Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
10 | Zeeshan Furqan, Shahabuddin Muhammad, Ratan K. Guha |
Formal Verification of 802.11i using Strand Space Formalism. |
ICN/ICONS/MCL |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro |
Low Rate DoS Attack to Monoprocess Servers. |
SPC |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Zhenchuan Chai, Zhenfu Cao, Rongxing Lu |
Remote Authentication with Forward Security. |
ATC |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Yongzhong Zhang, Jianhua Yang, Chunming Ye |
Resistance Analysis to Intruders' Evasion of a Novel Algorithm to Detect Stepping-Stone. |
ATC |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Rahul Mangharam, Anthony Rowe 0001, Raj Rajkumar, Ryohei Suzuki |
Voice over Sensor Networks. |
RTSS |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Pramod Kumar Meher, Jagdish Chandra Patra |
A new approach to secure distributed storage, sharing and dissemination of digital image. |
ISCAS |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Eung Soo Kim, Min Sung Kim |
Design and Fabrication of Security and Home Automation System. |
ICCSA (3) |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Mathieu Turuani |
The CL-Atse Protocol Analyser. |
RTA |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro |
Assessment of a Vulnerability in Iterative Servers Enabling Low-Rate DoS Attacks. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Zhiqiang Yang, Sheng Zhong 0002, Rebecca N. Wright |
Privacy-Preserving Queries on Encrypted Data. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Sergio Roberto de Lima e Silva Filho, Mauro Roisenberg |
Continuous Authentication by Keystroke Dynamics Using Committee Machines. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Gregory B. Newby |
Paths to creativity in security careers. |
PST |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Mehmet A. Orgun, Ji Ma 0001, Chuchang Liu, Guido Governatori |
Analysing Stream Authentication Protocols in Autonomous Agent-Based Systems. |
DASC |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Abraham Sánchez López, Rodrigo Cuautle, René Zapata, Maria A. Osorio |
A Reactive Lazy PRM Approach for Nonholonomic Motion Planning. |
IBERAMIA-SBIA |
2006 |
DBLP DOI BibTeX RDF |
Nonholonomic motion planning, deformable virtual zone, lazy PRM |
10 | Paul Hankes Drielsma, Sebastian Mödersheim, Luca Viganò 0001, David A. Basin |
Formalizing and Analyzing Sender Invariance. |
Formal Aspects in Security and Trust |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Ralf Küsters |
On the decidability of cryptographic protocols with open-ended data structures. |
Int. J. Inf. Sec. |
2005 |
DBLP DOI BibTeX RDF |
Complexity, Cryptographic protocols, Decidability, Transducers |
10 | David A. Basin, Sebastian Mödersheim, Luca Viganò 0001 |
OFMC: A symbolic model checker for security protocols. |
Int. J. Inf. Sec. |
2005 |
DBLP DOI BibTeX RDF |
Model checking, Verification, Formal methods, Constraints, Security protocols |
10 | Stephen E. Fienberg, Aleksandra B. Slavkovic |
Preserving the Confidentiality of Categorical Statistical Data Bases When Releasing Information for Association Rules. |
Data Min. Knowl. Discov. |
2005 |
DBLP DOI BibTeX RDF |
conditional tables, marginal tables, association rules, privacy preservation, contingency tables, algebraic geometry, disclosure limitation |
10 | Dong-Soo Kim, Y. J. Jung, Tai-Myung Chung |
PRISM: A Preventive and Risk-Reducing Integrated Security Management Model Using Security Label. |
J. Supercomput. |
2005 |
DBLP DOI BibTeX RDF |
security management, security label, ESM, ISM |
10 | Abhinav Kamra, Jon Feldman, Vishal Misra, Dan Rubenstein |
Data persistence in sensor networks: towards optimal encoding for data recovery in partial network failures. |
SIGMETRICS Perform. Evaluation Rev. |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Mohan M. Trivedi, Kohsia S. Huang, Ivana Mikic |
Dynamic context capture and distributed video arrays for intelligent spaces. |
IEEE Trans. Syst. Man Cybern. Part A |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Ali Iranli, Hanif Fatemi, Massoud Pedram |
Lifetime-aware intrusion detection under safeguarding constraints. |
IPSN |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Wensheng Zhang 0001, Guohong Cao |
Defend Against Cache Consistency Attacks in Wireless Ad Hoc Networks. |
MobiQuitous |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Mourad Debbabi, Mohamed Mostafa Saleh |
Game Semantics Model for Security Protocols. |
ICFEM |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Peter C. Lockemann, René Witte |
Agents and Databases: Friends or Foes? |
IDEAS |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Kamel Adi, Liviu Pene |
Secrecy Correctness for Security Protocols. |
DFMA |
2005 |
DBLP DOI BibTeX RDF |
Protocol Correctness, Security Protocols, Formal Analysis, Secrecy |
10 | Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Christopher Walstad |
Specifying Kerberos 5 cross-realm authentication. |
WITS |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Deepak Kapur, Paliath Narendran, Lida Wang |
A Unification Algorithm for Analysis of Protocols with Blinded Signatures. |
Mechanizing Mathematical Reasoning |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Hamdy S. Soliman, Mohammed Omari |
Application of synchronous dynamic encryption system (SDES) in wireless sensor networks. |
PE-WASUN |
2005 |
DBLP DOI BibTeX RDF |
deployment knowledge, encryption permutation vectors, power balancing, sensors security primitives, stream ciphers |
10 | Dean A. Jones, Mark A. Turnquist, Linda K. Nozick |
Simulation of imperfect information in vulnerability modeling for infrastructure facilities. |
WSC |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Wiebke Dresp |
Security Analysis of the Secure Authentication Protocol by Means of Coloured Petri Nets. |
Communications and Multimedia Security |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Soumya Banerjee, Crina Grosan, Ajith Abraham |
IDEAS: Intrusion Detection based on Emotional Ants for Sensors. |
ISDA |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Jianhua Yang, Shou-Hsuan Stephen Huang |
Improved Thumbprint and Its Application for Intrusion Detection. |
ICCNMC |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Wensheng Zhang 0001, Guohong Cao |
Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach. |
INFOCOM |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Pradeep Kannadiga, Mohammad Zulkernine |
DIDMA: A Distributed Intrusion Detection System Using Mobile Agents. |
SNPD |
2005 |
DBLP DOI BibTeX RDF |
network security and distributed systems, mobile agents, Intrusion detection, distributed attacks |
10 | Khin Mi Mi Aung, Kiejin Park, Jong Sou Park |
A rejuvenation methodology of cluster recovery. |
CCGRID |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Leping Huang, Hiroshi Yamane, Kanta Matsuura, Kaoru Sezaki |
Towards Modeling Wireless Location Privacy. |
Privacy Enhancing Technologies |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Ana Paula R. da Silva, Marcelo H. T. Martins, Bruno P. S. Rocha, Antonio Alfredo Ferreira Loureiro, Linnyer Beatrys Ruiz, Hao Chi Wong |
Decentralized intrusion detection in wireless sensor networks. |
Q2SWinet |
2005 |
DBLP DOI BibTeX RDF |
security, wireless sensor networks, intrusion detection |
10 | Mehdi Azadmehr, Jens Petter Abrahamsen, Philipp Häfliger |
A foveated AER imager chip [address event representation]. |
ISCAS (3) |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Sindhu Karthikeyan, Mikhail Nesterenko |
RFID security without extensive cryptography. |
SASN |
2005 |
DBLP DOI BibTeX RDF |
security, privacy, RFID |
10 | Chung-Ming Huang, Jian-Wei Li |
Authentication and Key Agreement Protocol for UMTS with Low Bandwidth Consumption. |
AINA |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Jean Goubault-Larrecq, Fabrice Parrennes |
Cryptographic Protocol Analysis on Real C Code. |
VMCAI |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Takashi Minohara, Satoshi Ishikawa, Masahiro Amano |
Centralized Surveillance of Unused Address Space by using Virtual Networks. |
PRDC |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Hans Hüttel, Jirí Srba |
Recursion Versus Replication in Simple Cryptographic Protocols. |
SOFSEM |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Chin-Chen Chang 0001, Jung-San Lee |
Improvement on an Optimized Protocol for Mobile Network Authentication and Security. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Rob Delicata, Steve A. Schneider |
A Formal Approach for Reasoning About a Class of Diffie-Hellman Protocols. |
Formal Aspects in Security and Trust |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Nicolas Sklavos 0001, Nick A. Moldovyan, Vladimir Gorodetsky, Odysseas G. Koufopavlou |
Computer Network Security: Report from MMM-ACNS. |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
WMMM, ACNS, architectures, mathematical models, conference |
10 | Min-Shiang Hwang, Li-Hua Li, Cheng-Chi Lee |
A key authentication scheme with non-repudiation. |
ACM SIGOPS Oper. Syst. Rev. |
2004 |
DBLP DOI BibTeX RDF |
non-repudiation security, authentication, certificate, discrete logarithm, public key |
10 | Stéphanie Delaune, Florent Jacquemard |
A decision procedure for the verification of security protocols with explicit destructors. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
formal methods, security protocols, constraint solving |
10 | Simone Giannecchini, Marco Caccamo, Chi-Sheng Shih 0001 |
Collaborative Resource Allocation in Wireless Sensor Networks. |
ECRTS |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Traian Marius Truta, Farshad Fotouhi, Daniel C. Barth-Jones |
Disclosure risk measures for the sampling disclosure control method. |
SAC |
2004 |
DBLP DOI BibTeX RDF |
disclosure risk and sampling, data privacy, microdata, statistical disclosure |
10 | Weiqiang Kong, Kazuhiro Ogata 0001, Jianwen Xiang, Kokichi Futatsugi |
Formal Analysis of an Anonymous Fair Exchange E-Commerce Protocol. |
CIT |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Rakesh Agrawal 0001, Jerry Kiernan, Ramakrishnan Srikant, Yirong Xu |
Order-Preserving Encryption for Numeric Data. (PDF / PS) |
SIGMOD Conference |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Yongjian Li, Rui Xue |
Design of a CIL Connector to SPIN. |
COMPSAC |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Shichao Ou, Deepak R. Karuppiah, Andrew H. Fagg, Edward M. Riseman |
An Augmented Virtual Reality Interface for Assistive Monitoring of Smart Spaces. |
PerCom |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Ralf Küsters, Thomas Wilke |
Automata-Based Analysis of Recursive Cryptographic Protocols. |
STACS |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Miyoung Kim, Misun Kim, Youngsong Mun |
Design and Implementation of the HoneyPot System with Focusing on the Session Redirection. |
ICCSA (1) |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Dong-Soo Kim, Tai-Myung Chung |
A Design of Preventive Integrated Security Management System Using Security Labels and a Brief Comparison with Existing Models. |
ICCSA (1) |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Yonghak Ahn, Kiok Ahn, Oksam Chae |
Detection of Moving Objects Edges to Implement Home Security System in a Wireless Environment. |
ICCSA (1) |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Alessandro Armando, Luca Compagna |
SATMC: A SAT-Based Model Checker for Security Protocols. |
JELIA |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Jianguo Ding, Shihao Xu, Bernd J. Krämer, Yingcai Bai, Hansheng Chen 0003, Jun Zhang |
Probabilistic Inference Strategy in Distributed Intrusion Detection Systems. |
ISPA |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Janica Edmonds, Mauricio Papa |
Cryptographic Protocol Analysis using Goal Extraction. |
ITCC (1) |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Sjouke Mauw, Jan Verschuren, Erik P. de Vink |
A Formalization of Anonymity and Onion Routing. |
ESORICS |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Kwong H. Yung |
Using Self-Consistent Naive-Bayes to Detect Masquerades. |
PAKDD |
2004 |
DBLP DOI BibTeX RDF |
self-consistent naive-Bayes, intrusion detection, anomaly detection, expectation-maximization algorithm, semisupervised learning, masquerade detection |
10 | Jun-Chou Chuang, Chin-Chen Chang 0001 |
Detection and Restoration of a Tampered Medical Image. |
MIAR |
2004 |
DBLP DOI BibTeX RDF |
Authentication, watermarking, medical imaging, confidentiality |
10 | Laurent Mazaré |
Decidability of Opacity with Non-Atomic Keys. |
Formal Aspects in Security and Trust |
2004 |
DBLP DOI BibTeX RDF |
Dolev-Yao Constraints, Security, Formal Verification, Decidability, Rewriting Systems, Opacity |
10 | Charles A. Shoniregun, Adebola Omoegun, Diepriye Brown-West, Oleksandr Logvynovskiy |
Can eCRM and Trust Improve eC Customer Base? |
CEC |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Ramana Rao Kompella, Sumeet Singh, George Varghese |
On scalable attack detection in the network. |
Internet Measurement Conference |
2004 |
DBLP DOI BibTeX RDF |
security, scalability, denial of service |
10 | Maxim Peysakhov, Donovan Artz, Evan Sultanik, William C. Regli |
Network Awareness for Mobile Agents on Ad Hoc Networks. |
AAMAS |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Josep Domingo-Ferrer, Vicenç Torra |
Disclosure risk assessment in statistical microdata protection via advanced record linkage. |
Stat. Comput. |
2003 |
DBLP DOI BibTeX RDF |
disclosure risk for microdata, record linkage, statistical disclosure control, re-identification |
10 | Luca Durante, Riccardo Sisto, Adriano Valenzano |
Automatic testing equivalence verification of spi calculus specifications. |
ACM Trans. Softw. Eng. Methodol. |
2003 |
DBLP DOI BibTeX RDF |
equivalence verification, Cryptographic protocols, state space exploration |
10 | Jonathan Hui, Zhiyuan Ren, Bruce H. Krogh |
Sentry-Based Power Management in Wireless Sensor Networks. |
IPSN |
2003 |
DBLP DOI BibTeX RDF |
wireless sensor networks, tracking, Power management |
10 | Xinyuan Wang 0005, Douglas S. Reeves |
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays. |
CCS |
2003 |
DBLP DOI BibTeX RDF |
intrusion tracing, robustness, correlation, stepping stones |
10 | Ramkumar Chinchani, Shambhu J. Upadhyaya, Kevin A. Kwiat |
A Tamper-Resistant Framework for Unambiguous Detection of Attacks in User Space Using Process Monitors. |
IWIA |
2003 |
DBLP DOI BibTeX RDF |
|
10 | Traian Marius Truta, Farshad Fotouhi, Daniel C. Barth-Jones |
Privacy and confidentiality management for the microaggregation disclosure control method: disclosure risk and information loss measures. |
WPES |
2003 |
DBLP DOI BibTeX RDF |
information loss and microaggregation, data privacy, microdata, disclosure risk, statistical disclosure |
10 | Kui Jia, Liyanage C. De Silva |
Combined Face Detection/Recognition System for Smart Rooms. |
AVBPA |
2003 |
DBLP DOI BibTeX RDF |
|
10 | Kwong H. Yung |
Using Feedback to Improve Masquerade Detection. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
feedback-on-alarm, feedback policy, sequential classifier, online classifier, adaptive classifier, masquerading session, masquerading user, intrusion detection, naive-Bayes classifier, masquerade detection |
10 | Seung-Hyun Seo, Sang-Ho Lee |
A Secure Mobile Agent System Using Multi-signature Scheme in Electronic Commerce. |
Human.Society@Internet 2003 |
2003 |
DBLP DOI BibTeX RDF |
Multi-signature scheme, Mobile agent system |
10 | Lingxuan Hu, David Evans 0001 |
Secure Aggregation for Wireless Network. |
SAINT Workshops |
2003 |
DBLP DOI BibTeX RDF |
|
10 | Tobias Hauser, Christian Wenz |
DRM Under Attack: Weaknesses in Existing Systems. |
Digital Rights Management |
2003 |
DBLP DOI BibTeX RDF |
|
10 | David A. Basin, Sebastian Mödersheim, Luca Viganò 0001 |
An On-the-Fly Model-Checker for Security Protocol Analysis. |
ESORICS |
2003 |
DBLP DOI BibTeX RDF |
|
10 | Pedro Alípio, Paulo Carvalho 0002, José Neves 0001 |
Using CLIPS to Detect Network Intrusions. |
EPIA |
2003 |
DBLP DOI BibTeX RDF |
Intrusion detection, CLIPS, SNORT, attack scenarios, certainty factors |
10 | Yongge Wang, Yuliang Zheng 0001 |
Fast and Secure Magnetic WORM Storage Systems. |
IEEE Security in Storage Workshop |
2003 |
DBLP DOI BibTeX RDF |
|
10 | John P. McDermott, Anya Kim, Judith N. Froscher |
Merging paradigms of survivability and security: stochastic faults and designed faults. |
NSPW |
2003 |
DBLP DOI BibTeX RDF |
|
10 | Duncan S. Wong |
An optimized authentication protocol for mobile network reconsidered. |
ACM SIGMOBILE Mob. Comput. Commun. Rev. |
2002 |
DBLP DOI BibTeX RDF |
|
10 | Massimo Bernaschi, Emanuele Gabrielli, Luigi V. Mancini |
Remus: a security-enhanced operating system. |
ACM Trans. Inf. Syst. Secur. |
2002 |
DBLP DOI BibTeX RDF |
privileged tasks, system penetration, Access control, Linux, system calls interception |
10 | Michael J. Butler |
On the Use of Data Refinement in the Development of Secure Communications Systems. |
Formal Aspects Comput. |
2002 |
DBLP DOI BibTeX RDF |
Refinement, Security protocols, CSP, B, Action systems |
10 | Iliano Cervesato, Nancy A. Durgin, Patrick Lincoln, John C. Mitchell, Andre Scedrov |
A Comparison between Strand Spaces and Multiset Rewriting for Security Protocol Analysis. |
ISSS |
2002 |
DBLP DOI BibTeX RDF |
|
10 | Philippa J. Broadfoot, A. W. Roscoe 0001 |
Capturing Parallel Attacks within the Data Independence Framework. |
CSFW |
2002 |
DBLP DOI BibTeX RDF |
|
10 | Paolo Maggi, Riccardo Sisto |
Using SPIN to Verify Security Properties of Cryptographic Protocols. |
SPIN |
2002 |
DBLP DOI BibTeX RDF |
|
10 | Giorgio Giacinto, Fabio Roli |
Intrusion Detection in Computer Networks by Multiple Classifier Systems. |
ICPR (2) |
2002 |
DBLP DOI BibTeX RDF |
|
10 | Chong-Woo Woo, Jin-Woo Choi, Martha W. Evens |
Web-Based ITS for Training System Managers on the Computer Intrusion. |
Intelligent Tutoring Systems |
2002 |
DBLP DOI BibTeX RDF |
|
10 | Marco Bozzano, Giorgio Delzanno |
Automated protocol verification in linear logic. |
PPDP |
2002 |
DBLP DOI BibTeX RDF |
model checking, linear logic, authentication protocols, bottom-up evaluation |
10 | Michele Boreale, Maria Grazia Buscemi |
A Framework for the Analysis of Security Protocols. |
CONCUR |
2002 |
DBLP DOI BibTeX RDF |
|
10 | Ralf Küsters |
On the Decidability of Cryptographic Protocols with Open-Ended Data Structures. |
CONCUR |
2002 |
DBLP DOI BibTeX RDF |
|
10 | Gene Itkis |
Intrusion-Resilient Signatures: Generic Constructions, or Defeating Strong Adversary with Minimal Assumptions. |
SCN |
2002 |
DBLP DOI BibTeX RDF |
|
10 | Luigi Catuogno, Ivan Visconti |
A Format-Independent Architecture for Run-Time Integrity Checking of Executable Code. |
SCN |
2002 |
DBLP DOI BibTeX RDF |
|
10 | Gene Itkis, Leonid Reyzin |
SiBIR: Signer-Base Intrusion-Resilient Signatures. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
|
10 | Timothy W. Rauenbusch |
The mediation algorithm for real time negotiation. |
AAMAS |
2002 |
DBLP DOI BibTeX RDF |
|
10 | Giampaolo Bella |
Mechanising a Protocol for Smart Cards. |
E-smart |
2001 |
DBLP DOI BibTeX RDF |
smart card protocols, Inductive Approach, authentication, confidentiality, key distribution |