default search action
ETRICS 2006: Freiburg, Germany
- Günter Müller:
Emerging Trends in Information and Communication Security, International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006, Proceedings. Lecture Notes in Computer Science 3995, Springer 2006, ISBN 3-540-34640-6
Multilateral Security
- Andreas Pfitzmann:
Multilateral Security: Enabling Technologies and Their Evaluation. 1-13 - Shyong K. Lam, Dan Frankowski, John Riedl:
Do You Trust Your Recommendations? An Exploration of Security and Privacy Issues in Recommender Systems. 14-29
Security in Service-Oriented Computing
- Martin Wimmer, Martina-Cezara Albutiu, Alfons Kemper:
Optimized Workflow Authorization in Service Oriented Architectures. 30-44 - Francesco Palmieri:
Dynamic Layer-2 VPN Services for Improving Security in the Grid Environment. 45-59 - Esther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda:
A P2P Content Authentication Protocol Based on Byzantine Agreement. 60-72
Secure Mobile Applications
- Nicolai Kuntze, Andreas U. Schmidt:
Transitive Trust in Mobile Scenarios. 73-85 - Marko Hassinen, Konstantin Hyppönen, Keijo Haataja:
An Open, PKI-Based Mobile Payment System. 86-100 - Young-Sik Hwang, Seung Wan Han, Taek Yong Nam:
Secure Rejoining Scheme for Dynamic Sensor Networks. 101-114 - Holger Grandy, Dominik Haneberg, Wolfgang Reif, Kurt Stenzel:
Developing Provable Secure M-Commerce Applications. 115-129
Enterprise Privacy
- Dominik Raub, Rainer Steinwandt:
An Algebra for Enterprise Privacy Policies Closed Under Composition and Conjunction. 130-144 - Jim Dowd, Shouhuai Xu, Weining Zhang:
Privacy-Preserving Decision Tree Mining Based on Random Substitutions. 145-159
Privacy, Identity, and Anonymity
- Wolfgang Hommel:
Policy-Based Integration of User and Provider-Sided Identity Management. 160-174 - Sven Wohlgemuth, Günter Müller:
Privacy with Delegation of Rights by Identity Management. 175-190 - Sebastian Clauß:
A Framework for Quantification of Linkability Within a Privacy-Enhancing Identity Management System. 191-205 - Stefan Köpsell, Rolf Wendolsky, Hannes Federrath:
Revocable Anonymity. 206-220 - Stefan Köpsell:
Low Latency Anonymous Communication - How Long Are Users Willing to Wait?. 221-237
Security Engineering
- Denis Hatebur, Maritta Heisel, Holger Schmidt:
Security Engineering Using Problem Frames. 238-253 - Steffen Kolarczyk, Manuel Koch, Klaus-Peter Löhr, Karl Pauls:
SecTOOL - Supporting Requirements Engineering for Access Control. 254-267 - Dieter Hutter:
Possibilistic Information Flow Control in MAKS and Action Refinement. 268-281 - Ihab Hamadeh, George Kesidis:
Toward a Framework for Forensic Analysis of Scanning Worms. 282-297 - Rainer Böhme:
A Comparison of Market Approaches to Software Vulnerability Disclosure. 298-311 - Woojin Chang:
Reliable Keystroke Biometric System Based on a Small Number of Keystroke Samples. 312-320
Security Policies
- Michael Barnett, David A. Naumann, Wolfram Schulte, Qi Sun:
Allowing State Changes in Specifications. 321-336 - Kathrin Lehmann, Peter Thiemann:
Field Access Analysis for Enforcing Access Control Policies. 337-351 - Paul E. Sevinç, David A. Basin, Ernst-Rüdiger Olderog:
Controlling Access to Documents: A Formal Access Control Model. 352-367 - Jürgen Nützel, Anja Beyer:
How to Increase the Security of Digital Rights Management Systems Without Affecting Consumer's Security. 368-380
Security and Protocols
- Carsten Hohendorf, Erwin P. Rathgeb, Esbold Unurkhaan, Michael Tüxen:
Secure End-to-End Transport over SCTP. 381-395 - Almudena Alcaide, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda:
An Extended Model of Rational Exchange Based on Dynamic Games of Imperfect Information. 396-408 - Florian Kerschbaum, Orestis Terzidis:
Filtering for Private Collaborative Benchmarking. 409-422
Intrusion Detection
- Fernando Godínez, Dieter Hutter, Raúl Monroy:
On the Use of Word Networks to Mimicry Attack Detection. 423-435 - Sebastian Schmerl, Hartmut König, Ulrich Flegel, Michael Meier:
Simplifying Signature Engineering by Reuse. 436-450 - Jun Qian, Chao Xu, Meilin Shi:
Redesign and Implementation of Evaluation Dataset for Intrusion Detection System. 451-465 - Ulrich Flegel, Joachim Biskup:
Requirements of Information Reductions for Cooperating Intrusion Detection Agents. 466-480
Perspectives of Cryptographic Security
- Arthur Schmidt:
Quantum Algorithm for Solving the Discrete Logarithm Problem in the Class Group of an Imaginary Quadratic Field and Security Comparison of Current Cryptosystems at the Beginning of Quantum Computer Age. 481-493 - Marcin Gogolewski, Marek Klonowski, Przemyslaw Kubiak, Miroslaw Kutylowski, Anna Lauks, Filip Zagórski:
Kleptographic Attacks on E-Voting Schemes. 494-508 - Igor Fischer, Thorsten Herfet:
Visual Document Authentication Using Human-Recognizable Watermarks. 509-521
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.