default search action
SEC 2003: Athens, Greece
- Dimitris Gritzalis, Sabrina De Capitani di Vimercati, Pierangela Samarati, Sokratis K. Katsikas:
Security and Privacy in the Age of Uncertainty, IFIP TC11 18th International Conference on Information Security (SEC2003), May 26-28, 2003, Athens, Greece. IFIP Conference Proceedings 250, Kluwer 2003, ISBN 1-4020-7449-2
Secure Networks and Distributed Systems
- Brian Toone, Michael Gertz, Premkumar T. Devanbu:
Trust Mediation for Distributed Information Systems. SEC 2003: 1-12 - Constantine Daicos, Scott Knight:
Concerning Enterprise Network Vulnerability to HTTP Tunneling. SEC 2003: 13-24 - Mohamed Sharif, Duminda Wijesekera:
Providing Voice Privacy Over Public Switched Telephone Networks. SEC 2003: 25-36 - Jose Antonio Onieva, Jianying Zhou, Mildrey Carbonell, Javier López:
A Multi-Party Non-Repudiation Protocol for Exchange of Different Messages. SEC 2003: 37-48 - Jing-Jang Hwang, Min-Hua Shao, Soushan Wu:
Establishing Chain of Evidence as a Base for Non-Repudiation Services. SEC 2003: 49-60
Content Protection
- Ernesto Damiani, Sabrina De Capitani di Vimercati:
Securing XML-based Multimedia Content. SEC 2003: 61-72 - Cheun Ngen Chong, Zhonghong Peng, Pieter H. Hartel:
Secure Audit Logging with Tamper-Resistant Hardware. SEC 2003: 73-84 - Heejae Park, Jong Kim:
PCMHoDC. A Scheme to Protect Copyright & Modification History of Digital Contents. SEC 2003: 85-96
Secure Multicast Communication and Secure Mobile Networks
- Nathan L. Clarke, Steven Furnell, Benn Lines, Paul L. Reynolds:
Using Keystroke Analysis as a Mechanism for Subscriber Authentication on Mobile Handsets. SEC 2003: 97-108 - Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis:
Introducing PKI to Enhance Security in Future Mobile Networks. SEC 2003: 109-120 - Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei:
A Time Driven Methodology for Key Dimensioning in Multicast Communications. SEC 2003: 121-132 - Claudiu Duma, Nahid Shahmehri, Patrick Lambrix:
A Flexible Category-Based Collusion-Restistant Key Management Scheme for Multicast. SEC 2003: 133-144
Security Management
- Maria Karyda, Spyros Kokolakis, Evangelos A. Kiountouzis:
Content, Context, Process Analysis of IS Security Policy Formation. SEC 2003: 145-156 - Ulrika Evertsson, Urban Örthberg, Louise Yngström:
Integrating Security into Systems Development. SEC 2003: 157-168 - Kerry-Lynn Thomson, Rossouw von Solms:
Integrating Information Security into Corporate Governance. SEC 2003: 169-180 - Meletis A. Belsis, Leonid Smalov:
Building an Enterprise IT Security Management System. SEC 2003: 181-192 - Mariki M. Eloff, Jan H. P. Eloff:
Information Security Management System: Processes and Products. SEC 2003: 193-204
Intrusion Prevention and Detection
- Scott Knight, Luciano Carosielli:
Detecting Malicious Use with Unlabelled Data Using Clustering and Outlier Analysis. SEC 2003: 205-216 - Kostas G. Anagnostakis, Spyros Antonatos, Evangelos P. Markatos, Michalis Polychronakis:
E2xB: A Domain-Specific String Matching Algorithm for Intrusion Detection. SEC 2003: 217-228 - Meng Yu, Peng Liu, Wanyu Zang:
Intrusion Masking for Distributed Atomic Operations. SEC 2003: 229-240 - Mehdi Shajari, Ali A. Ghorbani:
Using Fuzzy System to Manage False Alarms in Intrusion Detection. SEC 2003: 241-252 - James Bret Michael, Georgios Fragkos, Mikhail Auguston:
An Experiment in Software Decoy Design. SEC 2003: 253-264
Access Control Policies and Models
- Douglas E. Williams, Amgad Fayad, Sushil Jajodia, Daniel Calle:
A User Friendly Guard with Mobile Post-Release Access Control Policy. SEC 2003: 265-276 - Anas Abou El Kalam, Yves Deswarte:
Security Model for Health Care Computing and Communication Systems. SEC 2003: 277-288 - Longhua Zhang, Gail-Joon Ahn:
Constrained Role-based Delegation. SEC 2003: 289-300
Secure Information Systems
- Fredj Dridi, Michael Fischer, Günther Pernul:
CSAP - An Adaptable Security Module for the E-Government System Webocrat. SEC 2003: 301-312 - Theodore Tryfonas, Evangelos A. Kiountouzis:
Perceptions of Security Contributing to the Implementation of Secure IS. SEC 2003: 313-324 - Mikko T. Siponen:
New Directions on IS Security Methods. SEC 2003: 325-336 - Bart De Decker, Gregory Neven, Frank Piessens:
Secure Vickrey Auctions without a Trusted Third Party. SEC 2003: 337-348
Security Protocols
- Mauricio Papa, Oliver Bremer, John Hale, Sujeet Shenoi:
Integrating Logics and Process Calculi for Cryptographic Protocol Analysis. SEC 2003: 349-360 - Georgios Kalogridis, Chan Yeob Yeun, Gary Clemo:
Flexible Delegation Security for Improved Distribution in Ubiquitous Environments. SEC 2003: 361-372 - Magdy S. El-Soudani, Mohamed A. Eissa:
Cooperative Defense Firewall Protocol. SEC 2003: 373-384 - Stefan Lucks, Rüdiger Weis:
How to turn a PIN into an Iron Beam. SEC 2003: 385-396
Workshop on Information Security Management
- Lech J. Janczewski, Andrew M. Colarik:
World Framework for Security Benchmark Changes. SEC 2003: 397-400 - Cheryl Vroom, Rossouw von Solms:
Information Security: Auditing the Behaviour of the Employee. SEC 2003: 401-404 - Marcin Dobrucki, Teemupekka Virtanen:
Priorities in the Development of Network Intrusion Detection Systems. SEC 2003: 405-408 - Paul Gaunard, Eric Dubois:
Bridging the Gap between Risk Analysis and Security Policies. SEC 2003: 409-412 - Jochen Haller, Philip Robinson, Thomas Walter, Roger Kilian-Kehr:
Framework and Architecture for Secure Mobile Business Applications. SEC 2003: 413-416 - W. J. Brooks, Matthew J. Warren, William Hutchinson:
ISO 17799 and Australian Healthcare Organisations. SEC 2003: 417-420
Workshop on Privacy and Anonymity in Network & Distributed Systems
- George Danezis:
Statistical Disclosure Attacks. SEC 2003: 421-426 - Andrei Serjantov, Richard E. Newman:
On the Anonymity of Timed Pool Mixes. SEC 2003: 427-434 - R. J. Hulsebosch:
Privacy in Content Distribution Networks. SEC 2003: 435-440
Workshop on Small Systems Security
- Jaap-Henk Hoepman:
Security, Fault-Tolerance and their Verification for Ambient Systems. SEC 2003: 441-446 - Giannis Pikrammenos, Ghassan Sarkis, John Soldatos, Vasilios Anagnostopoulos:
Hidden Layer Authentication using Smart Card for WEP-based WLANS. SEC 2003: 447-451 - Jerry den Hartog, Jan Verschuren, Erik P. de Vink, Jaap de Vos, W. Wiersma:
PINPAS: A Tool for Power Analysis of Smartcards. SEC 2003: 453-457 - Yee Wei Law, Sandro Etalle, Pieter H. Hartel:
Assessing Security in Energy-Efficient Sensor Networks. SEC 2003: 459-463 - Engelbert Hubbers, Martijn Oostdijk, Erik Poll:
From Finite State Machines to Provably Correct Java Card Applets. SEC 2003: 465-470 - Bob Hulsebosch, Ernst-Jan Goedvolk, Wil Janssen:
Security Characteristics of E-Collaboration Environments. SEC 2003: 471-475 - Preetida Vinayakray-Jani:
Roadmap for Securing Handheld Devices. SEC 2003: 477-482
Workshop on Security and Control of IT in Society
- James Bret Michael, Thomas C. Wingfield:
Lawful Cyber Decoy Policy. SEC 2003: 483-488 - Juhani Paavilainen, Suzana Stojakovic-Celustka, Dagmar Brechlerova:
Electronic Signature as a part of Information Society Infrastructure. SEC 2003: 489-494
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.