Message from EAI President regarding COVID-19
Register | Login

EUDL

European Union Digital Library
Proceedings Series Journals Search EAI
IAS 2007
IWCF 2007DHIM 2007
Other Years
IAS 2007
Ethics and Malpractice Statement

    IAS

    3rd International ICST Symposium on Information Assurance and Security

    The International Symposium on Information Assurance and Security aims to bring together researchers, practitioners, developers, and policy makers involved in multiple disciplines of information security and assurance to exchange ideas and to learn the latest development in this important field. Th…

    The International Symposium on Information Assurance and Security aims to bring together researchers, practitioners, developers, and policy makers involved in multiple disciplines of information security and assurance to exchange ideas and to learn the latest development in this important field. The third conference will bring together the world's most respected authorities on Information assurance and security in networked and distributed information sharing environment.

    more »
    Editor(s): Ning Zhang (University of Manchester, UK) and Ajith Abraham (Norwegian University of Science and Technology, Norwa)
    Publisher
    IEEE
    ISBN
    978-0-7695-2876-2
    Conference dates
    29th–31st Aug 2007
    Location
    Manchester, UK
    Appeared in EUDL
    2011-11-29

    Copyright © 2011–2023 IEEE

    Ordered by title or year
    Showing 41–50 of 61 results
    Page size: 102550
    • First
    • Previous
    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • Next
    • Last
    • Managing Behaviour Trust in Grids Using Statistical Methods of Quality Assurance

      Research Article in 3rd International ICST Symposium on Information Assurance and Security

      Elvis Papalilo, Bernd Freisleben
    • Modeling Security Protocols as Games

      Research Article in 3rd International ICST Symposium on Information Assurance and Security

      Mohamed Saleh, Mourad Debbabi
    • Modelling Quality of Protection in Outsourced Business Processes

      Research Article in 3rd International ICST Symposium on Information Assurance and Security

      Fabio Massacci, Artsiom Yautsiukhin
    • Non-Stationary Markov Models and Anomaly Propagation Analysis in IDS

      Research Article in 3rd International ICST Symposium on Information Assurance and Security

      Arnur G. Tokhtabayev , Victor A. Skormin
    • On Detecting Packets Droppers in MANET: A Novel Low Cost Approach

      Research Article in 3rd International ICST Symposium on Information Assurance and Security

      Tarag Fahad, Djamel Djenouri, Robert Askwith
    • On the Definition and Policies of Confidentiality

      Research Article in 3rd International ICST Symposium on Information Assurance and Security

      Johs Hansen Hammer, Gerardo Schneider
    • Operational risk: acceptability criteria

      Research Article in 3rd International ICST Symposium on Information Assurance and Security

      Daniel Gideon Dresner, J. Robert (Bob) G. Wood
    • Organized Anonymous Agents

      Research Article in 3rd International ICST Symposium on Information Assurance and Security

      Martijn Warnier, Frances Brazier
    • Program Fragmentation as a Metamorphic Software Protection

      Research Article in 3rd International ICST Symposium on Information Assurance and Security

      Bobby D. Birrer, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Robert W. Bennington
    • Protecting IP Multimedia Subsystem (IMS) Service Delivery Platform from Time Independent Attacks

      Research Article in 3rd International ICST Symposium on Information Assurance and Security

      Muhammad Sher, Thomas Magedanz
    • First
    • Previous
    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • Next
    • Last
    About | Contact Us
    EBSCOProQuestDBLPDOAJPortico