About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
IAS 2007
IWCF 2007DHIM 2007
Other Years
IAS 2007
Ethics and Malpractice Statement

    IAS

    3rd International ICST Symposium on Information Assurance and Security

    The International Symposium on Information Assurance and Security aims to bring together researchers, practitioners, developers, and policy makers involved in multiple disciplines of information security and assurance to exchange ideas and to learn the latest development in this important field. Th…

    The International Symposium on Information Assurance and Security aims to bring together researchers, practitioners, developers, and policy makers involved in multiple disciplines of information security and assurance to exchange ideas and to learn the latest development in this important field. The third conference will bring together the world's most respected authorities on Information assurance and security in networked and distributed information sharing environment.

    more »
    Editor(s): Ning Zhang (University of Manchester, UK) and Ajith Abraham (Norwegian University of Science and Technology, Norwa)
    Publisher
    IEEE
    ISBN
    978-0-7695-2876-2
    Conference dates
    29th–31st Aug 2007
    Location
    Manchester, UK
    Appeared in EUDL
    2011-11-29

    Copyright © 2011–2025 IEEE

    Ordered by title or year
    Showing 51–60 of 61 results
    Page size: 102550
    • First
    • Previous
    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • Next
    • Last
    • Resource Classification Based Negotiation in Web Services

      Research Article in 3rd International ICST Symposium on Information Assurance and Security

      Diala Abi Haidar, Nora Cuppens, Frederic Cuppens, Herve Debar
    • Risk management in coalition networks

      Research Article in 3rd International ICST Symposium on Information Assurance and Security

      Wim Mees
    • SARBAC07: A Scoped Administration Model for RBAC with Hybrid Hierarchy

      Research Article in 3rd International ICST Symposium on Information Assurance and Security

      Yue Zhang, James B.D. Joshi
    • Second-LSB-Dependent Robust Watermarking for Relational Database

      Research Article in 3rd International ICST Symposium on Information Assurance and Security

      Xiangrong Xiao, Xingming Sun, Minggang Chen
    • Secure E-Commerce Protocol for Purchase of e-Goods - Using Smart Card

      Research Article in 3rd International ICST Symposium on Information Assurance and Security

      Satish Devane, Madhumita Chatterjee, Deepak Phatak
    • Secure M-commerce Transactions: A Third Party Based Signature Protocol

      Research Article in 3rd International ICST Symposium on Information Assurance and Security

      Lisha He, Ning Zhang, Lirong He, Ian Rogers
    • Separation of Duty in Role-Based Access Control Model through Fuzzy Relations

      Research Article in 3rd International ICST Symposium on Information Assurance and Security

      Hassan Takabi, Morteza Amini, Rasool Jalili
    • Team Edit Automata for Testing Security Property

      Research Article in 3rd International ICST Symposium on Information Assurance and Security

      Zhenrong Yang, Aiman Hanna, Mourad Debbabi
    • Threshold SKI Protocol for ID-based Cryptosystems

      Research Article in 3rd International ICST Symposium on Information Assurance and Security

      Ashutosh Saxena
    • Towards an Autonomic Security System for Mobile Ad Hoc Networks

      Research Article in 3rd International ICST Symposium on Information Assurance and Security

      Mohamad Aljnidi, Jean Leneutre
    • First
    • Previous
    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • Next
    • Last
    EBSCOProQuestDBLPDOAJPortico
    EAI Logo

    About EAI

    • Who We Are
    • Leadership
    • Research Areas
    • Partners
    • Media Center

    Community

    • Membership
    • Conference
    • Recognition
    • Sponsor Us

    Publish with EAI

    • Publishing
    • Journals
    • Proceedings
    • Books
    • EUDL