Register | Login

EUDL

European Union Digital Library
Proceedings Series Journals Search EAI
IAS 2007
IWCF 2007DHIM 2007
Other Years
IAS 2007

    IAS

    3rd International ICST Symposium on Information Assurance and Security

    The International Symposium on Information Assurance and Security aims to bring together researchers, practitioners, developers, and policy makers involved in multiple disciplines of information security and assurance to exchange ideas and to learn the latest development in this important field. Th…

    The International Symposium on Information Assurance and Security aims to bring together researchers, practitioners, developers, and policy makers involved in multiple disciplines of information security and assurance to exchange ideas and to learn the latest development in this important field. The third conference will bring together the world's most respected authorities on Information assurance and security in networked and distributed information sharing environment.

    more »
    Editor(s): Ning Zhang and Ajith Abraham
    Publisher
    IEEE
    ISBN
    978-0-7695-2876-2
    Conference dates
    29th–31st Aug 2007
    Location
    Manchester, UK
    Appeared in EUDL
    29th Nov 2011

    Copyright © 2011–2019 IEEE

    Ordered by title or year
    Showing 1–25 of 61 results
    Page size: 102550
    • 1
    • 2
    • 3
    • Next
    • Last
    • Accurate Application-Specific Sandboxing for Win32/Intel Binaries

      Research Article in 3rd International ICST Symposium on Information Assurance and Security

      Wei Li, Lap-chung Lam, Tzi-cker Chiueh
    • Addressing privacy issues in CardSpace

      Research Article in 3rd International ICST Symposium on Information Assurance and Security

      Waleed A. Alrodha, Chris J. Mitchell
    • Analysing the Security Threats against Network Convergence Architectures

      Research Article in 3rd International ICST Symposium on Information Assurance and Security

      Patroklos Argyroudis, Robert McAdoo, Stephen Toner, Linda Doyle, Donal O’Mahony
    • An Architecture for Privacy Preserving Collaborative Filtering on Web Portals

      Research Article in 3rd International ICST Symposium on Information Assurance and Security

      Waseem Ahmad, Ashfaq Khokhar
    • An Authentication Scheme Using Non-Commutative Semigroups

      Research Article in 3rd International ICST Symposium on Information Assurance and Security

      M. M. Chowdhury
    • An Effective and Secure Buyer-Seller Watermarking Protocol

      Research Article in 3rd International ICST Symposium on Information Assurance and Security

      Ibrahim M. Ibrahim, Sherif Hazem Nour El-Din, Abdel Fatah A. Hegazy
    • An LSB Data Hiding Technique Using Prime Numbers

      Research Article in 3rd International ICST Symposium on Information Assurance and Security

      Sandipan Dey , Ajith Abraham, Sugata Sanyal
    • A Performance Comparison of Wireless Ad Hoc Network Routing Protocols under Security Attack

      Research Article in 3rd International ICST Symposium on Information Assurance and Security

      Su Mon Bo, Hannan Xiao, Aderemi Adereti, James A. Malcolm, Bruce Christianson
    • Applying Secure Data Aggregation techniques for a Structure and Density Independent Group Based Key Management Protocol

      Research Article in 3rd International ICST Symposium on Information Assurance and Security

      Kashif Kifayat, Madjid Merabti, Qi Shi, David Llewellyn-Jones
    • A Purpose-Based Access Control Model

      Research Article in 3rd International ICST Symposium on Information Assurance and Security

      Naikuo Yang, Howard Barringer, Ning Zhang
    • A Secure Authenticated Key Agreement Protocol Based on Elliptic Curve Cryptography

      Research Article in 3rd International ICST Symposium on Information Assurance and Security

      Pierre E. ABI-CHAR, Abdallah MHAMED, Bachar EL-HASSAN
    • A Secure Authenticated Key Agreement Protocol For Wireless Security

      Research Article in 3rd International ICST Symposium on Information Assurance and Security

      Pierre E. ABI-CHAR, Abdallah MHAMED, Bachar EL-HASSAN
    • A Secure Storage Service for the gLite Middleware

      Research Article in 3rd International ICST Symposium on Information Assurance and Security

      Diego Scardaci, Giordano Scuderi
    • A Security Model for Detecting Suspicious Patterns in Physical Environment

      Research Article in 3rd International ICST Symposium on Information Assurance and Security

      Simon Fong, Zhuang Yan
    • A Theoretical Security Model for Access Control and Security Assurance

      Research Article in 3rd International ICST Symposium on Information Assurance and Security

      Bo-Chao Cheng, Huan Chen, Ryh-Yuh Tseng
    • Automatic Patch Generation for Buffer Overflow Attacks

      Research Article in 3rd International ICST Symposium on Information Assurance and Security

      Alexey Smirnov, Tzi-cker Chiueh
    • Binding Update Authentication Scheme for Mobile IPv6

      Research Article in 3rd International ICST Symposium on Information Assurance and Security

      Irfan Ahmed, Usman Tariq, Shoaib Mukhtar, Kyung-suk Lhee, S. W. Yoo, Piao Yanji, ManPyo Hong
    • Building Trustworthy Intrusion Detection through VM Introspection

      Research Article in 3rd International ICST Symposium on Information Assurance and Security

      Fabrizio Baiardi, Daniele Sgandurra
    • CCARCH: Architecting Common Criteria Security Requirements

      Research Article in 3rd International ICST Symposium on Information Assurance and Security

      Jose Romero-Mariona, Hadar Ziv, Debra J. Richardson
    • Certified Email Delivery with Offline TTP

      Research Article in 3rd International ICST Symposium on Information Assurance and Security

      Hao Wang, Yuyi Ou, Jie Ling, Lu Liang, Xiang Xu
    • Comparing the Trust and Security Models of Mobile Agents

      Research Article in 3rd International ICST Symposium on Information Assurance and Security

      Michail Fragkakis , Nikolaos Alexandris
    • Cyber Threat Trend Analysis Model Using HMM

      Research Article in 3rd International ICST Symposium on Information Assurance and Security

      Do Hoon Kim, Taek Lee, Sung-Oh David Jung, Hoh Peter In, Hee Jo Lee
    • Detection and Honeypot Based Redirection to Counter DDoS Attacks in ISP Domain

      Research Article in 3rd International ICST Symposium on Information Assurance and Security

      Anjali Sardana, Krishan Kumar, R. C. Joshi
    • Detection of Web Defacements by means of Genetic Programming

      Research Article in 3rd International ICST Symposium on Information Assurance and Security

      Eric Medvet, Cyril Fillon, Alberto Bartoli
    • DIPS: A Framework for Distributed Intrusion Prediction and Prevention Using Hidden Markov Models and Online Fuzzy Risk Assessment

      Research Article in 3rd International ICST Symposium on Information Assurance and Security

      Kjetil Haslum, Ajith Abraham, Svein Knapskog
    • 1
    • 2
    • 3
    • Next
    • Last
    IST
    About | Contact Us