default search action
SEC 2000: Beijing, China
- Sihan Qing, Jan H. P. Eloff:
Information Security for Global Information Infrastructures, IFIP TC11 Fifteenth Annual Working Conference on Information Security, August 22-24, 2000, Beijing, China. IFIP Conference Proceedings 175, Kluwer 2000, ISBN 0-7923-7914-4
Part one - Reviewed Papers
- Kai Rannenberg:
IT Security Certification and Criteria. Progress, Problems and Perspectives. SEC 2000: 1-10 - Mariki M. Eloff, Sebastiaan H. von Solms:
Information Security: Process Evaluation and Product Evaluation. SEC 2000: 11-18 - Helen L. Armstrong:
Managing Information Security in Healthcare - an Action Research Experience. SEC 2000: 19-28 - Rossouw von Solms, Helen van de Haar:
From Trusted Information Security Controls to a Trusted Information Security Environment. SEC 2000: 29-36 - Theodore Tryfonas, Dimitris Gritzalis, Spyros Kokolakis:
A Qualitative Approach to Information Availability. SEC 2000: 37-48 - Sokratis K. Katsikas:
A Postgraduate Programme on Information and Communication Systems Security. SEC 2000: 49-58 - Elmarie von Solms, Sebastiaan H. von Solms:
Information Security Management Through Measurement. SEC 2000: 59-68 - Jianchun Jiang, Weifeng Chen, Sihan Qing, Dengguo Feng:
The Defense Framework for Large-scale Computer Network System. SEC 2000: 69-78 - Wolfgang Eßmayr, Edgar R. Weippl:
Identity Mapping: An Approach to Unravel Enterprise Security Management Policies. SEC 2000: 79-88 - Herbert Leitold, Peter Lipp, Andreas Sterbenz:
Independent Policy Oriented Layering of Security Services. SEC 2000: 89-98 - Robert Willison:
Reducing Computer Fraud Through Situational Crime Prevention. SEC 2000: 99-109 - Mikko T. Siponen:
Policies for Construction of Information Systems' Security Guidelines: Five Approaches. SEC 2000: 111-120 - C. P. Louwrens, Sebastiaan H. von Solms:
"DNA-proofing" for Computer Systems - A New Approach to Computer Security? SEC 2000: 121-129 - Costas Lambrinoudakis:
Using Smart Cards in an Educational Environment: Services and Security Features. SEC 2000: 131-140 - Alida Liebenberg, Jan H. P. Eloff:
MASS: Model for an Auditing Security System. SEC 2000: 141-150 - Steven Dawson, Sabrina De Capitani di Vimercati, Patrick Lincoln, Pierangela Samarati:
Classifying Information for External Release. SEC 2000: 151-160 - Yongge Wang:
Using Mobile Agent Results to Create Hard-to-Detect Computer Viruses. SEC 2000: 161-170 - Jiahai Yang, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia:
CARDS: A Distributed System for Detecting Coordinated Attacks. SEC 2000: 171-180 - Petar Horvatic, Jian Zhao, Niels J. Thorwirth:
Robust Audio Watermarking Based on Secure Spread Spectrum and Auditory Perception Model. SEC 2000: 181-190 - Yongxing Sun, Xinmei Wang:
A Simple and Efficient Approach to Verfying Cryptographic Protocols. SEC 2000: 191-199 - Wenling Wu, Dengguo Feng, Sihan Qing:
Power Analysis of RC6 and Serpent. SEC 2000: 201-209 - Mingsheng Wang, Sihan Qing, Dengguo Feng:
A Simple Algorithm for Computing Several Sequences Synthesis. SEC 2000: 211-220 - Claudia Eckert, Florian Erhard, Johannes Geiger:
GSFS - A New Group-Aware Cryptographic File System. SEC 2000: 221-230 - Herbert Leitold, Wolfgang Mayerwieser, Udo Payer, Karl C. Posch, Reinhard Posch, Johannes Wolkerstorfer:
Robustness-Agile Encryptor for ATM Networks. SEC 2000: 231-240 - Jinhui Chao, Kazuto Matsuo, Shigeo Tsujii:
Fast Construction of Secure Discrete Logarithm Problems over Jacobian Varieties. SEC 2000: 241-250 - Johann Großschädl:
A New Serial/Parallel Architecture for a Low Power Modular Multiplier. SEC 2000: 251-260 - Haizhi Xu, Changwei Cui, Ying Lin, Tiejian Luo, Zhanqiu Dong:
Defending Against Null Calls Stream Attacks by Using a Double-Threshold Dynamic Filter. SEC 2000: 261-270 - Steve Kremer, Olivier Markowitch:
A Multi-Party Non-Repudiation Protocol. SEC 2000: 271-280 - Shaoquan Jiang, Dengguo Feng, Sihan Qing:
Analysis and Design of E-voting Protocol. SEC 2000: 281-290 - Vladimir I. Gorodetski, Igor V. Kotenko, Victor A. Skormin:
Integrated Multi-Agent Approach to Network Security Assurance: Models of Agents' Community. SEC 2000: 291-300 - Jussipekka Leiwo, Tuomas Aura, Pekka Nikander:
Towards Network Denial of Service Resistant Protocols. SEC 2000: 301-310 - Elton Saul, Andrew Hutchison:
A Generic Graphical Specification Environment for Security Protocol Modelling. SEC 2000: 311-320 - Rosanna Y. Chan, Jonathan C. Wong, Alex C. Chan:
Anonymous Electronic Voting System with Non-Transferable Voting Passes. SEC 2000: 321-330 - Olivier Paul, Maryline Laurent:
Improving Packet Filters Management through Automatic and Dynamic Schemes. SEC 2000: 331-340 - Damian G. Cholewka, Reinhardt A. Botha, Jan H. P. Eloff:
A Context-Sensitive Access Control Model and Prototype Implementation. SEC 2000: 341-350 - Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati:
Regulating Access To Semistructured Information on the Web. SEC 2000: 351-360 - Gregory Neven, Frank Piessens, Bart De Decker:
On the Practical Feasibiltiy of Secure Distributed Computing: A Case Study. SEC 2000: 361-370 - Michael Hitchens, Vijay Varadharajan:
Elements of a Language for Role-Based Access Control. SEC 2000: 371-380 - Jussipekka Leiwo, Christoph Hänle, Philip Homburg, Andrew S. Tanenbaum:
Disallowing Unauthorized State Changes of Distributed Shared Objects. SEC 2000: 381-390 - Ian R. Greenshields, Zhihong Yang:
Framework for Security Analysis and Access Control in a Distributed Service Medical Imaging Network. SEC 2000: 391-400 - Mikko T. Siponen:
On the Role of Human Morality in Information System Security: The Problems of Descriptivism and Non-descriptive Foundations. SEC 2000: 401-410 - Matthew J. Warren, William Hutchinson:
Information Warfare: Fact or Fiction? SEC 2000: 411-420 - Frans A. Lategan, Martin S. Olivier:
Enforcing Privacy by Withholding Private Information. SEC 2000: 421-430 - Gregory J. Kirsch, Tim Tingkang Xia:
The Changing Roles of Patent and Copyright Protection for Software and Communication Technology in the Internet Age. SEC 2000: 431-440 - Les Labuschagne:
A Framework for Electronic Commerce Security. SEC 2000: 441-450 - Feng Bao, Robert H. Deng, Jianying Zhou:
Electronic Payment Systems with Fair On-line Verification. SEC 2000: 451-460 - Fangguo Zhang, Futai Zhang, Yumin Wang:
Fair Electronic Cash Systems with Multiple Banks. SEC 2000: 461-470 - Anthony H. W. Chan, Caris K. M. Wong, Tsz Yeung Wong, Michael R. Lyu:
Securing Mobile Agents for Electronic Commerce: An Experiment. SEC 2000: 471-480 - Antonio Corradi, Rebecca Montanari, Cesare Stefanelli, Diana Berbecaru, Antonio Lioy, Fabio Maino:
A Flexible Management Framework for Certificate Status Validation. SEC 2000: 481-490 - Bart De Win, Jan Van den Bergh, Frank Matthijs, Bart De Decker, Wouter Joosen:
A Security Architecture for Electronic Commerce Applications. SEC 2000: 491-500
Part Two - Invited Papers
- Yiqun Lisa Yin:
On the Development of the Advanced Encryption Standard. SEC 2000: 503-504 - Xuejia Lai:
Public Key Infrastructure: Managing the e-Business Security. SEC 2000: 505-505
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.