SEC 2002:
Cairo,
Egypt
Adeeb Ghonaimy, Mahmoud T. El-Hadidi, Heba Kamal Aslan (Eds.):
Security in the Information Society: Visions and Perspectives, IFIP TC11 17th International Conference on Information Security (SEC2002), May 7-9, 2002, Cairo, Egypt.
IFIP Conference Proceedings 214 Kluwer 2002, ISBN 1-4020-7030-6 @proceedings{DBLP:conf/sec/2002,
editor = {Adeeb Ghonaimy and
Mahmoud T. El-Hadidi and
Heba Kamal Aslan},
title = {Security in the Information Society: Visions and Perspectives,
IFIP TC11 17$^{\mbox{th}}$ International Conference on Information Security (SEC2002),
May 7-9, 2002, Cairo, Egypt},
booktitle = {SEC},
publisher = {Kluwer},
series = {IFIP Conference Proceedings},
volume = {214},
year = {2002},
isbn = {1-4020-7030-6},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
Information Security Management
Standards of Information Security
Threats and Attacks to Information
Education and Curriculum for Information Security
Social and Ethical Aspects of Information Security
Information Security Services
- Paul Dowland, Steven Furnell, Maria Papadaki:
Keystroke Analysis as a Method of Advanced User Authentication and Response.
215-226
- Magdi M. S. El-Soudani, H. S. El-Refaey, H. M. Mourad:
Zero Knowledge Broadcasting Identification Scheme.
227-238
- Li-Sha He, Ning Zhang, Li-Rong He:
A New End-to-End Authentication Protocol for Mobile Users to Access Internet Services.
239-250
- Carla Merkle Westphall, Joni da Silva Fraga, Carlos Becker Westphall, S. C. S. Bianchi:
Mandatory Security Policies for CORBA Security Model.
251-262
- Carla Merkle Westphall, Joni da Silva Fraga, Michelle S. Wangham, Rafael R. Obelheiro, Lau Cheuk Lung:
Policap-Proposal, Development and Evaluation of a Policy. Service and Capabilities for CORBA Security.
263-274
- Marijke Coetzee, Jan H. P. Eloff:
Secure Database Connectivity on the WWW.
275-286
- Reinhardt A. Botha:
Towards Semantic Integrity in Rational Databases.
287-298
- G. Osman, M. G. Darwish, M. Zaki:
Formal Design of Packet Filtering Systems.
299-310
- E. Mohammed, A. Emarah, Kh. El-Shennawy:
Elliptic Curve Cryptosystems on Smart Cards.
311-322
Multilateral Security
- T. Demuth:
Establishing Bilateral Anonymous Communication in Open Networks.
323-334
Applications of Information Security
- Christer Magnusson, Louise Yngström:
BRITS-A Holistic Framework for Hedging Shareholder Value in IT Dependent Business.
335-346
- Theodore Tryfonas, Evangelos A. Kiountouzis:
Information Systems Security and the Information Systems Development Project: Towards a Framework for Their Integration.
347-356
- R. Abdel-Moneim, S. El-Kassas, H. Hosny:
An Efficient Hybrid Sealed Bid Auction Protocol.
357-372
- Simone Fischer-Hübner, M. Nilsson, Helena Lindskog:
Self-Determination in Mobile Internet: PiMI Prototype Results.
373-386
- Simon N. Foley, Thomas B. Quillinan, John P. Morrison:
Secure Component Distribution Using WebCom.
387-398
- Ryuya Uda, Masahito Ito, Kohei Awaya, Hiroshi Shigeno, Yutaka Matsushita:
E-Ticket Issuing System with 3-D Pattern Recognition for Mobile Terminals.
399-410
- D. Critchlow, Ning Zhang:
An Insight Into User Privacy and Accountable Anonymity for Mobile E-Commerce Transactions.
411-422
Infrastructure for Information Security
Advanced Topics in Security
Legislation for Information Security
Modeling and Analysis for Information Security
Tools for Information Security
Copyright © Sun Mar 14 23:23:59 2010
by Michael Ley (ley@uni-trier.de)