default search action
MMM-ACNS 2003: St. Petersburg, Russia
- Vladimir Gorodetsky, Leonard J. Popyack, Victor A. Skormin:
Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings. Lecture Notes in Computer Science 2776, Springer 2003, ISBN 3-540-40797-9
Invited Papers
- Kulesh Shanmugasundaram, Nasir D. Memon, Anubhav Savant, Hervé Brönnimann:
ForNet: A Distributed Forensics Network. 1-16 - Ravi S. Sandhu, Jaehong Park:
Usage Control: A Vision for Next Generation Access Control. 17-31 - Thumrongsak Kosiyatrakul, Susan Older, Polar Humenn, Shiu-Kai Chin:
Implementing a Calculus for Distributed Access Control in Higher Order Logic and HOL. 32-46 - Anatol Slissenko:
Complexity Problems in the Analysis of Information Systems Security. 47-56 - Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu:
A Behavior-Based Approach to Securing Email Systems. 57-81 - Shambhu J. Upadhyaya:
Real-Time Intrusion Detection with Emphasis on Insider Attacks. 82-85
Mathematical Models and Architectures for Computer Network Security
- Stefano Bistarelli, Iliano Cervesato, Gabriele Lenzini, Fabio Martinelli:
Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols. 86-99 - Lazaros Gymnopoulos, Stelios Dritsas, Stefanos Gritzalis, Costas Lambrinoudakis:
GRID Security Review. 100-111 - Spyros Kokolakis, Costas Lambrinoudakis, Dimitris Gritzalis:
A Knowledge-Based Repository Model for Security Policies Management. 112-121 - Fabio Martinelli:
Symbolic Partial Model Checking for Security Analysis. 122-134 - Michael Smirnov:
Rule-Based Systems Security Model. 135-146 - Peter D. Zegzhda, Dmitry P. Zegzhda, Maxim O. Kalinin:
Logical Resolving for Security Evaluation. 147-156
Intrusion Detection
- Salem Benferhat, Fabien Autrel, Frédéric Cuppens:
Enhanced Correlation in an Intrusion Detection Process. 157-170 - John Bigham, David Gamez, Ning Lu:
Safeguarding SCADA Systems with Anomaly Detection. 171-182 - Igor V. Kotenko, Evgeny Man'kov:
Experiments with Simulation of Attacks against Computer Networks. 183-194 - Victor A. Skormin, Douglas H. Summerville, James Moronski:
Detecting Malicious Codes by the Presence of Their "Gene of Self-replication". 195-205 - Kyubum Wee, Byungeun Moon:
Automatic Generation of Finite State Automata for Detecting Intrusions Using System Call Sequences. 206-216
Public Key Distribution, Authentication, Access Control
- Steve Barker:
Distributed Access Control: A Logic-Based Approach. 217-228 - Dae Hyun Yum, Jae Eun Kang, Pil Joong Lee:
Advanced Certificate Status Protocol. 229-240 - Antonio Lain, Viacheslav Borisov:
Key History Tree: Efficient Group Key Management with Off-Line Members. 241-254 - Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano:
A Certificate Status Checking Protocol for the Authenticated Dictionary. 255-266 - Ruben Wolf, Markus Schneider:
Context-Dependent Access Control for Web-Based Collaboration Environments with Role-based Approach. 267-278
Cryptography
- Mohamed Al-Ibrahim:
A Signcryption Scheme Based on Secret Sharing Technique. 279-288 - Pino Caballero-Gil, Candelaria Hernández-Goya:
A Zero-Knowledge Identification Scheme. 289-297 - Youngdai Ko, Deukjo Hong, Seokhie Hong, Sangjin Lee, Jongin Lim:
Linear Cryptanalysis of SPECTR-H64 with Higher Order Differential Property. 298-307 - Valery I. Korzhik, Viktor Yakovlev, Alexander Sinuk:
Achievability of the Key-Capacity in a Scenario of Key Sharing. 308-315 - Nick A. Moldovyan:
On Cipher Design Based on Switchable Controlled Operations. 316-327 - Alexander Rostovtsev, Elena Makhovenko:
Elliptic Curve Point Multiplication. 328-336 - Nicolas Sklavos, Alexander A. Moldovyan, Odysseas G. Koufopavlou:
Encryption and Data Dependent Permutations: Implementation Cost and Performance Evaluation. 337-348
Steganography
- Vladimir Gorodetsky, Vladimir Samoilov:
Simulation-Based Exploration of SVD-Based Technique for Hidden Communication by Image Steganography Channel. 349-359 - Kaiwen Zhang, Shuozhong Wang, Xinpeng Zhang:
Detection and Removal of Hidden Data in Images Embedded with Quantization Index Modulation. 360-370 - Valery I. Korzhik, Guillermo Morales-Luna, Irina Marakova, Carlos Patiño-Ruvalcaba:
Digital Watermarking under a Filtering and Additive Noise Attack Condition. 371-382 - Shuozhong Wang, Xinpeng Zhang, Kaiwen Zhang:
Data Hiding in Digital Audio by Frequency Domain Dithering. 383-394 - Xinpeng Zhang, Shuozhong Wang, Kaiwen Zhang:
Steganography with Least Histogram Abnormality. 395-406 - Xinpeng Zhang, Shuozhong Wang, Kaiwen Zhang:
Multi-bit Watermarking Scheme Based on Addition of Orthogonal Sequences. 407-418
Short Papers
- Mohamed Al-Ibrahim, Anton Cerný:
Authentication of Anycast Communication. 419-423 - Ruo Ando, Yoshiyasu Takefuji:
Two-Stage Orthogonal Network Incident Detection for the Adaptive Coordination with SMTP Proxy. 424-427 - Alexander A. Grusho, Elena E. Timonina:
Construction of the Covert Channels. 428-431 - Lilian Mitrou, Konstantinos Moulinos:
Privacy and Data Protection in Electronic Communications. 432-435 - Hyun-Sung Kim, Sung-Ho Hwang:
Multiplier for Public-Key Cryptosystem Based on Cellular Automata. 436-439 - Sri Kumar, Vladimir Marbukh:
A Game Theoretic Approach to Analysis and Design of Survivable and Secure Systems and Protocols. 440-443 - Francisco J. Martín, Enric Plaza:
Alert Triage on the ROC. 444-448 - Nick D. Goots, Boris V. Izotov, Alexander A. Moldovyan, Nick A. Moldovyan:
Fast Ciphers for Cheap Hardware: Differential Analysis of SPECTR-H64. 449-452 - Yuri Melnikov, Alexander O. Tarakanov:
Immunocomputing Model of Intrusion Detection. 453-456 - Gustavo Santana, Leonid Sheremetov, Miguel Contreras:
Agent Platform Security Architecture. 457-460 - Taeshik Shon, Taewoo Noh, Jongsub Moon:
Support Vector Machine Based ICMP Covert Channel Attack Detection. 461-464 - Svetlana P. Sokolova, Ruslan S. Ivlev:
Computer Immunology System with Variable Configuration. 465-468
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.