default search action
Security and Management 2003: Las Vegas, Nevada, USA
- Hamid R. Arabnia, Youngsong Mun:
Proceedings of the International Conference on Security and Management, SAM '03, June 23 - 26, 2003, Las Vegas, Nevada, USA, Volume 2. CSREA Press 2003, ISBN 1-932415-17-3
Networks, Operating Systems, Web Services and Mobility
- Choon-Han Youn, Marlon E. Pierce, Geoffrey C. Fox:
Developing Secure Web Services for Computational Portals. Security and Management 2003: 367-372 - Geonlyang Kim, Jung-Chan Na, Seung Won Sohn:
Design of a LDAP Schema Based on Network Security Policy Information Model for Storing Security Policy. Security and Management 2003: 373-377 - Prabhaker Mateti, Sowgandh Sunil Gadi:
Prevention of Buffer Overflow Exploits in IA-32 Based Linux. Security and Management 2003: 378-384 - Kyechan Lee, Kyubum Wee:
Detection of Loadable Kernel Module Rootkit. Security and Management 2003: 385-389 - Maheshkumar Sabhnani, Gürsel Serpen:
Formulation of a Heuristic Rule for Misuse and Anomaly Detection for U2R Attacks in Solaris Operating System Environment. Security and Management 2003: 390-396 - Sang-Kil Park, Jongsoo Jang, BongNam Noh:
Supporting Interoperability to Multi Intrusion Detection System in Secure Networking Framework. Security and Management 2003: 397-401 - Alexander Buchmann, Harald Görl, Sven Lachmund:
Placement of Cryptographic Mechanisms in Operating Systems. Security and Management 2003: 402-408 - Bo-Heung Chung, Jeong-Nyeo Kim, Sung Won Sohn:
Improve Network Security with Kernel-Level Intrusion Detection Sensor. Security and Management 2003: 409-414 - Su-Hong Min, Ok-Ran Jeong, Dong-Sub Cho:
A Web-Based Login System Using the Time Based Password (TBP). Security and Management 2003: 415-420 - José R. Herrero, David Benlliure:
Operating System Support for Process Confinement. Security and Management 2003: 421-425 - Jong Tak Kim, Chan Koh, Jin Tak Choi:
A Protection of Mobile System in Network Systems. Security and Management 2003: 426-432 - Jongwook Moon, Hakbong Cho, Changseok Choi, Gihyun Jung, Younkwang Jung, Kyunghee Choi:
Accelerating Firewall. Security and Management 2003: 433-437 - Hyunchul Kang, Gil-Haeng Lee, Dae-Ung Kim:
Fault Management Model and Implementation for Customer Network Management. Security and Management 2003: 438-443 - Hye-Young Kim, Hwa-Sun Kim, Heung-Sik Kim, Sang-Gyun Kim, Heung-Kook Choi:
Cyber-Lecture Management System for XML-Based Secondary Education. Security and Management 2003: 444-448 - Jangbok Kim, Hosung Lim, Kyunghee Choi, Gihyun Jung:
A New Architecture for Enhancing the Security of E-Mail System. Security and Management 2003: 449-454 - Taeshik Shon, Jongsub Moon, Cheolwon Lee, Eul-Gyu Im, Jung-Taek Seo:
Safe Patch Distribution Architecture in Intranet Environments. Security and Management 2003: 455-460 - Boleslaw Fabisiak:
Threats, Vulnerabilities and Exposures to Networked Manufacturing Systems. Security and Management 2003: 461-468
Design and Analysis of Protocols and Performance Evaluation + Systems
- Holly Xiao:
Trust Management for Mobile IPv6 Binding Update. Security and Management 2003: 469-474 - Wonjoo Park, Dong-il Seo, Daeyoung Kim:
The Methods of IPsec Applying Between MN and HA in Mobile IPv6. Security and Management 2003: 475-478 - Yeojin Lee, Taehoon Lee, Ilyong Chung:
A Secure Mobile Agent System Based on Identity-Based Digital Signature Scheme. Security and Management 2003: 479-485 - Yoe-Sub Shin, Yang-Gyu Kim, Haeng-Seok Ko, Dong-Heyok Jang, TaeJoo Chang, Oh-Seok Kwon:
A Study on the High Crypto-System for the Multi-Sessions. Security and Management 2003: 486-490 - Dong-Ho Kang, Dong-il Seo, Jongsoo Jang:
A Study on Bandwidth Consumption DDoS: Attack Defense. Security and Management 2003: 491-494 - Leonardo Mattes, Frank Meylan, Adilson Eduardo Guelfi, João Antonio Zuffo:
Performance Analysis of a Security Manager for Multi-Service Communication Middleware. Security and Management 2003: 495-501 - Misun Kim, Sangjin Park, Youngsong Mun:
QoS Guaranteed Service Model in Mobile IPv6. Security and Management 2003: 502-507 - Sang-Hun Lee, Kyoung-Hwa Do, Kun-Won Jang, Moon-Seog Jun:
VDTS: The Design of Real-Time Virus Detection and Tracing Systems. Security and Management 2003: 508-513 - Bernhard Thurm:
Analysis of Web Service Performance for Network Management. Security and Management 2003: 514-520 - Mira Kwak, Dong-Sub Cho:
Extended Probabilistic Packet Marking Scheme for IP Traceback. Security and Management 2003: 521-526
Security Techniques, Models and Applications
- Gang Zhu, Jie Dai:
Economic Perspective of Information Security. Security and Management 2003: 527-533 - Shin-Kyung Lee, Tae-wan Kim, Dae-Ung Kim:
The Subscriber Management of CO-LAN Gateway System. Security and Management 2003: 534-538 - Darryl A. White, Ghasem S. Alijani:
Identifying Requirements for Network Security Software. Security and Management 2003: 539-543 - Remus Chua Choong Hee, Jianping Chen, Ben M. Chen:
The Development of Network Security Suite for Windows-Based Servers. Security and Management 2003: 544-550 - Miyoun Yoon, Kiyoung Kim, Yongtae Shin:
Robust Multimedia Authentication in Mobile Multicast Environment. Security and Management 2003: 551-557 - Chung-E Wang:
Simultaneous Data Compression and Encryption. Security and Management 2003: 558-563 - Sang-Hyun Bae, Hae Kyung Seong, Kang Hyeon Rhee:
Color Level Logo Image Watermarking on Multi Color Space. Security and Management 2003: 564-569 - Viktor Bunimov, Manfred Schimmler, Wolfgang Bziuk:
Key Generation for Secure High Speed Communication. Security and Management 2003: 570-576 - Dong-Hwan Shin, Jong-Weon Kim, Jong-Uk Choi:
Semi-Fragile Image Watermarking Based on Block Mean Difference. Security and Management 2003: 577-583 - Simon McNicol, Serdar Boztas:
Randomized Traitor Tracing Algorithms for Broadcast Security. Security and Management 2003: 584-590 - Young-Ho Suh, Won Gyum Kim, Jong-Weon Kim, Chi-Jung Hwang:
Image Fingerprinting with Multi-Bits Watermark. Security and Management 2003: 591-594 - Han Ho Lee, Jung-Soo Lee, Nam Yong Lee, Jong-Weon Kim:
The Fingerprinting Algorithm for Digital Image and Video. Security and Management 2003: 595-600 - Young-Shil Kim, Young-Mi Kim, Seong-Jin Park, Doo-Kwon Baik:
Design and Implementation of Stego WaveK Through Improved Lowbit Encoding Method. Security and Management 2003: 601-606 - Sangwoo Lee, Yun-kyung Lee, Youngsae Kim, Youngsoo Park, Sung-Ik Jun, Kyo-Il Chung:
Implementation of an Elliptic Curve Cryptography Hardware Accelerator for Smart Cards. Security and Management 2003: 607-610 - Soon Hwa Sung, Eunbae Kong:
Efficient Electronic Voting System with Secure Multiparty Fault-Detection Protocol. Security and Management 2003: 611-617 - F. Sang-Ju Song, S. Doo-Sung Lee, T. Sun-Hyung Kim:
Development of Digital Content Viewer with Tracing Capability by Use of the Watermarking Technique. Security and Management 2003: 618-625 - Jong-Weon Kim, Jung-Soo Lee, Jong-Uk Choi:
A New Multi-Layer Copyright Protection by Using Digital Watermarking. Security and Management 2003: 626-632
Late Papers and Post-Conference Papers
- Wei-Kuei Chen:
Efficient On-Line Electronic Checks. Security and Management 2003: 633-636 - Tom Coffey, Reiner Dojen, Tomas Flanagan:
On Different Approaches to Establish the Security of Cryptographic Protocols. Security and Management 2003: 637-643 - Guillermo A. Francia III, Aditya Kilaru, Le Phuong, Mehul B. Vashi:
A Performance Comparison of Encryption Algorithms. Security and Management 2003: 644-649 - Randy Justice, Sumitra Mukherjee:
Inferential Disclosure Limitation in Multivariate Categorical Databases. Security and Management 2003: 650-653 - Tom Cribb, Asha Rao:
An Information Security Management Model. Security and Management 2003: 654-657 - Scott F. Smith:
Similarity Searches in Computer Security. Security and Management 2003: 658-662 - Willy Susilo, Yi Mu:
On Fail-Stop Verifiable Secret Sharing Schemes. Security and Management 2003: 663-667 - Willy Susilo, Jianyong Huang, Jennifer Seberry:
On Using Fast Exponentiation Algorithm in PDAs (or: How Secure is the Discrete Logarithm Problem Assumption in PDAs?). Security and Management 2003: 668-674 - Prashant Dewan, Partha Dasgupta, Vijay Karamcheti:
Defending Against Denial of Service Attacks Using Secure Name Resolution. Security and Management 2003: 675-681
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.