08, author = {Samuel N. Hamilton and Wendy L. Hamilton}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {Adversary Modeling and Simulation in Cyber Warfare}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {461--475}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_30}, doi = {10.1007/978-0-387-09699-5\_30}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/HamiltonH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/HanKL08, author = {Jeheon Han and Jonghoon Kwon and Heejo Lee}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {HoneyID : Unveiling Hidden Spywares by Generating Bogus Events}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {669--673}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_43}, doi = {10.1007/978-0-387-09699-5\_43}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/HanKL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/HayDN08, author = {Brian Hay and Ronald Dodge and Kara L. Nance}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {Using Virtualization to Create and Deploy Computer Security Lab Exercises}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {621--635}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_40}, doi = {10.1007/978-0-387-09699-5\_40}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/HayDN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/HerleyF08, author = {Cormac Herley and Dinei A. F. Flor{\^{e}}ncio}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {Protecting Financial Institutions from Brute-Force Attacks}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {681--685}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_45}, doi = {10.1007/978-0-387-09699-5\_45}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/HerleyF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/JinLM08, author = {Hongxia Jin and Jeffery Lotspiech and Nimrod Megiddo}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {Efficient Coalition Detection in Traitor Tracing}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {365--380}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_24}, doi = {10.1007/978-0-387-09699-5\_24}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/JinLM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/Kerschbaum08, author = {Florian Kerschbaum}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {Practical Privacy-Preserving Benchmarking}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {17--31}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_2}, doi = {10.1007/978-0-387-09699-5\_2}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/Kerschbaum08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/LiWZZ08, author = {Wei Li and Lingyu Wang and Bo Zhu and Lei Zhang}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {An Integrity Lock Architecture for Supporting Distributed Authorizations in Database Federations}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {189--203}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_13}, doi = {10.1007/978-0-387-09699-5\_13}, timestamp = {Thu, 15 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/LiWZZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/LongleyBCK08, author = {Dennis Longley and Mark Branagan and William J. Caelli and Lam{-}for Kwok}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {Feasibility of Automated Information Security Compliance Auditing}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {493--508}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_32}, doi = {10.1007/978-0-387-09699-5\_32}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/LongleyBCK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/MajorczykTMS08, author = {Fr{\'{e}}d{\'{e}}ric Majorczyk and Eric Totel and Ludovic M{\'{e}} and Ayda Sa{\"{\i}}dane}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {Anomaly Detection with Diagnosis in Diversified Systems using Information Flow Graphs}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {301--315}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_20}, doi = {10.1007/978-0-387-09699-5\_20}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/MajorczykTMS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/MetayerL08, author = {Daniel Le M{\'{e}}tayer and Claire Loiseaux}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {{ASTRA} : {A} Security Analysis Method Based on Asset Tracking}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {541--555}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_35}, doi = {10.1007/978-0-387-09699-5\_35}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/MetayerL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/NeubauerEF08, author = {Thomas Neubauer and Andreas Ekelhart and Stefan Fenz}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {Interactive Selection of {ISO} 27001 Controls under Multiple Objectives}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {477--492}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_31}, doi = {10.1007/978-0-387-09699-5\_31}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/NeubauerEF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/NguyenAB08, author = {Kien C. Nguyen and Tansu Alpcan and Tamer Basar}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {A Decentralized Bayesian Attack Detection Algorithm for Network Security}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {413--428}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_27}, doi = {10.1007/978-0-387-09699-5\_27}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/NguyenAB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/NohlE08, author = {Karsten Nohl and David Evans}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {Hiding in Groups: On the Expressiveness of Privacy Distributions}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {1--15}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_1}, doi = {10.1007/978-0-387-09699-5\_1}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/NohlE08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/OualhaOR08, author = {Nouha Oualha and Melek {\"{O}}nen and Yves Roudier}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {A Security Protocol for Self-Organizing Data Storage}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {675--679}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_44}, doi = {10.1007/978-0-387-09699-5\_44}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/OualhaOR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/PanHV08, author = {Jing Pan and J. I. den Hartog and Erik P. de Vink}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {An Operation-Based Metric for {CPA} Resistance}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {429--443}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_28}, doi = {10.1007/978-0-387-09699-5\_28}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/PanHV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/PivaOCBB08, author = {Alessandro Piva and Claudio Orlandi and Michele Caini and Tiziano Bianchi and Mauro Barni}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {Enhancing Privacy in Remote Data Classification}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {33--46}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_3}, doi = {10.1007/978-0-387-09699-5\_3}, timestamp = {Tue, 18 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sec/PivaOCBB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/PosthumusS08, author = {Shaun Posthumus and Rossouw von Solms}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {Agency Theory: Can it be Used to Strengthen {IT} Governance?}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {687--691}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_46}, doi = {10.1007/978-0-387-09699-5\_46}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/PosthumusS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/RaguenetM08, author = {Inez Raguenet and Carlos Maziero}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {A Fuzzy Model for the Composition of Intrusion Detectors}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {237--251}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_16}, doi = {10.1007/978-0-387-09699-5\_16}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/RaguenetM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/RayC08, author = {Indrajit Ray and Sudip Chakraborty}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {Facilitating Privacy Related Decisions in Different Privacy Contexts on the Internet by Evaluating Trust in Recipients of Private Data}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {605--620}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_39}, doi = {10.1007/978-0-387-09699-5\_39}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/RayC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/RekhisKB08, author = {Slim Rekhis and Jih{\`{e}}ne Krich{\`{e}}ne and Noureddine Boudriga}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {DigForNet: Digital Forensic in Networking}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {637--651}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_41}, doi = {10.1007/978-0-387-09699-5\_41}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sec/RekhisKB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/SanchezCLG08, author = {Manuel S{\'{a}}nchez and {\'{O}}scar C{\'{a}}novas Reverte and Gabriel L{\'{o}}pez and Antonio Fernandez G{\'{o}}mez{-}Skarmeta}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {Managing the lifecycle of {XACML} delegation policies in federated environments}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {717--721}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_51}, doi = {10.1007/978-0-387-09699-5\_51}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sec/SanchezCLG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/SaraydaryanPLU08, author = {Jacques Saraydaryan and Luc Paffumi and V{\'{e}}ronique Legrand and St{\'{e}}phane Ub{\'{e}}da}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {Behavioral Intrusion Detection Indicators}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {317--331}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_21}, doi = {10.1007/978-0-387-09699-5\_21}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/SaraydaryanPLU08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/SchefflerGS08, author = {Thomas Scheffler and Stefan Gei{\ss} and Bettina Schnor}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {An Implementation of a Privacy Enforcement Scheme based on the Java Security Framework using {XACML} Policies}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {157--171}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_11}, doi = {10.1007/978-0-387-09699-5\_11}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/SchefflerGS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/SeoLN08, author = {Dongwon Seo and Heejo Lee and Ejovi Nuwere}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {Detecting More {SIP} Attacks on VoIP Services by Combining Rule Matching and State Transition Models}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {397--411}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_26}, doi = {10.1007/978-0-387-09699-5\_26}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/SeoLN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/Strangio08, author = {Maurizio Adriano Strangio}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {Establishing secure links in low-rate wireless personal area networks}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {109--123}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_8}, doi = {10.1007/978-0-387-09699-5\_8}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/Strangio08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/TengHP08, author = {Po{-}Yuan Teng and Shih{-}I Huang and Adrian Perrig}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {Multi-Layer Encryption for Multi-Level Access Control in Wireless Sensor Networks}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {705--709}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_49}, doi = {10.1007/978-0-387-09699-5\_49}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/TengHP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/TjhaiPFC08, author = {Gina C. Tjhai and Maria Papadaki and Steven Furnell and Nathan L. Clarke}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {Investigating the problem of {IDS} false alarms: An experimental study using Snort}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {253--267}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_17}, doi = {10.1007/978-0-387-09699-5\_17}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/TjhaiPFC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/TsakountakisKG08, author = {Alexandros Tsakountakis and Georgios Kambourakis and Stefanos Gritzalis}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {A new Accounting Mechanism for Modern and Future {AAA} Services}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {693--697}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_47}, doi = {10.1007/978-0-387-09699-5\_47}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/TsakountakisKG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/TsangS08, author = {Patrick P. Tsang and Sean W. Smith}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {{YASIR:} {A} Low-Latency, High-Integrity Security Retrofit for Legacy {SCADA} Systems}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {445--459}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_29}, doi = {10.1007/978-0-387-09699-5\_29}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/TsangS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/VerslypeD08, author = {Kristof Verslype and Bart De Decker}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {Ubiquitous Privacy-Preserving Identity Managment}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {589--603}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_38}, doi = {10.1007/978-0-387-09699-5\_38}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/VerslypeD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/WuYB08, author = {Yongdong Wu and Haixia Yao and Feng Bao}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {Minimizing {SSO} Effort in Verifying {SSL} Anti-phishing Indicators}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {47--61}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_4}, doi = {10.1007/978-0-387-09699-5\_4}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/WuYB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/YeeKS08, author = {George O. M. Yee and Larry Korba and Ronggong Song}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {Assessing the Likelihood of Privacy Policy Compliance}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {723--727}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_52}, doi = {10.1007/978-0-387-09699-5\_52}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/YeeKS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/ZhouDL08, author = {Jianying Zhou and Tanmoy Kanti Das and Javier L{\'{o}}pez}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {An Asynchronous Node Replication Attack in Wireless Sensor Networks}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {125--139}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_9}, doi = {10.1007/978-0-387-09699-5\_9}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/ZhouDL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sec/2008, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, publisher = {Springer}, year = {2008}, isbn = {978-0-387-09698-8}, timestamp = {Wed, 17 Sep 2008 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.