|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 146 occurrences of 129 keywords
|
|
|
Results
Found 685 publication records. Showing 685 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Steffen Bartsch |
A calculus for the qualitative risk assessment of policy override authorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010, pp. 62-70, 2010, ACM, 978-1-4503-0234-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Dmitry M. Golubchikov, Konstantin E. Rumiantsev |
Estimation of influence of error correction and privacy amplification on keys generation rate in QKD systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010, pp. 158-163, 2010, ACM, 978-1-4503-0234-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Irina V. Mashkina, Timur Kh. Tukhvatshin, Murat B. Guzairov |
The development of information security operational management system based on the intelligent technologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010, pp. 94-99, 2010, ACM, 978-1-4503-0234-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Josef Pieprzyk |
Evolution of cryptographic hashing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010, pp. 1, 2010, ACM, 978-1-4503-0234-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Dmitry Rublev, Vladimir Fedorov, Oleg B. Makarevich |
Digital camera identification based on rotated images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010, pp. 90-93, 2010, ACM, 978-1-4503-0234-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Reza Azadmanesh, Mohsen Sharifi |
Towards a system-wide and transparent security mechanism using language-level information flow control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010, pp. 19-26, 2010, ACM, 978-1-4503-0234-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Maxim O. Kalinin |
Permanent protection of information systems with method of automated security and integrity control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010, pp. 118-123, 2010, ACM, 978-1-4503-0234-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Alexander G. Chefranov, Ahmed Y. Mahmoud |
Elgamal public key cryptosystem and signature scheme in GU(m, p, n). ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010, pp. 164-167, 2010, ACM, 978-1-4503-0234-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ilker Korkmaz, Mehmet Emin Dalkiliç |
The weak and the strong password preferences: a case study on turkish users. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010, pp. 56-61, 2010, ACM, 978-1-4503-0234-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Carsten Schmoll, Nikolaos Chatzis, Christian Henke |
Protecting user privacy with multi-field anonymisation of ip addresses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010, pp. 38-45, 2010, ACM, 978-1-4503-0234-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Lyudmila K. Babenko, Evgeniya Ishchukova |
Differential analysis of GOST encryption algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010, pp. 149-157, 2010, ACM, 978-1-4503-0234-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Abdulkadir Akin, Aydin Aysu, Onur Can Ulusel, Erkay Savas |
Efficient hardware implementations of high throughput SHA-3 candidates keccak, luffa and blue midnight wish for single- and multi-message hashing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010, pp. 168-177, 2010, ACM, 978-1-4503-0234-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Poonam Gera, Kumkum Garg, Manoj Misra |
Trust based multi-path routing for end to end secure data delivery in manets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010, pp. 81-89, 2010, ACM, 978-1-4503-0234-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Vadim D. Kotov, Vladimir I. Vasilyev |
Immune model based approach for network intrusion detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010, pp. 233-237, 2010, ACM, 978-1-4503-0234-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Tatiana V. Stepanova, Maxim O. Kalinin, Peter Baranov, Dmitry P. Zegzhda |
Homogeneity analysis of power consumption for information security purposes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010, pp. 113-117, 2010, ACM, 978-1-4503-0234-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | M. Asif Khan, Mureed Hussain |
Cyber security quantification model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010, pp. 142-148, 2010, ACM, 978-1-4503-0234-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Alexander V. Lyubimov |
Integral engineering technique for information security methodologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010, pp. 3-11, 2010, ACM, 978-1-4503-0234-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Alexander Sergeevich Mosolov, Olga Viktorovna Grafova |
Review of european patents for methods of security system design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010, pp. 134-136, 2010, ACM, 978-1-4503-0234-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Shunan Ma, Jingsha He, Feng Gao, Yuqiang Zhang |
A trust quantification method based on grey fuzzy theory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010, pp. 27-31, 2010, ACM, 978-1-4503-0234-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Slava Kisilevich, Florian Mansmann |
Analysis of privacy in online social networks of runet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010, pp. 46-55, 2010, ACM, 978-1-4503-0234-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Alessandro Barenghi, Gerardo Pelosi, Yannick Teglia |
Improving first order differential power attacks through digital signal processing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010, pp. 124-133, 2010, ACM, 978-1-4503-0234-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Suleyman Kondakci, Gökhan Yilmaz |
Implementation and performance evaluation of the RSEP protocol on ARM and intel platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010, pp. 194-202, 2010, ACM, 978-1-4503-0234-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Evgeny Sergeevich Abramov, Denis Valerievich Mordvin, Oleg B. Makarevich |
Automated method for constructing of network traffic filtering rules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010, pp. 203-211, 2010, ACM, 978-1-4503-0234-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Dmitry V. Cheremushkin, Alexander V. Lyubimov |
An application of integral engineering technique to information security standards analysis and refinement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010, pp. 12-18, 2010, ACM, 978-1-4503-0234-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Behnam Rahnama, Atilla Elçi, Selcuk Celik |
Securing RFID-based authentication systems using ParseKey+. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010, pp. 212-217, 2010, ACM, 978-1-4503-0234-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Alexander Tereshkin |
Evil maid goes after PGP whole disk encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010, pp. 2, 2010, ACM, 978-1-4503-0234-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | P. Lalith Suresh, Rajbir Kaur, Manoj Singh Gaur, Vijay Laxmi |
A collusion attack detection method for OLSR-based MANETS employing scruple packets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010, pp. 256-262, 2010, ACM, 978-1-4503-0234-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Taner Tuncer, Yetkin Tatar |
FPGA based programmable embedded intrusion detection system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010, pp. 245-248, 2010, ACM, 978-1-4503-0234-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Iryna Borysivna Tregubenko |
Reinforcement learning intellectual agent of protection for adapting to surrounding environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010, pp. 110-112, 2010, ACM, 978-1-4503-0234-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Vladimir I. Vorobiev, Ludmila N. Fedorchenko, Vadim P. Zabolotsky, Alexander V. Lyubimov |
Ontology-based analysis of information security standards and capabilities for their harmonization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010, pp. 137-141, 2010, ACM, 978-1-4503-0234-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Alexis Velarde Pantola, Susan Pancho-Festin, Florante Salvador |
Rating the raters: a reputation system for wiki-like domains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010, pp. 71-80, 2010, ACM, 978-1-4503-0234-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Oleg B. Makarevich, Atilla Elçi, Mehmet A. Orgun, Sorin A. Huss, Ludmila K. Babenko, Alexander G. Chefranov, Vijay Varadharajan (eds.) |
Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010 ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![ACM, 978-1-4503-0234-0 The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
1 | Said Gharout, Abdelmadjid Bouabdallah, Mounir Kellil, Yacine Challal |
Key management with host mobility in dynamic groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010, pp. 186-194, 2010, ACM, 978-1-4503-0234-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Vinod P. Nair, Harshit Jain, Yashwant K. Golecha, Manoj Singh Gaur, Vijay Laxmi |
MEDUSA: MEtamorphic malware dynamic analysis usingsignature from API. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010, pp. 263-269, 2010, ACM, 978-1-4503-0234-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Kazim Yumbul, Erkay Savas |
Efficient, secure, and isolated execution of cryptographic algorithms on a cryptographic unit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 143-151, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
security, computer architecture, public key cryptography, instruction set extensions, cryptographic algorithms, aes |
1 | Vijay Varadharajan |
Evolution and challenges in trust and security in information system infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 1-2, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
trust enhanced security, trust management, trust models |
1 | Alexandr S. Basan, Lyudmila K. Babenko, Oleg B. Makarevich |
A model of mandatory access for current database management systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 67-70, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
dbms security, mandatory access model, model, information security |
1 | Haider Abbas, Louise Yngström, Ahmed Hemani |
Adaptability infrastructure for bridging IT security evaluation and options theory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 39-45, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
it product evaluation, it security evaluation, options theory |
1 | Vinod P. Nair, Vijay Laxmi, Manoj Singh Gaur, G. V. S. S. Phani Kumar, Yadvendra S. Chundawat |
Static CFG analyzer for metamorphic Malware code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 225-228, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
metamorphic malware, normalization, obfuscation, control flow graph, longest common subsequence |
1 | Simon Edward Parkin, Aad P. A. van Moorsel, Robert Coles |
An information security ontology incorporating human-behavioural implications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 46-55, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
human behavioural implications, information security ontology, password policy |
1 | Vijay Laxmi, Mudassar N. Khan, Sarath S. Kumar, Manoj Singh Gaur |
Buyer seller watermarking protocol for digital rights management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 298-301, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
buyer-seller protocol, unbinding., watermark, digital rights management, certificate authority, piracy |
1 | Sari Haj Hussein |
The hush cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 105-110, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
base64, grammatical substitution, randomness degree, redundant data percentage, sentence substitution, word substitution, hidden markov models, statistical tests |
1 | Sumi M., Ebrahim A. Soujeri, Rahim Rajan, Harikrishnan A. I. |
Design of a zigbee-based RFID network for industry applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 111-116, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
rfid and zigbee, wns, wireless networks |
1 | Tomi O. Kelo, Jukka A. Koskinen |
Modeling network security competence for certification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 30-38, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
network security, certification, competence |
1 | Somanath Tripathy |
Effective pair-wise key establishment scheme for wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 158-163, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
wireless sensor networks, cellular automata, key distribution, key establishment |
1 | Vadim D. Kotov, Vladimir I. Vasilyev |
Artificial immune system based intrusion detection system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 207-212, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
negative selection algorithms, artificial immune system, intrusion detection system, system calls |
1 | Francesco Buccafurri, Gianluca Caminiti, Gianluca Lax |
Fortifying the dalì attack on digital signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 278-287, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
E-signature, digital signature, vulnerability analysis |
1 | Sanjay Rawat 0001, Ashutosh Saxena |
Danger theory based SYN flood attack detection in autonomic network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 213-218, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
syn flood attack, intrusion detection, artificial immune system, adaptive threshold, autonomic networks, danger theory |
1 | Feodor Kulishov |
DFA-based and SIMD NFA-based regular expression matching on cell BE for fast network traffic filtering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 123-127, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
network security, SIMD, regular expressions, cell broadband engine, DFA, NFA |
1 | Erdal Cayirci |
Deployed sensor networks and their security challenges in practice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 104, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
sensor, actuator, secure routing |
1 | Mahdi Dashtbozorgi, Mohammad Abdollahi Azgomi |
A scalable multi-core aware software architecture for high-performance network monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 117-122, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
high-performance network monitoring, multi-core aware architecture, scalable architecture |
1 | Lie Liu, Chun Yuan |
Trace and revoke systems with short ciphertexts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 61-66, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
revoke, trace, broadcast encryption, ciphertext |
1 | Sazia Parvin, Shohrab Ali, Song Han 0004, Tharam S. Dillon |
Security against DOS attack in mobile IP communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 152-157, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
care-of-address (coa), correspondent node (cn), denial-of-service (dos), distributed denial-of-service (ddos), foreign agent (fa), home agent (ha), mobile host (mh), mobile node (mn) |
1 | Vladimir Mikhailovich Shishkin, Sergey Vitalievich Savkov |
The method of interval estimation in risk-analysis system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 3-7, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
dispersion of estimation, inaccuracy, uncertainty, probabilistic model, interval analysis, risk estimation |
1 | Andrey P. Kurilo, Natalia G. Miloslavskaya, Svetlana Tolstaya |
Ensuring information security controls for the Russian banking organizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 56-60, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
banking organizations, security controls, information security, russia |
1 | Kuldeep Singh, Audun Jøsang, Md. Sadek Ferdous, Ravishankar Borgaonkar |
Spam filter optimality based on signal detection theory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 219-224, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
signal detection theory (sdt)., optimality, filters, spam, e-mail, tradeoffs |
1 | Mücahit Mutlugün, Oktay Adalier |
Turkish national electronic identity card. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 14-18, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
national identity card, biometrics, smart card, pki |
1 | Anand Singh, David J. Lilja |
Improving risk assessment methodology: a statistical design of experiments approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 21-29, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Plackett-Burman., control, risk assessment, design of experiments |
1 | Xianghan Zheng, Vladimir A. Oleshchuk |
A secure architecture for P2PSIP-based communication systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 75-82, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
chord secure proxy, DHT (distributed hash table), session initiation protocol (SIP), peer-to-peer (P2P), chord, P2PSIP |
1 | Ahmed Y. Mahmoud, Alexander G. Chefranov |
Hill cipher modification based on eigenvalues HCM-EE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 164-167, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
dynamic key, eiqenvalue, hill cipher, exponentiation, matrix, image encryption, pseudorandom number |
1 | Jorge L. Hernandez-Ardieta, Ana Isabel González-Tablas Ferreres, Benjamín Ramos, Arturo Ribagorda |
Extended electronic signature policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 268-277, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
extended business model, signature policy, e-commerce, public key infrastructure, electronic signature, ASN.1 |
1 | Dmitry Rublev, Vladimir Fedorov, Oleg B. Makarevich, Anatolij Chumachenko |
Digital sound card identification based on recording path imperfections. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 240-243, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
audio recording device identification, automated identification, stationary components |
1 | Riccardo Bresciani, Andrew Butterfield |
Weakening the Dolev-Yao model through probability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 293-297, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
protocol verification |
1 | Kemal Bicakci |
Pushing the limits of one-time signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 249-257, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
digital signatures |
1 | Atilla Elçi, Oleg B. Makarevich, Mehmet A. Orgun, Alexander G. Chefranov, Josef Pieprzyk, Yuri Anatolievich Bryukhomitsky, Siddika Berna Örs (eds.) |
Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009 ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![ACM, 978-1-60558-412-6 The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
1 | Sorin Alexander Huss |
Embedded systems for IT security applications: properties and design considerations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 138-142, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
fpga, embedded systems, cryptography, system-on-chip |
1 | Gökhan Dalkiliç, Devrim Sipahi, Mehmet Hilal Özcanhan |
A simple yet effective spam blocking method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 179-185, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
SPF, spam blocking, spam |
1 | Samrat Mondal, Shamik Sural |
XML-based policy specification framework for spatiotemporal access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 98-103, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
estarbac, permission extent, role extent, spatiotemporal policy specification, xml |
1 | Khaled Salah 0001, Karim Sattar, Zubair A. Baig, Mohammed H. Sqalli, Prasad Calyam |
Resiliency of open-source firewalls against remote discovery of last-matching rules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 186-192, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
dos attacks, nework security, firewalls |
1 | Anna Kostina, Natalia G. Miloslavskaya, Alexander I. Tolstoy |
Information security incident management process. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 93-97, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
information security incidents, security, management |
1 | Oleg B. Makarevich, Lyudmila K. Babenko |
Research and Education Activities of the Department of Security of Information Technologies of Taganrog Institute of Technology of the Southern Federal University in the Field of Information Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 302-303, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
security, education, research |
1 | Iftikhar Ahmad 0002, Azween B. Abdullah, Abdullah Sharaf Alghamdi |
Application of artificial neural network in detection of DOS attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 229-234, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
internet control message protocol, multiple layered perceptron, resilient backpropagation, neural network, artificial neural network, false positive, dataset, false negative, detection rate, denial of service attack |
1 | Vladimir Kotenko, Alexey Evseev, Stas Kotenko, Konstantin E. Rumyantsev |
New approach to evaluate the effectiveness of the audio information protection for determining the identity of virtual speech images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 235-239, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
effectiveness of the audio information protection, virtual adaptive scrambling, virtual scrambling, redundancy, information security, legibility, scrambling |
1 | R. Suriya, K. Saravanan, Arunkumar Thangavelu |
An integrated approach to detect phishing mail attacks: a case study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 193-199, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
code script checker, domain name checker, linkguard, phishing |
1 | Elisa Bertino |
Assured information sharing: concepts and issues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 19-20, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
information lifecycle, policy management systems, security policies, information sharing |
1 | Naveen Kumar 0001, Shrikant Ojha, Kritika Jain, Sangeeta Lal |
BEAN: a lightweight stream cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 168-171, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
S-box, cipher, lightweight cryptography, grain |
1 | Erdal Cayirci, Son Thanh Nguyen, Chunming Rong |
Secure many to many routing for wireless sensor and actuator networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 172-178, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
sensor, actuator, secure routing |
1 | Çagdas Cirit, Feza Buzluca |
A UML profile for role-based access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 83-92, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
tagged value, role-based access control, model driven architecture, object constraint language, unified modeling language profile, model validation, stereotype, security engineering |
1 | Ashutosh Saxena |
An efficient and secure protocol for DTV broadcasts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 288-292, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
authenticaion, settop box, bilinear pairing |
1 | Serif Bahtiyar, Murat Cihan, Mehmet Ufuk Çaglayan |
An architectural approach for assessing system trust based on security policy specifications and security mechanisms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 71-74, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
trust, assessment |
1 | Jukka A. Koskinen, Tomi O. Kelo |
Pure e-learning course in information security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 8-13, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
education, e-learning, awareness, information security, course |
1 | Christian Schridde, Matthew Smith 0001, Bernd Freisleben |
TrueIP: prevention of IP spoofing attacks using identity-based cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 128-137, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
network security, denial-of-service, signatures, identity-based cryptography, IP spoofing |
1 | Jayashree Padmanabhan, K. S. Easwarakumar, Gokul B., Harishankar S. |
Trust based traffic monitoring approach for preventing denial of service attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 200-206, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
clustering, networks, trust, denial of service, centroid, dos |
1 | Atilla Elçi, Behnam Rahnama |
AWGN based seed for random noise generator in ParseKey+. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 244-248, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
imperfect use of timestamp, parsekey+, side channel attack, awgn |
1 | Moussa Amir Ehsan, Morteza Amini, Rasool Jalili |
A semantic-based access control mechanism using semantic technologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 258-267, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
MA(DL)2, semantic-based access control, semantic technologies, security mechanisms |
Displaying result #601 - #685 of 685 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7] |
|