Search dblp for Publications

export results for "toc:db/conf/cnis/cnis2006.bht:"

 download as .bib file

@inproceedings{DBLP:conf/cnis/AlhazmiWM06,
  author       = {Omar Hussain Alhazmi and
                  Sung{-}Whan Woo and
                  Yashwant K. Malaiya},
  editor       = {Sanguthevar Rajasekaran},
  title        = {Security vulnerability categories in major software systems},
  booktitle    = {Proceedings of the Third {IASTED} International Conference on Communication,
                  Network, and Information Security, October 9-11, 2006, Cambridge,
                  MA, {USA}},
  pages        = {138--143},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2006},
  timestamp    = {Tue, 09 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnis/AlhazmiWM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnis/Ali06,
  author       = {Asad M. Ali},
  editor       = {Sanguthevar Rajasekaran},
  title        = {Designing {SSL/TLS} protocol for resource constrained devices},
  booktitle    = {Proceedings of the Third {IASTED} International Conference on Communication,
                  Network, and Information Security, October 9-11, 2006, Cambridge,
                  MA, {USA}},
  pages        = {74--80},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2006},
  timestamp    = {Fri, 26 Jan 2007 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnis/Ali06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnis/AnandRK06,
  author       = {Ashish Anand and
                  Rahul Rishi and
                  Mukesh Kumar},
  editor       = {Sanguthevar Rajasekaran},
  title        = {{ARP} and {ICMP} weaknesses: Impact and network performance analysis
                  of a novel attack strategy},
  booktitle    = {Proceedings of the Third {IASTED} International Conference on Communication,
                  Network, and Information Security, October 9-11, 2006, Cambridge,
                  MA, {USA}},
  pages        = {144--149},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2006},
  timestamp    = {Fri, 26 Jan 2007 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnis/AnandRK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnis/ArteagaGAM06,
  author       = {Jaime Mu{\~{n}}oz Arteaga and
                  Ricardo Mendoza Gonz{\'{a}}lez and
                  Francisco J. {\'{A}}lvarez and
                  Miguel Vargas Martin},
  editor       = {Sanguthevar Rajasekaran},
  title        = {A classification of security patterns for the transactions between
                  a requester, an intermediary, and a web-service},
  booktitle    = {Proceedings of the Third {IASTED} International Conference on Communication,
                  Network, and Information Security, October 9-11, 2006, Cambridge,
                  MA, {USA}},
  pages        = {132--137},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2006},
  timestamp    = {Thu, 07 Jun 2007 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnis/ArteagaGAM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnis/AskoxylakisKT06,
  author       = {Ioannis G. Askoxylakis and
                  Diomedes D. Kastanis and
                  Apostolos Traganitis},
  editor       = {Sanguthevar Rajasekaran},
  title        = {Elliptic curve and password based dynamic key agreement in wireless
                  ad-hoc networks},
  booktitle    = {Proceedings of the Third {IASTED} International Conference on Communication,
                  Network, and Information Security, October 9-11, 2006, Cambridge,
                  MA, {USA}},
  pages        = {50--60},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2006},
  timestamp    = {Thu, 15 Nov 2007 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnis/AskoxylakisKT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnis/AyachitX06,
  author       = {Mihir M. Ayachit and
                  Haiping Xu},
  editor       = {Sanguthevar Rajasekaran},
  title        = {A petri net based {XML} firewall security model for web services invocation},
  booktitle    = {Proceedings of the Third {IASTED} International Conference on Communication,
                  Network, and Information Security, October 9-11, 2006, Cambridge,
                  MA, {USA}},
  pages        = {61--67},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2006},
  timestamp    = {Fri, 26 Jan 2007 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnis/AyachitX06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnis/Bhakthavathsalam06,
  author       = {R. Bhakthavathsalam},
  editor       = {Sanguthevar Rajasekaran},
  title        = {Reinforcement of privacy in 802.16 {MAC} common part sublayer using
                  the principle of circularity},
  booktitle    = {Proceedings of the Third {IASTED} International Conference on Communication,
                  Network, and Information Security, October 9-11, 2006, Cambridge,
                  MA, {USA}},
  pages        = {119--125},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2006},
  timestamp    = {Fri, 26 Jan 2007 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnis/Bhakthavathsalam06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnis/EggendorferK06,
  author       = {Tobias Eggendorfer and
                  J{\"{o}}rg Keller},
  editor       = {Sanguthevar Rajasekaran},
  title        = {Dynamically blocking access to web pages for spammers' harvesters},
  booktitle    = {Proceedings of the Third {IASTED} International Conference on Communication,
                  Network, and Information Security, October 9-11, 2006, Cambridge,
                  MA, {USA}},
  pages        = {205--210},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2006},
  timestamp    = {Thu, 08 Jan 2015 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnis/EggendorferK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnis/El-HassanMSN06,
  author       = {F. El{-}Hassan and
                  Ashraf Matrawy and
                  Nabil Seddigh and
                  Biswajit Nandy},
  editor       = {Sanguthevar Rajasekaran},
  title        = {Experimental evaluation of network security through a hierarchical
                  quantitative metrics model},
  booktitle    = {Proceedings of the Third {IASTED} International Conference on Communication,
                  Network, and Information Security, October 9-11, 2006, Cambridge,
                  MA, {USA}},
  pages        = {156--164},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2006},
  timestamp    = {Fri, 26 Jan 2007 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnis/El-HassanMSN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnis/Eskeland06,
  author       = {Sigurd Eskeland},
  editor       = {Sanguthevar Rajasekaran},
  title        = {Security analysis of a large-scale voting scheme},
  booktitle    = {Proceedings of the Third {IASTED} International Conference on Communication,
                  Network, and Information Security, October 9-11, 2006, Cambridge,
                  MA, {USA}},
  pages        = {19--21},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2006},
  timestamp    = {Fri, 26 Jan 2007 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnis/Eskeland06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnis/Eskeland06a,
  author       = {Sigurd Eskeland},
  editor       = {Sanguthevar Rajasekaran},
  title        = {Access control by secure multi-party {EPR} decryption in the medical
                  scenario},
  booktitle    = {Proceedings of the Third {IASTED} International Conference on Communication,
                  Network, and Information Security, October 9-11, 2006, Cambridge,
                  MA, {USA}},
  pages        = {99--103},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2006},
  timestamp    = {Fri, 26 Jan 2007 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnis/Eskeland06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnis/FujinokiB06,
  author       = {Hiroshi Fujinoki and
                  Ravi Kumar Boyapati},
  editor       = {Sanguthevar Rajasekaran},
  title        = {Performance studies of the server-side access control for syn-flooding
                  distributed denial of service attacks using real systems},
  booktitle    = {Proceedings of the Third {IASTED} International Conference on Communication,
                  Network, and Information Security, October 9-11, 2006, Cambridge,
                  MA, {USA}},
  pages        = {172--178},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2006},
  timestamp    = {Fri, 26 Jan 2007 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnis/FujinokiB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnis/KastanisAT06,
  author       = {Diomedes D. Kastanis and
                  Ioannis G. Askoxylakis and
                  Apostolos Traganitis},
  editor       = {Sanguthevar Rajasekaran},
  title        = {An efficient authentication scheme for contactless smartcards using
                  elliptic curve cryptography},
  booktitle    = {Proceedings of the Third {IASTED} International Conference on Communication,
                  Network, and Information Security, October 9-11, 2006, Cambridge,
                  MA, {USA}},
  pages        = {28--33},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2006},
  timestamp    = {Fri, 26 Jan 2007 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnis/KastanisAT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnis/KellerN06,
  author       = {J{\"{o}}rg Keller and
                  Ralf Naues},
  editor       = {Sanguthevar Rajasekaran},
  title        = {Design of a virtual computer security lab},
  booktitle    = {Proceedings of the Third {IASTED} International Conference on Communication,
                  Network, and Information Security, October 9-11, 2006, Cambridge,
                  MA, {USA}},
  pages        = {211--215},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2006},
  timestamp    = {Thu, 08 Jan 2015 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnis/KellerN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnis/KumarN06,
  author       = {Mahendra Kumar and
                  Richard E. Newman},
  editor       = {Sanguthevar Rajasekaran},
  title        = {{STRBAC} - An approach towards spatio-temporal role-based access control},
  booktitle    = {Proceedings of the Third {IASTED} International Conference on Communication,
                  Network, and Information Security, October 9-11, 2006, Cambridge,
                  MA, {USA}},
  pages        = {150--155},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2006},
  timestamp    = {Fri, 26 Jan 2007 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnis/KumarN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnis/MattesZ06,
  author       = {Leonardo Mattes and
                  Jo{\~{a}}o Antonio Zuffo},
  editor       = {Sanguthevar Rajasekaran},
  title        = {Access control platform for submitted jobs in computational grid environment},
  booktitle    = {Proceedings of the Third {IASTED} International Conference on Communication,
                  Network, and Information Security, October 9-11, 2006, Cambridge,
                  MA, {USA}},
  pages        = {224--229},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2006},
  timestamp    = {Fri, 26 Jan 2007 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnis/MattesZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnis/ObimboN06,
  author       = {Charlie Obimbo and
                  Jingbo Ni},
  editor       = {Sanguthevar Rajasekaran},
  title        = {A grey-level image watermarking method based on block {DCT} and statistic
                  correlation adjustment},
  booktitle    = {Proceedings of the Third {IASTED} International Conference on Communication,
                  Network, and Information Security, October 9-11, 2006, Cambridge,
                  MA, {USA}},
  pages        = {22--27},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2006},
  timestamp    = {Fri, 26 Jan 2007 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnis/ObimboN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnis/ObomboHLP06,
  author       = {Charlie Obombo and
                  Fardeen Haji and
                  Larry Lindsay and
                  Darshana Patel},
  editor       = {Sanguthevar Rajasekaran},
  title        = {Security framework for supervisory control and data acquisition, automation
                  systems, and networks},
  booktitle    = {Proceedings of the Third {IASTED} International Conference on Communication,
                  Network, and Information Security, October 9-11, 2006, Cambridge,
                  MA, {USA}},
  pages        = {81--86},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2006},
  timestamp    = {Fri, 26 Jan 2007 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnis/ObomboHLP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnis/OkadaW06,
  author       = {Kosuke Okada and
                  Shigeo Wada},
  editor       = {Sanguthevar Rajasekaran},
  title        = {A robust image watermarking method to geometric attacks},
  booktitle    = {Proceedings of the Third {IASTED} International Conference on Communication,
                  Network, and Information Security, October 9-11, 2006, Cambridge,
                  MA, {USA}},
  pages        = {7--12},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2006},
  timestamp    = {Fri, 26 Jan 2007 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnis/OkadaW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnis/OwenA06,
  author       = {Gareth Owen and
                  Mo Adda},
  editor       = {Sanguthevar Rajasekaran},
  title        = {Self-organising quorum systems for ad hoc networks},
  booktitle    = {Proceedings of the Third {IASTED} International Conference on Communication,
                  Network, and Information Security, October 9-11, 2006, Cambridge,
                  MA, {USA}},
  pages        = {93--98},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2006},
  timestamp    = {Fri, 26 Jan 2007 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnis/OwenA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnis/PathakS06,
  author       = {Abhinav Pathak and
                  Dheeraj Sanghi},
  editor       = {Sanguthevar Rajasekaran},
  title        = {A scalable approach to {IP} anycast security},
  booktitle    = {Proceedings of the Third {IASTED} International Conference on Communication,
                  Network, and Information Security, October 9-11, 2006, Cambridge,
                  MA, {USA}},
  pages        = {179--184},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2006},
  timestamp    = {Fri, 26 Jan 2007 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnis/PathakS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnis/Prandini06,
  author       = {Marco Prandini},
  editor       = {Sanguthevar Rajasekaran},
  title        = {Securing a Linux-based multi-user web server},
  booktitle    = {Proceedings of the Third {IASTED} International Conference on Communication,
                  Network, and Information Security, October 9-11, 2006, Cambridge,
                  MA, {USA}},
  pages        = {165--171},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2006},
  timestamp    = {Fri, 26 Jan 2007 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnis/Prandini06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnis/QiL06,
  author       = {Yaxuan Qi and
                  Jun Li},
  editor       = {Sanguthevar Rajasekaran},
  title        = {An efficient hybrid algorithm for multidimensional packet classification},
  booktitle    = {Proceedings of the Third {IASTED} International Conference on Communication,
                  Network, and Information Security, October 9-11, 2006, Cambridge,
                  MA, {USA}},
  pages        = {185--190},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2006},
  timestamp    = {Tue, 26 Jun 2012 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnis/QiL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnis/QiL06a,
  author       = {Yaxuan Qi and
                  Jun Li},
  editor       = {Sanguthevar Rajasekaran},
  title        = {Towards effective packet classification},
  booktitle    = {Proceedings of the Third {IASTED} International Conference on Communication,
                  Network, and Information Security, October 9-11, 2006, Cambridge,
                  MA, {USA}},
  pages        = {216--223},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2006},
  timestamp    = {Tue, 26 Jun 2012 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnis/QiL06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnis/SalamiO06,
  author       = {Behzad Salami and
                  Charlie Obimbo},
  editor       = {Sanguthevar Rajasekaran},
  title        = {A multi-bitwatermark generation algorithm with properties of error
                  correction},
  booktitle    = {Proceedings of the Third {IASTED} International Conference on Communication,
                  Network, and Information Security, October 9-11, 2006, Cambridge,
                  MA, {USA}},
  pages        = {44--49},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2006},
  timestamp    = {Tue, 22 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnis/SalamiO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnis/Singh06,
  author       = {Vishav Vir Singh},
  editor       = {Sanguthevar Rajasekaran},
  title        = {{PROTEMP-Z:} An {XML} based authorization system with provisional
                  authorization and temporal certification support},
  booktitle    = {Proceedings of the Third {IASTED} International Conference on Communication,
                  Network, and Information Security, October 9-11, 2006, Cambridge,
                  MA, {USA}},
  pages        = {1--6},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2006},
  timestamp    = {Fri, 26 Jan 2007 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnis/Singh06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnis/SobolewskiB06,
  author       = {Sylwester Sobolewski and
                  R. Michael Buehrer},
  editor       = {Sanguthevar Rajasekaran},
  title        = {Object authentication in closed containers by ultra-wideband multipath
                  profile examination: An application to national security},
  booktitle    = {Proceedings of the Third {IASTED} International Conference on Communication,
                  Network, and Information Security, October 9-11, 2006, Cambridge,
                  MA, {USA}},
  pages        = {87--92},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2006},
  timestamp    = {Fri, 26 Jan 2007 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnis/SobolewskiB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnis/SonA06,
  author       = {Joon Son and
                  Jim Alves{-}Foss},
  editor       = {Sanguthevar Rajasekaran},
  title        = {Covert timing channel capacity of rate monotonic real-time scheduling
                  algorithm in {MLS} systems},
  booktitle    = {Proceedings of the Third {IASTED} International Conference on Communication,
                  Network, and Information Security, October 9-11, 2006, Cambridge,
                  MA, {USA}},
  pages        = {13--18},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2006},
  timestamp    = {Fri, 26 Jan 2007 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnis/SonA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnis/TipperE06,
  author       = {Paul Tipper and
                  Christopher Edwards},
  editor       = {Sanguthevar Rajasekaran},
  title        = {A method for deriving paths across a distributedweb of trust},
  booktitle    = {Proceedings of the Third {IASTED} International Conference on Communication,
                  Network, and Information Security, October 9-11, 2006, Cambridge,
                  MA, {USA}},
  pages        = {68--73},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2006},
  timestamp    = {Fri, 26 Jan 2007 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnis/TipperE06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnis/Trostle06,
  author       = {Jonathan T. Trostle},
  editor       = {Sanguthevar Rajasekaran},
  title        = {The lightweight key management protocol {(LKMP)}},
  booktitle    = {Proceedings of the Third {IASTED} International Conference on Communication,
                  Network, and Information Security, October 9-11, 2006, Cambridge,
                  MA, {USA}},
  pages        = {104--112},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2006},
  timestamp    = {Fri, 26 Jan 2007 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnis/Trostle06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnis/UrienDB06,
  author       = {Pascal Urien and
                  Mesmin Dandjinou and
                  Mohamad Badra},
  editor       = {Sanguthevar Rajasekaran},
  title        = {Introducing trusted {EAP} module for security enhancement in WLANs
                  and VPNs},
  booktitle    = {Proceedings of the Third {IASTED} International Conference on Communication,
                  Network, and Information Security, October 9-11, 2006, Cambridge,
                  MA, {USA}},
  pages        = {191--198},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2006},
  timestamp    = {Fri, 26 Jan 2007 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnis/UrienDB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnis/WangA06,
  author       = {Bei Wang and
                  Jim Alves{-}Foss},
  editor       = {Sanguthevar Rajasekaran},
  title        = {An {MSLS-EMM} for enforcing confidentiality in malicious environments},
  booktitle    = {Proceedings of the Third {IASTED} International Conference on Communication,
                  Network, and Information Security, October 9-11, 2006, Cambridge,
                  MA, {USA}},
  pages        = {126--131},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2006},
  timestamp    = {Fri, 26 Jan 2007 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnis/WangA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnis/YoussifGM06,
  author       = {Aliaa A. A. Youssif and
                  Atef Z. Ghalwash and
                  Samir Mohamed},
  editor       = {Sanguthevar Rajasekaran},
  title        = {Artificial immune using multi-level negative selection approach to
                  anomaly detection},
  booktitle    = {Proceedings of the Third {IASTED} International Conference on Communication,
                  Network, and Information Security, October 9-11, 2006, Cambridge,
                  MA, {USA}},
  pages        = {113--118},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2006},
  timestamp    = {Fri, 26 Jan 2007 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnis/YoussifGM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnis/YuHX06,
  author       = {Jianming Yu and
                  Quan Huang and
                  Yibo Xue},
  editor       = {Sanguthevar Rajasekaran},
  title        = {Optimizing multi-thread string matching for network processor based
                  intrusion management system},
  booktitle    = {Proceedings of the Third {IASTED} International Conference on Communication,
                  Network, and Information Security, October 9-11, 2006, Cambridge,
                  MA, {USA}},
  pages        = {199--204},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2006},
  timestamp    = {Fri, 26 Jan 2007 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnis/YuHX06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnis/YuS06,
  author       = {Longjiang Yu and
                  Sheng{-}He Sun},
  editor       = {Sanguthevar Rajasekaran},
  title        = {Slantlet transform-based image fingerprints},
  booktitle    = {Proceedings of the Third {IASTED} International Conference on Communication,
                  Network, and Information Security, October 9-11, 2006, Cambridge,
                  MA, {USA}},
  pages        = {41--43},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2006},
  timestamp    = {Fri, 26 Jan 2007 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnis/YuS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnis/ZhangEL06,
  author       = {Yuan Zhang and
                  Richard J. Enbody and
                  John R. Lloyd},
  editor       = {Sanguthevar Rajasekaran},
  title        = {Proactive, content-aware, sensitive data protection framework for
                  enterprises},
  booktitle    = {Proceedings of the Third {IASTED} International Conference on Communication,
                  Network, and Information Security, October 9-11, 2006, Cambridge,
                  MA, {USA}},
  pages        = {34--40},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2006},
  timestamp    = {Fri, 26 Jan 2007 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnis/ZhangEL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cnis/2006,
  editor       = {Sanguthevar Rajasekaran},
  title        = {Proceedings of the Third {IASTED} International Conference on Communication,
                  Network, and Information Security, October 9-11, 2006, Cambridge,
                  MA, {USA}},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2006},
  isbn         = {0-88986-636-8},
  timestamp    = {Fri, 26 Jan 2007 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnis/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}