default search action
SEC 2006: Karlstad, Sweden
- Simone Fischer-Hübner, Kai Rannenberg, Louise Yngström, Stefan Lindskog:
Security and Privacy in Dynamic Environments, Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden. IFIP 201, Springer 2006, ISBN 0-387-33405-X
Privacy and Privacy-Enhancing Technologies I
- Inger Anne Tøndel:
Improving Availability of Emergency Health Information without Sacrificing Patient Privacy. 1-12 - George Yee, Larry Korba, Ronggong Song:
Ensuring Privacy for Buyer-Seller E-Commerce. 13-24 - Jan Camenisch, Dieter Sommer, Roger Zimmermann:
A General Certification Framework with Applications to Privacy-Enhancing Certificate Infrastructures. 25-37
Security in Mobile and Ad Hoc Networks
- Zinaida Benenson, Felix C. Freiling, Ernest Hammerschmidt, Stefan Lucks, Lexi Pimenidis:
Authenticated Query Flooding in Sensor Networks. 38-49 - Pietro Michiardi, Refik Molva:
Identity Based Message Authentication for Dynamic Networks. 50-61 - Hassnaa Moustafa, Gilles Bourdon, Yvon Gourhant:
Providing Authentication and Access Control in Vehicular Network Environment. 62-73
Trust and Security Management
- Marijke Coetzee, Jan H. P. Eloff:
A Framework for Web Services Trust. 74-86 - Stephen Flowerday, Rossouw von Solms:
Trust: An Element of Information Security. 87-98 - Bill Tsoumas, Panagiotis Papagiannakopoulos, Stelios Dritsas, Dimitris Gritzalis:
Security-by-Ontology: A Knowledge-Centric Approach. 99-110
Privacy Enhancing Technologies I1
- Vincent Naessens, Bart De Decker:
A Methodology for Designing Controlled Anonymous Applications. 111-122 - Sandra Steinbrecher:
Design Options for Privacy-Respecting Reputation Systems within Centralised Internet Communities. 123-134 - Jan Camenisch:
Protecting (Anonymous) Credentials with the Trusted Computing Group's TPM V1.2. 135-147
Attacks, Vulnerability Analysis, and Tools
- Dinei A. F. Florêncio, Cormac Herley:
Analysis and Improvement of Anti-Phishing Schemes. 148-157 - Kameswari Kotapati, Peng Liu, Thomas F. La Porta:
CAT - A Practical Graph & SDL Based Toolkit for Vulnerability Assessment of 3G Networks. 158-170 - Nils Gruschka, Norbert Luttenberger:
Protecting Web Services from DoS Attacks by SOAP Message Validation. 171-182
Access Control and Authentication I
- Thierry Sans, Frédéric Cuppens, Nora Cuppens-Boulahia:
A Flexible and Distributed Architecture to Enforce Dynamic Access Control. 183-195 - Andreas K. Mattas, Ioannis Mavridis, Iason Pagkalos:
A Paradigm for Dynamic and Decentralized Administration of Access Control in Workflow Applications. 196-207 - Claudio Agostino Ardagna, Ernesto Damiani, Sabrina De Capitani di Vimercati, Fulvio Frati, Pierangela Samarati:
CAS++: An Open Source Single Sign-On Solution for Secure e-Services. 208-220
Security Protocols
- Jianying Zhou, Jose Antonio Onieva, Javier López:
A Synchronous Multi-Party Contract Signing Protocol Improving Lower Bound of Steps. 221-232 - Michael Backes, Birgit Pfitzmann:
On the Cryptographic Key Secrecy of the Strengthened Yahalom Protocol. 233-245 - Kun Peng, Colin Boyd, Ed Dawson:
Sealed-Bid Micro Auctions. 246-257
Intrusion Detection
- Yacine Bouzida, Frédéric Cuppens:
Detecting Known and Novel Network Intrusions. 258-270 - Oleksiy Mazhelis, Seppo Puuronen, Mika Raento:
Evaluating Classifiers for Mobile-Masquerader Detection. 271-283 - Xiaoxin Yin, William Yurcik, Adam J. Slagell:
VisFlowCluster-IP: Connectivity-Based Visual Clustering of Network Hosts. 284-295
Usability and Awareness
- Almut Herzog, Nahid Shahmehri:
A Usability Study of Security Policy Management. 296-306 - Steven Furnell, Adila Jusoh, Dimitris Katsabas, Paul Dowland:
Considering the Usability of End-User Security Software. 307-316 - Thuy D. Nguyen, Cynthia E. Irvine:
Utilizing the Common Criteria for Advanced Student Research Projects. 317-328
Privacy Enhancing Technologies III
- Rafael Accorsi:
On the Relationship of Privacy and Secure Remote Logging in Dynamic Systems. 329-339 - Huafei Zhu, Tieyan Li, Feng Bao:
Privacy-Preserving Shared-Additive-Inverse Protocols and Their Applications. 340-350
Access Control and Authentication II
- Darko Kirovski, Nebojsa Jojic, Paul Roberts:
Click Passwords. 351-363 - Milan Petkovic, Claudine Conrado, Malik Hammoutène:
Cryptographically Enforced Personalized Role-Based Access Control. 364-376
Access Control and Authentication III
- Yuri Demchenko, Leon Gommans, Cees de Laat:
Using VO Concept for Managing Dynamic Security Associations. 377-388 - Martin Gilje Jaatun, Inger Anne Tøndel, Frédéric Paint, Tor Hjalmar Johannessen, John Charles Francis, Claire Duranton:
Secure Fast Handover in an Open Broadband Access Network using Kerberos-style Tickets. 389-400
Forensics
- Chia Yuan Cho, Sin Yeung Lee, Chung Pheng Tan, Yong Tai Tan:
Network Forensics on Packet Fingerprints. 401-412 - Martin Karresand, Nahid Shahmehri:
Oscar - File Type Identification of Binary Data in Disk Clusters and RAM Pages. 413-424
IFIP WG 11.1/11.8 Security Culture Workshop
- Anthonie B. Ruighaver, Sean B. Maynard:
Organizational Security Culture: More Than Just an End-User Phenomenon. 425-430 - Benjamin D. Cone, Michael F. Thompson, Cynthia E. Irvine, Thuy D. Nguyen:
Cyber Security Training and Awareness Through Game Play. 431-436 - Omar Zakaria:
Internalisation of Information Security Culture amongst Employees through Basic Security Knowledge. 437-441 - Jabiri Kuwe Bakari, Charles N. Tarimo, Christer Magnusson, Louise Yngström:
Bridging the Gap between General Management and Technicians - A Case Study in ICT Security. 442-447 - Lynette Drevin, Hennie A. Kruger, Tjaart Steyn:
Value-Focused Assessment of Information Communication and Technology Security Awareness in an Academic Environment. 448-453 - Ronald C. Dodge, Aaron J. Ferguson:
Using Phishing for User Email Security Awareness. 454-459
IFIP WG 11.4 I-NetSec'06 Workshop
- Jan Camenisch:
Anonymous Credentials: Opportunities and Challenges. 460 - Florian Kerschbaum:
Practical Private Regular Expression Matching. 461-470 - Siani Pearson, Marco Casassa Mont:
A System for Privacy-Aware Resource Allocation and Data Processing in Dynamic Environments. 471-482 - Gergely Tóth, Zoltán Hornák:
The APROB Channel: Adaptive Semi-Real-Time Anonymous Communication. 483-492
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.