default search action
Search dblp for Publications
export results for "toc:db/conf/cnis/cnis2006.bht:"
@inproceedings{DBLP:conf/cnis/AlhazmiWM06, author = {Omar Hussain Alhazmi and Sung{-}Whan Woo and Yashwant K. Malaiya}, editor = {Sanguthevar Rajasekaran}, title = {Security vulnerability categories in major software systems}, booktitle = {Proceedings of the Third {IASTED} International Conference on Communication, Network, and Information Security, October 9-11, 2006, Cambridge, MA, {USA}}, pages = {138--143}, publisher = {{IASTED/ACTA} Press}, year = {2006}, timestamp = {Tue, 09 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnis/AlhazmiWM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnis/Ali06, author = {Asad M. Ali}, editor = {Sanguthevar Rajasekaran}, title = {Designing {SSL/TLS} protocol for resource constrained devices}, booktitle = {Proceedings of the Third {IASTED} International Conference on Communication, Network, and Information Security, October 9-11, 2006, Cambridge, MA, {USA}}, pages = {74--80}, publisher = {{IASTED/ACTA} Press}, year = {2006}, timestamp = {Fri, 26 Jan 2007 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnis/Ali06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnis/AnandRK06, author = {Ashish Anand and Rahul Rishi and Mukesh Kumar}, editor = {Sanguthevar Rajasekaran}, title = {{ARP} and {ICMP} weaknesses: Impact and network performance analysis of a novel attack strategy}, booktitle = {Proceedings of the Third {IASTED} International Conference on Communication, Network, and Information Security, October 9-11, 2006, Cambridge, MA, {USA}}, pages = {144--149}, publisher = {{IASTED/ACTA} Press}, year = {2006}, timestamp = {Fri, 26 Jan 2007 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnis/AnandRK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnis/ArteagaGAM06, author = {Jaime Mu{\~{n}}oz Arteaga and Ricardo Mendoza Gonz{\'{a}}lez and Francisco J. {\'{A}}lvarez and Miguel Vargas Martin}, editor = {Sanguthevar Rajasekaran}, title = {A classification of security patterns for the transactions between a requester, an intermediary, and a web-service}, booktitle = {Proceedings of the Third {IASTED} International Conference on Communication, Network, and Information Security, October 9-11, 2006, Cambridge, MA, {USA}}, pages = {132--137}, publisher = {{IASTED/ACTA} Press}, year = {2006}, timestamp = {Thu, 07 Jun 2007 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnis/ArteagaGAM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnis/AskoxylakisKT06, author = {Ioannis G. Askoxylakis and Diomedes D. Kastanis and Apostolos Traganitis}, editor = {Sanguthevar Rajasekaran}, title = {Elliptic curve and password based dynamic key agreement in wireless ad-hoc networks}, booktitle = {Proceedings of the Third {IASTED} International Conference on Communication, Network, and Information Security, October 9-11, 2006, Cambridge, MA, {USA}}, pages = {50--60}, publisher = {{IASTED/ACTA} Press}, year = {2006}, timestamp = {Thu, 15 Nov 2007 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnis/AskoxylakisKT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnis/AyachitX06, author = {Mihir M. Ayachit and Haiping Xu}, editor = {Sanguthevar Rajasekaran}, title = {A petri net based {XML} firewall security model for web services invocation}, booktitle = {Proceedings of the Third {IASTED} International Conference on Communication, Network, and Information Security, October 9-11, 2006, Cambridge, MA, {USA}}, pages = {61--67}, publisher = {{IASTED/ACTA} Press}, year = {2006}, timestamp = {Fri, 26 Jan 2007 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnis/AyachitX06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnis/Bhakthavathsalam06, author = {R. Bhakthavathsalam}, editor = {Sanguthevar Rajasekaran}, title = {Reinforcement of privacy in 802.16 {MAC} common part sublayer using the principle of circularity}, booktitle = {Proceedings of the Third {IASTED} International Conference on Communication, Network, and Information Security, October 9-11, 2006, Cambridge, MA, {USA}}, pages = {119--125}, publisher = {{IASTED/ACTA} Press}, year = {2006}, timestamp = {Fri, 26 Jan 2007 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnis/Bhakthavathsalam06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnis/EggendorferK06, author = {Tobias Eggendorfer and J{\"{o}}rg Keller}, editor = {Sanguthevar Rajasekaran}, title = {Dynamically blocking access to web pages for spammers' harvesters}, booktitle = {Proceedings of the Third {IASTED} International Conference on Communication, Network, and Information Security, October 9-11, 2006, Cambridge, MA, {USA}}, pages = {205--210}, publisher = {{IASTED/ACTA} Press}, year = {2006}, timestamp = {Thu, 08 Jan 2015 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnis/EggendorferK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnis/El-HassanMSN06, author = {F. El{-}Hassan and Ashraf Matrawy and Nabil Seddigh and Biswajit Nandy}, editor = {Sanguthevar Rajasekaran}, title = {Experimental evaluation of network security through a hierarchical quantitative metrics model}, booktitle = {Proceedings of the Third {IASTED} International Conference on Communication, Network, and Information Security, October 9-11, 2006, Cambridge, MA, {USA}}, pages = {156--164}, publisher = {{IASTED/ACTA} Press}, year = {2006}, timestamp = {Fri, 26 Jan 2007 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnis/El-HassanMSN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnis/Eskeland06, author = {Sigurd Eskeland}, editor = {Sanguthevar Rajasekaran}, title = {Security analysis of a large-scale voting scheme}, booktitle = {Proceedings of the Third {IASTED} International Conference on Communication, Network, and Information Security, October 9-11, 2006, Cambridge, MA, {USA}}, pages = {19--21}, publisher = {{IASTED/ACTA} Press}, year = {2006}, timestamp = {Fri, 26 Jan 2007 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnis/Eskeland06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnis/Eskeland06a, author = {Sigurd Eskeland}, editor = {Sanguthevar Rajasekaran}, title = {Access control by secure multi-party {EPR} decryption in the medical scenario}, booktitle = {Proceedings of the Third {IASTED} International Conference on Communication, Network, and Information Security, October 9-11, 2006, Cambridge, MA, {USA}}, pages = {99--103}, publisher = {{IASTED/ACTA} Press}, year = {2006}, timestamp = {Fri, 26 Jan 2007 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnis/Eskeland06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnis/FujinokiB06, author = {Hiroshi Fujinoki and Ravi Kumar Boyapati}, editor = {Sanguthevar Rajasekaran}, title = {Performance studies of the server-side access control for syn-flooding distributed denial of service attacks using real systems}, booktitle = {Proceedings of the Third {IASTED} International Conference on Communication, Network, and Information Security, October 9-11, 2006, Cambridge, MA, {USA}}, pages = {172--178}, publisher = {{IASTED/ACTA} Press}, year = {2006}, timestamp = {Fri, 26 Jan 2007 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnis/FujinokiB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnis/KastanisAT06, author = {Diomedes D. Kastanis and Ioannis G. Askoxylakis and Apostolos Traganitis}, editor = {Sanguthevar Rajasekaran}, title = {An efficient authentication scheme for contactless smartcards using elliptic curve cryptography}, booktitle = {Proceedings of the Third {IASTED} International Conference on Communication, Network, and Information Security, October 9-11, 2006, Cambridge, MA, {USA}}, pages = {28--33}, publisher = {{IASTED/ACTA} Press}, year = {2006}, timestamp = {Fri, 26 Jan 2007 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnis/KastanisAT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnis/KellerN06, author = {J{\"{o}}rg Keller and Ralf Naues}, editor = {Sanguthevar Rajasekaran}, title = {Design of a virtual computer security lab}, booktitle = {Proceedings of the Third {IASTED} International Conference on Communication, Network, and Information Security, October 9-11, 2006, Cambridge, MA, {USA}}, pages = {211--215}, publisher = {{IASTED/ACTA} Press}, year = {2006}, timestamp = {Thu, 08 Jan 2015 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnis/KellerN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnis/KumarN06, author = {Mahendra Kumar and Richard E. Newman}, editor = {Sanguthevar Rajasekaran}, title = {{STRBAC} - An approach towards spatio-temporal role-based access control}, booktitle = {Proceedings of the Third {IASTED} International Conference on Communication, Network, and Information Security, October 9-11, 2006, Cambridge, MA, {USA}}, pages = {150--155}, publisher = {{IASTED/ACTA} Press}, year = {2006}, timestamp = {Fri, 26 Jan 2007 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnis/KumarN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnis/MattesZ06, author = {Leonardo Mattes and Jo{\~{a}}o Antonio Zuffo}, editor = {Sanguthevar Rajasekaran}, title = {Access control platform for submitted jobs in computational grid environment}, booktitle = {Proceedings of the Third {IASTED} International Conference on Communication, Network, and Information Security, October 9-11, 2006, Cambridge, MA, {USA}}, pages = {224--229}, publisher = {{IASTED/ACTA} Press}, year = {2006}, timestamp = {Fri, 26 Jan 2007 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnis/MattesZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnis/ObimboN06, author = {Charlie Obimbo and Jingbo Ni}, editor = {Sanguthevar Rajasekaran}, title = {A grey-level image watermarking method based on block {DCT} and statistic correlation adjustment}, booktitle = {Proceedings of the Third {IASTED} International Conference on Communication, Network, and Information Security, October 9-11, 2006, Cambridge, MA, {USA}}, pages = {22--27}, publisher = {{IASTED/ACTA} Press}, year = {2006}, timestamp = {Fri, 26 Jan 2007 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnis/ObimboN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnis/ObomboHLP06, author = {Charlie Obombo and Fardeen Haji and Larry Lindsay and Darshana Patel}, editor = {Sanguthevar Rajasekaran}, title = {Security framework for supervisory control and data acquisition, automation systems, and networks}, booktitle = {Proceedings of the Third {IASTED} International Conference on Communication, Network, and Information Security, October 9-11, 2006, Cambridge, MA, {USA}}, pages = {81--86}, publisher = {{IASTED/ACTA} Press}, year = {2006}, timestamp = {Fri, 26 Jan 2007 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnis/ObomboHLP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnis/OkadaW06, author = {Kosuke Okada and Shigeo Wada}, editor = {Sanguthevar Rajasekaran}, title = {A robust image watermarking method to geometric attacks}, booktitle = {Proceedings of the Third {IASTED} International Conference on Communication, Network, and Information Security, October 9-11, 2006, Cambridge, MA, {USA}}, pages = {7--12}, publisher = {{IASTED/ACTA} Press}, year = {2006}, timestamp = {Fri, 26 Jan 2007 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnis/OkadaW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnis/OwenA06, author = {Gareth Owen and Mo Adda}, editor = {Sanguthevar Rajasekaran}, title = {Self-organising quorum systems for ad hoc networks}, booktitle = {Proceedings of the Third {IASTED} International Conference on Communication, Network, and Information Security, October 9-11, 2006, Cambridge, MA, {USA}}, pages = {93--98}, publisher = {{IASTED/ACTA} Press}, year = {2006}, timestamp = {Fri, 26 Jan 2007 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnis/OwenA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnis/PathakS06, author = {Abhinav Pathak and Dheeraj Sanghi}, editor = {Sanguthevar Rajasekaran}, title = {A scalable approach to {IP} anycast security}, booktitle = {Proceedings of the Third {IASTED} International Conference on Communication, Network, and Information Security, October 9-11, 2006, Cambridge, MA, {USA}}, pages = {179--184}, publisher = {{IASTED/ACTA} Press}, year = {2006}, timestamp = {Fri, 26 Jan 2007 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnis/PathakS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnis/Prandini06, author = {Marco Prandini}, editor = {Sanguthevar Rajasekaran}, title = {Securing a Linux-based multi-user web server}, booktitle = {Proceedings of the Third {IASTED} International Conference on Communication, Network, and Information Security, October 9-11, 2006, Cambridge, MA, {USA}}, pages = {165--171}, publisher = {{IASTED/ACTA} Press}, year = {2006}, timestamp = {Fri, 26 Jan 2007 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnis/Prandini06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnis/QiL06, author = {Yaxuan Qi and Jun Li}, editor = {Sanguthevar Rajasekaran}, title = {An efficient hybrid algorithm for multidimensional packet classification}, booktitle = {Proceedings of the Third {IASTED} International Conference on Communication, Network, and Information Security, October 9-11, 2006, Cambridge, MA, {USA}}, pages = {185--190}, publisher = {{IASTED/ACTA} Press}, year = {2006}, timestamp = {Tue, 26 Jun 2012 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnis/QiL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnis/QiL06a, author = {Yaxuan Qi and Jun Li}, editor = {Sanguthevar Rajasekaran}, title = {Towards effective packet classification}, booktitle = {Proceedings of the Third {IASTED} International Conference on Communication, Network, and Information Security, October 9-11, 2006, Cambridge, MA, {USA}}, pages = {216--223}, publisher = {{IASTED/ACTA} Press}, year = {2006}, timestamp = {Tue, 26 Jun 2012 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnis/QiL06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnis/SalamiO06, author = {Behzad Salami and Charlie Obimbo}, editor = {Sanguthevar Rajasekaran}, title = {A multi-bitwatermark generation algorithm with properties of error correction}, booktitle = {Proceedings of the Third {IASTED} International Conference on Communication, Network, and Information Security, October 9-11, 2006, Cambridge, MA, {USA}}, pages = {44--49}, publisher = {{IASTED/ACTA} Press}, year = {2006}, timestamp = {Tue, 22 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnis/SalamiO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnis/Singh06, author = {Vishav Vir Singh}, editor = {Sanguthevar Rajasekaran}, title = {{PROTEMP-Z:} An {XML} based authorization system with provisional authorization and temporal certification support}, booktitle = {Proceedings of the Third {IASTED} International Conference on Communication, Network, and Information Security, October 9-11, 2006, Cambridge, MA, {USA}}, pages = {1--6}, publisher = {{IASTED/ACTA} Press}, year = {2006}, timestamp = {Fri, 26 Jan 2007 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnis/Singh06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnis/SobolewskiB06, author = {Sylwester Sobolewski and R. Michael Buehrer}, editor = {Sanguthevar Rajasekaran}, title = {Object authentication in closed containers by ultra-wideband multipath profile examination: An application to national security}, booktitle = {Proceedings of the Third {IASTED} International Conference on Communication, Network, and Information Security, October 9-11, 2006, Cambridge, MA, {USA}}, pages = {87--92}, publisher = {{IASTED/ACTA} Press}, year = {2006}, timestamp = {Fri, 26 Jan 2007 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnis/SobolewskiB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnis/SonA06, author = {Joon Son and Jim Alves{-}Foss}, editor = {Sanguthevar Rajasekaran}, title = {Covert timing channel capacity of rate monotonic real-time scheduling algorithm in {MLS} systems}, booktitle = {Proceedings of the Third {IASTED} International Conference on Communication, Network, and Information Security, October 9-11, 2006, Cambridge, MA, {USA}}, pages = {13--18}, publisher = {{IASTED/ACTA} Press}, year = {2006}, timestamp = {Fri, 26 Jan 2007 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnis/SonA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnis/TipperE06, author = {Paul Tipper and Christopher Edwards}, editor = {Sanguthevar Rajasekaran}, title = {A method for deriving paths across a distributedweb of trust}, booktitle = {Proceedings of the Third {IASTED} International Conference on Communication, Network, and Information Security, October 9-11, 2006, Cambridge, MA, {USA}}, pages = {68--73}, publisher = {{IASTED/ACTA} Press}, year = {2006}, timestamp = {Fri, 26 Jan 2007 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnis/TipperE06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnis/Trostle06, author = {Jonathan T. Trostle}, editor = {Sanguthevar Rajasekaran}, title = {The lightweight key management protocol {(LKMP)}}, booktitle = {Proceedings of the Third {IASTED} International Conference on Communication, Network, and Information Security, October 9-11, 2006, Cambridge, MA, {USA}}, pages = {104--112}, publisher = {{IASTED/ACTA} Press}, year = {2006}, timestamp = {Fri, 26 Jan 2007 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnis/Trostle06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnis/UrienDB06, author = {Pascal Urien and Mesmin Dandjinou and Mohamad Badra}, editor = {Sanguthevar Rajasekaran}, title = {Introducing trusted {EAP} module for security enhancement in WLANs and VPNs}, booktitle = {Proceedings of the Third {IASTED} International Conference on Communication, Network, and Information Security, October 9-11, 2006, Cambridge, MA, {USA}}, pages = {191--198}, publisher = {{IASTED/ACTA} Press}, year = {2006}, timestamp = {Fri, 26 Jan 2007 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnis/UrienDB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnis/WangA06, author = {Bei Wang and Jim Alves{-}Foss}, editor = {Sanguthevar Rajasekaran}, title = {An {MSLS-EMM} for enforcing confidentiality in malicious environments}, booktitle = {Proceedings of the Third {IASTED} International Conference on Communication, Network, and Information Security, October 9-11, 2006, Cambridge, MA, {USA}}, pages = {126--131}, publisher = {{IASTED/ACTA} Press}, year = {2006}, timestamp = {Fri, 26 Jan 2007 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnis/WangA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnis/YoussifGM06, author = {Aliaa A. A. Youssif and Atef Z. Ghalwash and Samir Mohamed}, editor = {Sanguthevar Rajasekaran}, title = {Artificial immune using multi-level negative selection approach to anomaly detection}, booktitle = {Proceedings of the Third {IASTED} International Conference on Communication, Network, and Information Security, October 9-11, 2006, Cambridge, MA, {USA}}, pages = {113--118}, publisher = {{IASTED/ACTA} Press}, year = {2006}, timestamp = {Fri, 26 Jan 2007 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnis/YoussifGM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnis/YuHX06, author = {Jianming Yu and Quan Huang and Yibo Xue}, editor = {Sanguthevar Rajasekaran}, title = {Optimizing multi-thread string matching for network processor based intrusion management system}, booktitle = {Proceedings of the Third {IASTED} International Conference on Communication, Network, and Information Security, October 9-11, 2006, Cambridge, MA, {USA}}, pages = {199--204}, publisher = {{IASTED/ACTA} Press}, year = {2006}, timestamp = {Fri, 26 Jan 2007 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnis/YuHX06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnis/YuS06, author = {Longjiang Yu and Sheng{-}He Sun}, editor = {Sanguthevar Rajasekaran}, title = {Slantlet transform-based image fingerprints}, booktitle = {Proceedings of the Third {IASTED} International Conference on Communication, Network, and Information Security, October 9-11, 2006, Cambridge, MA, {USA}}, pages = {41--43}, publisher = {{IASTED/ACTA} Press}, year = {2006}, timestamp = {Fri, 26 Jan 2007 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnis/YuS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnis/ZhangEL06, author = {Yuan Zhang and Richard J. Enbody and John R. Lloyd}, editor = {Sanguthevar Rajasekaran}, title = {Proactive, content-aware, sensitive data protection framework for enterprises}, booktitle = {Proceedings of the Third {IASTED} International Conference on Communication, Network, and Information Security, October 9-11, 2006, Cambridge, MA, {USA}}, pages = {34--40}, publisher = {{IASTED/ACTA} Press}, year = {2006}, timestamp = {Fri, 26 Jan 2007 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnis/ZhangEL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cnis/2006, editor = {Sanguthevar Rajasekaran}, title = {Proceedings of the Third {IASTED} International Conference on Communication, Network, and Information Security, October 9-11, 2006, Cambridge, MA, {USA}}, publisher = {{IASTED/ACTA} Press}, year = {2006}, isbn = {0-88986-636-8}, timestamp = {Fri, 26 Jan 2007 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnis/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.