Hamid R. Arabnia, Selim Aissi, Youngsong Mun (Eds.):
Proceedings of the International Conference on Security and Management, SAM '04, June 21-24, 2004, Las Vegas, Nevada, USA.
CSREA Press 2004, ISBN 1-932415-37-8
Architectural Designs & Frameworks
Wireless & Mobile Security
Trusted Computing Platforms
Encryption & Authentication
- Dennis Heimbigner:
Managing Access Rights for Terminated Employees.
55-60
- Farhan A. Qazi:
A Survey of Biometric Authentication Systems.
61-67
- Soon Hwa Sung, Eunbae Kong:
Byzantine Agreement with Threshold Cryptography in Unknown Networks.
68-74
- M. Ammar Rayes, Michael Cheung:
User Isolation and Policy-Based Security Management.
75-79
- Hiroshi Dozono, Hiroaki Sanada, Masanori Nakakuni, Yoshio Noguchi:
The Analysis of Graffiti Input and Its Application to Personal Identification.
80-83
- Taesung Kim, Sangrae Cho, Seunghun Jin:
Authentication and Authorization for Network Security Service.
84-88
- Alexander Wiesmaier, Marcus Lippert, Vangelis Karatsiolis:
The Key Authority - Secure Key Management in Hierarchical Public Key Infrastructures.
89-93
- Dawei Hong, Shushuang Man, Barbra Hawes, Manton M. Matthews:
A Graphical Password Scheme Strongly Resistant to Spyware.
94-100
- Raghavan Subramanian:
2 Channel Authentication.
101-108
Security Engineering
Communication Networks
- Chunxiao Chigan, Rahul Bandaru:
Towards a Perfect Secure Routing Protocol for Mobile Ad Hoc Networks.
135-140
- Giancarlo Ruffo:
Legal File and Profit Sharing in a Peer to Peer Network.
141-146
- Farookh Khadeer Hussain, Elizabeth Chang, Tharam S. Dillon:
Repute Relationships for Reputation Management in Peer-to-Peer Communication - I.
147-153
- Craig Valli, Peter Wolski:
802.11b Wireless Networks Insecure at Any Speed.
154-158
- Sirisha Medidi, Muralidhar Medidi, Sireesh Gavini, Richard L. Griswold:
Detecting Packet Mishandling in MANETs.
159-162
- Jing Wu, Jennifer Seberry, Tianbing Xia:
Secure IP Multicast for DMS.
163-167
- A. Maslov:
Scenarios for Hijacking Execution Flow of .NET Managed Code.
168-172
- Wonjoon Choi, Byeong-hee Roh, Seung W. Yoo:
Measures for Detecting Network Attacks at the Aggregate Traffic Level on High-Speed Internet Backbone Links.
173-178
Intrusion Management
Emerging Research
- Namho Yoo, Hwajung Lee, Hyeong-Ah Choi:
An XML-Based Impact Analysis Using Security Management with IAVN.
217-220
- Regine Endsuleit, Arno Wagner:
Possible Attacks on and Countermeasures for Secure Multi-Agent Computation.
221-227
- Myron Sheu, Le Tang, Ravi Mukkamala:
A Systematic Approach to Security Deployment in a Networking Environment.
228-234
- Albert Ball, Donald G. Cole, Michael L. Nelson:
Testing IPv6 Security.
235-241
- Rodolfo Villarroel, Eduardo Fernández-Medina, Mario Piattini:
General Considerations on Data Warehouse Security.
242-248
- In-Jung Kim, Yoon-Jung Jung, JoongGil Park, Dongho Won:
A Study on Security Risk Modeling over Information and Communication Infrastructure.
249-253
- Sung-Ock Hong, Kyoung-Ja Kim, Tae-Mu Chang:
A Study on CRL Distribution for Response Time Reduction in Distributed OCSP.
254-257
- Yoon-Jung Jung, In-Jung Kim, Namhoon Lee, JoongGil Park:
The Development of Risk Analysis Methodology for Information Asset on Network.
258-261
- Yuhei Kawakoya, Yoichi Muraoka:
Proposal and Implementation of Router-Based Traceback Technique.
262-266
- Ajmal S. Mian, Raja Iqbal:
Experimental Analysis of the Arcanum Key Exchange Protocol.
267-271
- Tarek K. Alameldin, Amitesh Sinha:
Web Spoofing Techniques, Implementation and Solutions.
272-277
- Matt Benke, John Waite, Paul W. Oman, Ahmed Abdel-Rahim:
Survivable Systems Analysis for Real Time Control Systems in Critical Infrastructures.
278-286
Algorithms
- Leon Pan, Chang N. Zhang:
Using Metadata to Protect the Audiovisual Contents in MPEG-7 Applications.
287-293
- Tianbing Xia, Jennifer Seberry, Jing Wu:
Boolean Functions with Good Properties.
294-299
- Yong-Seok Kim, Jun-Cheol Jeon, Jin-woo Jeon, Kee-Young Yoo:
An Efficient Access Control Model Based on User-Classification and Role-Division.
300-304
- Jin Shu, Fengyu Liu, Manwu Xu:
NSPPM: A Node Sampling Approach to Probabilistic Packet Marking-Based IP Traceback.
305-311
- Hee Bong Choi, Jong-Gil Kim, Sang-Yun Han, Mung-Gil Choi, Chun-Soo Kim, Hyoon Jae Lee:
DPA Methods of Smart Cards.
312-317
- Yi-Jung Chen, Dyi-Rong Duh, Hun Yunghsiang Sam Han:
A New Modulo (2n+1) Multiplier for IDEA.
318-324
- Kyoung-Ja Kim, Tae-Mu Chang:
A ZRP Based Reliable Route Discovery Scheme in Ad-Hoc Networks.
325-331
- Phen-Lan Lin, Juen-Lin Huang, Ting-Jung Chang:
CAPTCHA-Based Anti-Spam Mail Model.
332-340
Applications
- Nick Antonopoulos, Tatjana Bitzakidis, Roger M. A. Peel:
ASAM: An Automated System for Authorisation Data Change Management in GRID Environments.
341-347
- Jeff Adams, Ranjit Abbadasari, Ravi Mukkamala:
EZ-Park: An Innovative Secure M-Commerce Application.
348-352
- Yongwha Chung, Byung-Hee Hwang, Woo-Yong Choi, Daesung Moon, Sung Bum Pan, Sang-Hwa Chung:
A Hardware Implementation of Speaker Verification Using Support Vector Machine.
353-358
- Madiha Zafar, S. M. H. Zaidi:
TCP SYN Flood Sensor for Internet Backbone.
359-364
- Vamshi Krishna Venapally, William S. Harrison, Nadine Hanebutte:
KLADS: Unix Based Kernel Level Anomaly Detection System.
365-368
- Mathias Fonkam, Chamraj Bathirappan:
JxPS2 - An Intelligent, Portable and Pluggable Security Service for Web Applications Using Java, XML and JIProlog (Java Internet Prolog).
369-375
- Patrick R. Merry, Axel W. Krings, Paul W. Oman:
Survivable Systems Analysis of the North American Power Grid Communications Infrastructure.
376-386
Late Papers
- Young-Jun Heo, Keol-Woo Ryu:
Abnormal Traffic Detection for Network Intrusion Detection.
387-390
- Fariborz Farahmand, Shamkant B. Navathe, Gunter P. Sharp, Philip H. Enslow Jr.:
Data Confidentiality in E-Government and E-Commerce.
391-394
- Ned M. Smith:
A Comparison of the trusted Computing Group Security Model with Clark-Wilson.
395-401
- Najib Saylani:
A Proposal for an Automated Approach to Real Time Profiling of IT Security Compromises.
402-407
- Mun-Kyu Lee, Dowon Hong:
An Efficient Protocol for Mutual Authentication and Key Agreement Using the Subscriber Identity Module.
408-413
- Ghasem S. Alijani, Nam Tran, J. Steven Welsh:
Processing Biometric Information for Smart Cards Using a Dedicated Hash Function.
414-420
- Mira Kwak, Dong-Sub Cho:
Modeling Host Status Transition for Network Intrusion Detection.
421-426
- Shamila Makki, Niki Pissinou, Hui Huang:
The Security Issues in the Ad-Hoc on Demand Distance Vector Routing Protocol (AODV).
427-
Copyright © Mon Mar 15 03:26:59 2010
by Michael Ley (ley@uni-trier.de)