


default search action
4th SECURWARE 2010: Venice, Italy
- Reijo Savola, Masaru Takesue, Rainer Falk, Manuela Popescu:

Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010. IEEE Computer Society 2010, ISBN 978-1-4244-7517-9
SYSSEC
- Keunwoo Rhee, Byunghee Lee, Dongho Won, Hac Yun Na, Seungjoo Kim

:
Vulnerabilities and Improvements of Du-Xiao-Chen-Wu's Secure Cell Relay Routing Protocol for Sensor Networks. 1-4 - Donghai Tian, Deguang Kong, Changzhen Hu, Peng Liu:

Protecting Kernel Data through Virtualization Technology. 5-10 - Jonathan Rouzaud-Cornabas, Patrice Clemente

, Christian Toinard:
An Information Flow Approach for Preventing Race Conditions: Dynamic Protection of the Linux OS. 11-16 - Sarosh Hashmi, John Brooke:

Towards Sybil Resistant Authentication in Mobile Ad Hoc Networks. 17-24
SECDYN & SECMAN
- Reijo M. Savola, Petri Heinonen:

Security-Measurability-Enhancing Mechanisms for a Distributed Adaptive Security Monitoring System. 25-34 - Jin Tamura:

Improving the Efficiency of a Highly-Used Access Control Scheme. 35-39 - Homam El-Taj

, Omar Abouabdalla
, Ahmed Manasrah, Ahmed Al-Madi, Muhammad Imran Sarwar, Sureswaran Ramadass:
Forthcoming Aggregating Intrusion Detection System Alerts Framework. 40-44 - Manfred Schäfer, Wolf-Dietrich Moeller:

Strategies for Managed Software Integrity Protection. 45-50 - Bilal Khan, Muhammad Khurram Khan

, Maqsood Mahmud
, Khaled Alghathbar:
Security Analysis of Firewall Rule Sets in Computer Networks. 51-56
ARCH I
- Pierre de Leusse, Theo Dimitrakos

:
SOA-Based Security Governance Middleware. 57-62 - Tewfiq El Maliki

, Jean-Marc Seigneur
:
A Security Adaptation Reference Monitor (SARM) for Highly Dynamic Wireless Environments. 63-68 - Dongkyun Ahn, Gyungho Lee:

Prospect of Fine Grain Dynamic Memory Access Control with Profiling. 69-74 - Anders Fongen:

Identity Management without Revocation. 75-81
SECTECH
- Pierluigi Failla:

Heuristic Search in Encrypted Graphs. 82-87 - Francesco Beritelli, Salvatore Casale, Rosario Grasso, Andrea Spadaccini:

Performance Evaluation of SNR Estimation Methods in Forensic Speaker Recognition. 88-92 - Francesco Beritelli, Andrea Spadaccini:

A Statistical Approach to Biometric Identity Verification Based on Heart Sounds. 93-96 - Rainer Falk, Hans-Joachim Hof

:
Industrial Sensor Network Security Architecture. 97-102
INFOSEC I
- Cagatay Karabat

, Mehmet Keskinöz
:
Blind Detectors in Spread Spectrum Watermarking for Interference Reduction. 103-108 - Wolfgang Boehmer:

Analysis of Strongly and Weakly Coupled Management Systems in Information Security. 109-116 - Cynthia Y. Lester:

Shifting the Paradigm: Training Undergraduate Students in Software Security. 117-122
INFOSEC II
- Tamás Paulik, Ádám Máté Földes, Gábor György Gulyás:

BlogCrypt: Private Content Publishing on the Web. 123-128 - Xavier Titi, Jean-Marc Seigneur

:
Verifying Hotspot Quality User Rating with Certified QoS Evidence. 129-134 - Ahlem Bouchahda, Nhan Le Thanh, Adel Bouhoula

, Faten Labbene:
RBAC+: Dynamic Access Control for RBAC-Administered Web-Based Databases. 135-140 - Pekka Pietikäinen

, Kati Karjalainen, Juha Röning
, Juhani Eronen:
Socio-technical Security Assessment of a VoIP System. 141-147
MALWA I
- Ravishankar Borgaonkar

:
An Analysis of the Asprox Botnet. 148-153 - Jaziar Radianti

:
Eliciting Information on the Vulnerability Black Market from Interviews. 154-159 - Masaru Takesue:

Cascaded Simple Filters for Accurate and Lightweight Email-Spam Detection. 160-165 - Jonas Pfoh, Christian A. Schneider, Claudia Eckert:

Exploiting the x86 Architecture to Derive Virtual Machine State Information. 166-175
MALWA II & CYBER-Threat
- Alireza Shahrestani, Maryam Feily, Rodina Binti Ahmad

, Sureswaran Ramadass:
Discovery of Invariant Bot Behavior through Visual Network Monitoring System. 182-188 - Jaziar Radianti

:
A Study of a Social Behavior inside the Online Black Markets. 189-194 - Thomas C. Ormerod

, Lingyu Wang, Mourad Debbabi
, Amr M. Youssef, Hamad Binsalleeh
, Amine Boukhtouta, Prosenjit Sinha:
Defaming Botnet Toolkits: A Bottom-Up Approach to Mitigating the Threat. 195-200
CRYPTO
- Kun Peng, Feng Bao:

A Shuffling Scheme with Strict and Strong Security. 201-206 - Daniel Hartung, Christoph Busch:

Biometric Transaction Authentication Protocol. 207-215 - Abdel Alim Kamal, Amr M. Youssef:

Applications of SAT Solvers to AES Key Recovery from Decayed Key Schedule Images. 216-220 - Sedat Soydan:

Analyzing the DPA Leakage of the Masked S-box via Digital Simulation and Reducing the Leakage by Inserting Delay Cells. 221-227 - Fan Wu, Chung-Han Chen, Hira N. Narang:

An Efficient Acceleration of Symmetric Key Cryptography Using General Purpose Graphics Processing Unit. 228-233
SECHOME
- Mohit Soni, Sandesh Gupta

, M. S. Rao, Phalguni Gupta:
An Efficient Vein Pattern-Based Recognition System. 234-239 - Hiroto Kakiuchi, Takao Kawamura, Toshihiko Sasama, Kazunori Sugahara:

Detection Methods Improving Reliability of Automatic Human Tracking System. 240-246 - Francisco José Bellido Outeiriño

, Pedro Canales Aranda, José Luis de la Cruz Fernández, Benito Pérez Jarauta:
Universal Bluetooth Access Control and Security System for e-Keys Enviroments. 247-250 - Ali Ahmed

, Ning Zhang
:
An Access Control Architecture for Context-Risk-Aware Access Control: Architectural Design and Performance Evaluation. 251-260
ARCH II
- Boulares Ouchenne, Ousmane Koné:

A Security Control Architecture for SOAP-Based Services. 261-265 - Danilo Valeros Bernardo, Doan Hoang:

Protecting Next Generation High Speed Network Protocol - UDT through Generic Security Service Application Program Interface - GSS-API. 266-272 - Mathieu Blanc, Jérémy Briffaut, Thibault Coullet, Maxime Fonda, Christian Toinard:

Protection of a Shared HPC Cluster. 273-279 - S. Hasan Mirjalili, Arjen K. Lenstra:

Towards a Structural Secure Design Process. 280-286

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














