About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
IAS 2007
IWCF 2007DHIM 2007
Other Years
IAS 2007
Ethics and Malpractice Statement

    IAS

    3rd International ICST Symposium on Information Assurance and Security

    The International Symposium on Information Assurance and Security aims to bring together researchers, practitioners, developers, and policy makers involved in multiple disciplines of information security and assurance to exchange ideas and to learn the latest development in this important field. Th…

    The International Symposium on Information Assurance and Security aims to bring together researchers, practitioners, developers, and policy makers involved in multiple disciplines of information security and assurance to exchange ideas and to learn the latest development in this important field. The third conference will bring together the world's most respected authorities on Information assurance and security in networked and distributed information sharing environment.

    more »
    Editor(s): Ning Zhang (University of Manchester, UK) and Ajith Abraham (Norwegian University of Science and Technology, Norwa)
    Publisher
    IEEE
    ISBN
    978-0-7695-2876-2
    Conference dates
    29th–31st Aug 2007
    Location
    Manchester, UK
    Appeared in EUDL
    2011-11-29

    Copyright © 2011–2025 IEEE

    Ordered by title or year
    Showing 1–10 of 61 results
    Page size: 102550
    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • Next
    • Last
    • A Performance Comparison of Wireless Ad Hoc Network Routing Protocols under Security Attack

      Research Article in 3rd International ICST Symposium on Information Assurance and Security

      Su Mon Bo, Hannan Xiao, Aderemi Adereti, James A. Malcolm, Bruce Christianson
    • A Purpose-Based Access Control Model

      Research Article in 3rd International ICST Symposium on Information Assurance and Security

      Naikuo Yang, Howard Barringer, Ning Zhang
    • A Secure Authenticated Key Agreement Protocol Based on Elliptic Curve Cryptography

      Research Article in 3rd International ICST Symposium on Information Assurance and Security

      Pierre E. ABI-CHAR, Abdallah MHAMED, Bachar EL-HASSAN
    • A Secure Authenticated Key Agreement Protocol For Wireless Security

      Research Article in 3rd International ICST Symposium on Information Assurance and Security

      Pierre E. ABI-CHAR, Abdallah MHAMED, Bachar EL-HASSAN
    • A Secure Storage Service for the gLite Middleware

      Research Article in 3rd International ICST Symposium on Information Assurance and Security

      Diego Scardaci, Giordano Scuderi
    • A Security Model for Detecting Suspicious Patterns in Physical Environment

      Research Article in 3rd International ICST Symposium on Information Assurance and Security

      Simon Fong, Zhuang Yan
    • A Theoretical Security Model for Access Control and Security Assurance

      Research Article in 3rd International ICST Symposium on Information Assurance and Security

      Bo-Chao Cheng, Huan Chen, Ryh-Yuh Tseng
    • Accurate Application-Specific Sandboxing for Win32/Intel Binaries

      Research Article in 3rd International ICST Symposium on Information Assurance and Security

      Wei Li, Lap-chung Lam, Tzi-cker Chiueh
    • Addressing privacy issues in CardSpace

      Research Article in 3rd International ICST Symposium on Information Assurance and Security

      Waleed A. Alrodha, Chris J. Mitchell
    • An Architecture for Privacy Preserving Collaborative Filtering on Web Portals

      Research Article in 3rd International ICST Symposium on Information Assurance and Security

      Waseem Ahmad, Ashfaq Khokhar
    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • Next
    • Last
    EBSCOProQuestDBLPDOAJPortico
    EAI Logo

    About EAI

    • Who We Are
    • Leadership
    • Research Areas
    • Partners
    • Media Center

    Community

    • Membership
    • Conference
    • Recognition
    • Sponsor Us

    Publish with EAI

    • Publishing
    • Journals
    • Proceedings
    • Books
    • EUDL