


default search action
InfraSec 2002: Bristol, UK
- George I. Davida, Yair Frankel, Owen Rees:
Infrastructure Security, International Conference, InfraSec 2002 Bristol, UK, October 1-3, 2002, Proceedings. Lecture Notes in Computer Science 2437, Springer 2002, ISBN 3-540-44309-6
Biometrics
- John Armington, Purdy Ho, Paul Koznek, Richard Martinez:
Biometric Authentication in Infrastructure Security. 1-18 - Luciano Rila:
Denial of Access in Biometrics-Based Authentication Systems. 19-29
Identification, Authentication, and Process
- Carlo Blundo, Paolo D'Arco, Alfredo De Santis
, Clemente Galdi:
A Novel Approach to Proactive Password Checking. 30-39 - Jan De Clercq:
Single Sign-On Architectures. 40-58 - Marco Casassa Mont, Richard Brown:
Active Digital Credentials: Dynamic Provision of Up-to-Date Identity Information. 59-72
Analysis Process
- Stuart E. Schechter:
How to Buy Better Testing. 73-87 - Neil A. McEvoy, Andrew Whitcombe:
Structured Risk Analysis. 88-103 - E. S. Siougle, Vasilios Zorkadis:
A Model Enabling Law Compliant Privacy Protection through the Selection and Evaluation of Appropriate Security Controls. 104-114
Mobile Networks
- Prakash Reddy, Venky Krishnan, Kan Zhang, Devaraj Das:
Authentication and Authorization of Mobile Clients in Public Data Networks. 115-128 - Paulo S. Pagliusi:
A Contemporary Foreword on GSM Security. 129-144
Vulnerability Assessment and Logs
- HyungJong Kim, KyungHee Koh, DongHoon Shin, HongGeun Kim:
Vulnerability Assessment Simulation for Information Infrastructure Protection. 145-161 - Ulrich Flegel:
Pseudonymizing Unix Log Files. 162-179
System Design
- Pascal Fenkam, Harald C. Gall, Mehdi Jazayeri, Christopher Krügel:
DPS : An Architectural Style for Development of Secure Software. 180-198 - Matthias Enzmann, Thomas Kunz, Markus Schneider:
A New Infrastructure for User Tracking Prevention and Privacy Protection in Internet Shopping. 199-213 - Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta
, Humberto Martínez Barberá
, Gregorio Martínez Pérez:
Different Smartcard-Based Approaches to Physical Access Control. 214-226
Formal Methods
- Sigrid Gürgens, Peter Ochsenschläger, Carsten Rudolph:
Authenticity and Provability - A Formal Framework. 227-245 - Javier López, Juan J. Ortega, José M. Troya:
Protocol Engineering Applied to Formal Analysis of Security Systems. 246-259
Cryptographic Techniques
- Liqun Chen
, Keith Harrison, David Soldera, Nigel P. Smart:
Applications of Multiple Trust Authorities in Pairing Based Cryptosystems. 260-275 - Mark Chapman, George I. Davida:
Plausible Deniability Using Automated Linguistic Stegonagraphy. 276-287 - Taekyoung Kwon:
Virtual Software Tokens - A Practical Way to Secure PKI Roaming. 288-302 - Hyun-Sung Kim, Kee-Young Yoo:
Bit-Serial AOP Arithmetic Architectures over GF (2m). 303-313 - William A. Adamson, Olga Kornievskaia:
A Practical Distributed Authorization System for GARA. 314-324 - Javier López, José A. Montenegro, Rodrigo Roman, Jorge Dávila:
Design of a VPN Software Solution Integrating TCP and UDP Services. 325-338

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.