IAS C

59 papers

YearTitle / Authors
2008A Composite Network Security Assessment.
Suleyman Kondakci
2008A Device Management Framework for Secure Ubiquitous Service Delivery.
Adrian Leung, Chris J. Mitchell
2008A Formal Comparison of the Bell & LaPadula and RBAC Models.
Lionel Habib, Mathieu Jaume, Charles Morisset
2008A Friend Mechanism for Mobile Ad Hoc Networks.
Shukor Abd Razak, Normalia Samian, Mohd Aizaini Maarof
2008A Group Key Agreement Scheme Revisited.
Zhengjun Cao, Lihua Liu
2008A Model for the Study of Privacy Issues in Secure Shell Connections.
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
2008A New Narrow Block Mode of Operations for Disk Encryption.
Mohamed Abo El-Fotouh, Klaus Diepold
2008A New Secure Binding Management Protocol for Mobile IPv6 Networks.
Osama A. Elshakankiry, Andy Carpenter, Ning Zhang
2008A Purchase Protocol with Live Cardholder Authentication for Online Credit Card Payment.
Hannan Xiao, Bruce Christianson, Ying Zhang
2008A Queuing Theory Based Model for Studying Intrusion Evolution and Elimination in Computer Networks.
Pantelis Kammas, Thodoros Komninos, Yannis C. Stamatiou
2008A Server Based ASR Approach to Automated Cryptanalysis of Two Time Pads in Case of Speech.
Liaqat Ali Khan, Muhammad Shamim Baig
2008A Time and Storage Efficient Solution to Remote File Integrity Check.
A. V. Sarad, Sankar Kuppan, M. Vipin
2008ACML: Capability Based Attack Modeling Language.
Navneet Kumar Pandey, S. K. Gupta, Shaveta Leekha, Jingmin Zhou
2008Abusing SIP Authentication.
Humberto J. Abdelnur, Tigran Avanesov, Michaël Rusinowitch, Radu State
2008Adaptive Dynamic Reaction to Automotive IT Security Incidents Using Multimedia Car Environment.
Tobias Hoppe, Stefan Kiltz, Jana Dittmann
2008An Automated Validation Method for Security Policies: The Firewall Case.
Ryma Abassi, Sihem Guemara El Fatmi
2008An Efficient Approach to Minimum-Cost Network Hardening Using Attack Graphs.
Feng Chen, Lingyu Wang, Jinshu Su
2008An Implementation Infrastructure for Server-Passive Timed-Release Cryptography.
Konstantinos Chalkias, Foteini Baldimtsi, Dimitrios Hristu-Varsakelis, George Stephanides
2008Automatic Verification of Simulatability in Security Protocols.
Tadashi Araragi, Olivier Pereira
2008COTraSE: Connection Oriented Traceback in Switched Ethernet.
Marios S. Andreou, Aad P. A. van Moorsel
2008Challenges for Security Typed Web Scripting Languages Design.
Doaa Hassan, Sherif El-Kassas, Ibrahim Ziedan
2008Chaotic Quantum Cryptography.
Stamatios V. Kartalopoulos
2008Comparison and Evaluation of Identity Management in Three Architectures for Virtual Organizations.
Ali Nasrat Haidar, Ali E. Abdallah
2008Data Fusion Assurance for the Kalman Filter in Uncertain Networks.
Bonnie Zhu, Shankar Sastry
2008Data Hiding in Non-Expansion Visual Cryptography Based on Edge Enhancement Multitoning.
Hao Luo, Fa-Xin Yu, Jeng-Shyang Pan
2008Designing a DRM System.
Franco Frattolillo, Federica Landolfi
2008Developing a Security Typed Java Servlet.
Doaa Hassan, Sherif El-Kassas, Ibrahim Ziedan
2008Dynamic Substitution Model.
Mohamed Abo El-Fotouh, Klaus Diepold
2008Efficient Hierarchical Group-Oriented Key Establishment and Decryption.
Sigurd Eskeland, Vladimir A. Oleshchuk
2008Ensemble of One-Class Classifiers for Network Intrusion Detection System.
Anazida Binti Zainal, Mohd Aizaini Maarof, Siti Mariyam Hj. Shamsuddin, Ajith Abraham
2008Forward-Secure Proxy Signature Scheme for Multiple Proxy Signers Using Bellare-Miner Scheme with Proxy Revocation.
N. R. Sunitha, B. B. Amberker
2008Geolocation-Based Trust for Vanet's Privacy.
Jetzabel M. Serna, Jesus Luna, Manel Medina
2008IRC Traffic Analysis for Botnet Detection.
Claudio Mazzariello
2008Impact of Cheating and Non-Cooperation on the Stability and the Performances of Application-Level Multicast Sessions.
Mothanna Alkubeily, Hatem Bettahar, Abdelmadjid Bouabdallah
2008Improving the Efficiency of Misuse Detection by Means of the q-gram Distance.
Slobodan Petrovic, Sverre Bakke
2008Information Assurance in Critical Infrastructures via Wireless Sensor Networks.
Michele Albano, Stefano Chessa, Roberto Di Pietro
2008Integrating Delegation with the Formal Core RBAC Model.
Ali E. Abdallah, Hassan Takabi
2008Key Distribution Using Dual Quantum Channels.
Di Jin, Pramode K. Verma, Stamatios V. Kartalopoulos
2008LoSS Detection Approach Based on ESOSS and ASOSS Models.
Mohd. Foad Rohani, Mohd Aizaini Maarof, Ali Selamat, Houssain Kettani
2008Managing Reputation over MANETs.
Giampaolo Bella, Gianpiero Costantino, Salvatore Riccobene
2008Matrix Factorization Approach for Feature Deduction and Design of Intrusion Detection Systems.
Václav Snásel, Jan Platos, Pavel Krömer, Ajith Abraham
2008Network Level Privacy for Wireless Sensor Networks.
Riaz Ahmed Shaikh, Hassan Jameel, Brian J. d'Auriol, Sungyoung Lee, Young Jae Song, Heejo Lee
2008Operator-Centric and Adaptive Intrusion Detection.
Ulf Larson, Stefan Lindskog, Dennis K. Nilsson, Erland Jonsson
2008PHAL-256 - Parameterized Hash Algorithm.
Przemyslaw Rodwald, Janusz Stoklosa
2008Persian/Arabic Unicode Text Steganography.
Mohammad Shirali-Shahreza, Sajad Shirali-Shahreza
2008Proccedings of the Fourth International Conference on Information Assurance and Security, IAS 2008, September 8-10, 2008, Napoli, Italy
Massimiliano Rak, Ajith Abraham, Valentina Casola
2008Provenance Tracking with Bit Vectors.
Siddharta S. Gadang, Brajendra Panda, Joseph E. Hoag
2008Quantum Key Distribution Based on Multi-qubit Hadamard Matrices.
Dazu Huang, Zhigang Chen
2008Realistic Threats to Self-Enforcing Privacy.
Giampaolo Bella, Francesco Librizzi, Salvatore Riccobene
2008Secure E-Passport Protocol Using Elliptic Curve Diffie-Hellman Key Agreement Protocol.
Mohamed Abid, Hossam Afifi
2008Secure Hybrid Group Key Management for Hierarchical Self-Organizing Sensor Network.
Shu Yun Lim, Meng-Hui Lim, Sanggon Lee, Hoonjae Lee
2008Security Analysis of Temporal-RBAC Using Timed Automata.
Samrat Mondal, Shamik Sural
2008Semantics-Driven Introspection in a Virtual Environment.
Francesco Tamberi, Dario Maggiari, Daniele Sgandurra, Fabrizio Baiardi
2008Skin Segmentation Using Color Distance Map and Water-Flow Property.
Mohammad Abdullah-Al-Wadud, Oksam Chae
2008Speaker Identification by Multi-Frame Generative Models.
Donato Impedovo, Mario Refice
2008Steganography in Textiles.
Sajad Shirali-Shahreza, Mohammad Shirali-Shahreza
2008Systematic Website Verification for Privacy Protection.
Ji-Hee Jeoung, Eun-Ji Shin, Seng-Phil Hong, Sung-Hoon Kim, In-Ho Kim, Min-Woo Lee
2008Threshold Proxy Signature Scheme with Strong Real-Time Efficiency.
Xiaoming Wang, Huoyan Chen
2008Web Application Attack Prevention for Tiered Internet Services.
Susanta Nanda, Lap-Chung Lam, Tzi-cker Chiueh