Personal tools
You are here: Home dblp db conf sec sec2006.html

sec2006.html

Click here to view the file or click here to download the file

Size 24.8 kB - File type text/html

File contents

<html><head><title>Conference on Information Security 2006</title><link href="../../../dblp.css" rel="stylesheet" type="text/css" /></head> <body> <table width="100%"><tr><td align="left"><a href="../../index.html"><img alt="dblp.uni-trier.de" src="../../Logo.gif" border=0 height=60 width=170></a></td>
<td align="right"><a href="http://www.uni-trier.de"><img alt="www.uni-trier.de" src="../../logo_universitaet-trier.gif" border=0 height=48 width=215></a></td></tr></table>
 
<h1><a href="index.html">SEC</a> 2006:
Karlstad,
Sweden</h1> <a name="2006" href="../../indices/a-tree/f/Fischer=H=uuml=bner:Simone.html">Simone Fischer-H&uuml;bner</a>, <a href="../../indices/a-tree/r/Rannenberg:Kai.html">Kai Rannenberg</a>, <a href="../../indices/a-tree/y/Yngstr=ouml=m:Louise.html">Louise Yngstr&ouml;m</a>, <a href="../../indices/a-tree/l/Lindskog:Stefan.html">Stefan Lindskog</a> (Eds.):
Security and Privacy in Dynamic Environments, Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden.
IFIP 201 Springer 2006, ISBN 0-387-33405-X <font size="-3"><a href="http://dblp.uni-trier.de/rec/bibtex/conf/sec/2006">BibTeX</a></font>
 
<h2>Privacy and Privacy-Enhancing Technologies I</h2> 
<ul>
<li><a name="Tondel06" href="../../indices/a-tree/t/T=oslash=ndel:Inger_Anne.html">Inger Anne T&oslash;ndel</a>:
<br><b>Improving Availability of Emergency Health Information without Sacrificing Patient Privacy.
</b>1-12<br><a href="http://dx.doi.org/10.1007/0-387-33406-8_1"><i>Electronic Edition</i></a> (link) <font size="-3"><a href="http://dblp.uni-trier.de/rec/bibtex/conf/sec/Tondel06">BibTeX</a></font>

<li><a name="YeeKS06" href="../../indices/a-tree/y/Yee:George.html">George Yee</a>, <a href="../../indices/a-tree/k/Korba:Larry.html">Larry Korba</a>, <a href="../../indices/a-tree/s/Song:Ronggong.html">Ronggong Song</a>:
<br><b>Ensuring Privacy for Buyer-Seller E-Commerce.
</b>13-24<br><a href="http://dx.doi.org/10.1007/0-387-33406-8_2"><i>Electronic Edition</i></a> (link) <font size="-3"><a href="http://dblp.uni-trier.de/rec/bibtex/conf/sec/YeeKS06">BibTeX</a></font>

<li><a name="CamenischSZ06" href="../../indices/a-tree/c/Camenisch:Jan.html">Jan Camenisch</a>, <a href="../../indices/a-tree/s/Sommer:Dieter.html">Dieter Sommer</a>, <a href="../../indices/a-tree/z/Zimmermann:Roger.html">Roger Zimmermann</a>:
<br><b>A General Certification Framework with Applications to Privacy-Enhancing Certificate Infrastructures.
</b>25-37<br><a href="http://dx.doi.org/10.1007/0-387-33406-8_3"><i>Electronic Edition</i></a> (link) <font size="-3"><a href="http://dblp.uni-trier.de/rec/bibtex/conf/sec/CamenischSZ06">BibTeX</a></font>

</ul>
<h2>Security in Mobile and Ad Hoc Networks</h2> 
<ul>
<li><a name="BenensonFHLP06" href="../../indices/a-tree/b/Benenson:Zinaida.html">Zinaida Benenson</a>, <a href="../../indices/a-tree/f/Freiling:Felix_C=.html">Felix C. Freiling</a>, <a href="../../indices/a-tree/h/Hammerschmidt:Ernest.html">Ernest Hammerschmidt</a>, <a href="../../indices/a-tree/l/Lucks:Stefan.html">Stefan Lucks</a>, <a href="../../indices/a-tree/p/Pimenidis:Lexi.html">Lexi Pimenidis</a>:
<br><b>Authenticated Query Flooding in Sensor Networks.
</b>38-49<br><a href="http://dx.doi.org/10.1007/0-387-33406-8_4"><i>Electronic Edition</i></a> (link) <font size="-3"><a href="http://dblp.uni-trier.de/rec/bibtex/conf/sec/BenensonFHLP06">BibTeX</a></font>

<li><a name="MichiardiM06" href="../../indices/a-tree/m/Michiardi:Pietro.html">Pietro Michiardi</a>, <a href="../../indices/a-tree/m/Molva:Refik.html">Refik Molva</a>:
<br><b>Identity Based Message Authentication for Dynamic Networks.
</b>50-61<br><a href="http://dx.doi.org/10.1007/0-387-33406-8_5"><i>Electronic Edition</i></a> (link) <font size="-3"><a href="http://dblp.uni-trier.de/rec/bibtex/conf/sec/MichiardiM06">BibTeX</a></font>

<li><a name="MoustafaBG06" href="../../indices/a-tree/m/Moustafa:Hasnaa.html">Hasnaa Moustafa</a>, <a href="../../indices/a-tree/b/Bourdon:Gilles.html">Gilles Bourdon</a>, <a href="../../indices/a-tree/g/Gourhant:Yvon.html">Yvon Gourhant</a>:
<br><b>Providing Authentication and Access Control in Vehicular Network Environment.
</b>62-73<br><a href="http://dx.doi.org/10.1007/0-387-33406-8_6"><i>Electronic Edition</i></a> (link) <font size="-3"><a href="http://dblp.uni-trier.de/rec/bibtex/conf/sec/MoustafaBG06">BibTeX</a></font>

</ul>
<h2>Trust and Security Management</h2> 
<ul>
<li><a name="CoetzeeE06" href="../../indices/a-tree/c/Coetzee:Marijke.html">Marijke Coetzee</a>, <a href="../../indices/a-tree/e/Eloff:Jan_H=_P=.html">Jan H. P. Eloff</a>:
<br><b>A Framework for Web Services Trust.
</b>74-86<br><a href="http://dx.doi.org/10.1007/0-387-33406-8_7"><i>Electronic Edition</i></a> (link) <font size="-3"><a href="http://dblp.uni-trier.de/rec/bibtex/conf/sec/CoetzeeE06">BibTeX</a></font>

<li><a name="FlowerdayS06" href="../../indices/a-tree/f/Flowerday:Stephen.html">Stephen Flowerday</a>, <a href="../../indices/a-tree/s/Solms:Rossouw_von.html">Rossouw von Solms</a>:
<br><b>Trust: An Element of Information Security.
</b>87-98<br><a href="http://dx.doi.org/10.1007/0-387-33406-8_8"><i>Electronic Edition</i></a> (link) <font size="-3"><a href="http://dblp.uni-trier.de/rec/bibtex/conf/sec/FlowerdayS06">BibTeX</a></font>

<li><a name="TsoumasPDG06" href="../../indices/a-tree/t/Tsoumas:Bill.html">Bill Tsoumas</a>, <a href="../../indices/a-tree/p/Papagiannakopoulos:Panagiotis.html">Panagiotis Papagiannakopoulos</a>, <a href="../../indices/a-tree/d/Dritsas:Stelios.html">Stelios Dritsas</a>, <a href="../../indices/a-tree/g/Gritzalis:Dimitris.html">Dimitris Gritzalis</a>:
<br><b>Security-by-Ontology: A Knowledge-Centric Approach.
</b>99-110<br><a href="http://dx.doi.org/10.1007/0-387-33406-8_9"><i>Electronic Edition</i></a> (link) <font size="-3"><a href="http://dblp.uni-trier.de/rec/bibtex/conf/sec/TsoumasPDG06">BibTeX</a></font>

</ul>
<h2>Privacy Enhancing Technologies I1</h2> 
<ul>
<li><a name="NaessensD06" href="../../indices/a-tree/n/Naessens:Vincent.html">Vincent Naessens</a>, <a href="../../indices/a-tree/d/Decker:Bart_De.html">Bart De Decker</a>:
<br><b>A Methodology for Designing Controlled Anonymous Applications.
</b>111-122<br><a href="http://dx.doi.org/10.1007/0-387-33406-8_10"><i>Electronic Edition</i></a> (link) <font size="-3"><a href="http://dblp.uni-trier.de/rec/bibtex/conf/sec/NaessensD06">BibTeX</a></font>

<li><a name="Steinbrecher06" href="../../indices/a-tree/s/Steinbrecher:Sandra.html">Sandra Steinbrecher</a>:
<br><b>Design Options for Privacy-Respecting Reputation Systems within Centralised Internet Communities.
</b>123-134<br><a href="http://dx.doi.org/10.1007/0-387-33406-8_11"><i>Electronic Edition</i></a> (link) <font size="-3"><a href="http://dblp.uni-trier.de/rec/bibtex/conf/sec/Steinbrecher06">BibTeX</a></font>

<li><a name="Camenisch06" href="../../indices/a-tree/c/Camenisch:Jan.html">Jan Camenisch</a>:
<br><b>Protecting (Anonymous) Credentials with the Trusted Computing Group's TPM V1.2.
</b>135-147<br><a href="http://dx.doi.org/10.1007/0-387-33406-8_12"><i>Electronic Edition</i></a> (link) <font size="-3"><a href="http://dblp.uni-trier.de/rec/bibtex/conf/sec/Camenisch06">BibTeX</a></font>

</ul>
<h2>Attacks,
Vulnerability Analysis,
and Tools</h2> 
<ul>
<li><a name="FlorencioH06" href="../../indices/a-tree/f/Flor=ecirc=ncio:Dinei_A=_F=.html">Dinei A. F. Flor&ecirc;ncio</a>, <a href="../../indices/a-tree/h/Herley:Cormac.html">Cormac Herley</a>:
<br><b>Analysis and Improvement of Anti-Phishing Schemes.
</b>148-157<br><a href="http://dx.doi.org/10.1007/0-387-33406-8_13"><i>Electronic Edition</i></a> (link) <font size="-3"><a href="http://dblp.uni-trier.de/rec/bibtex/conf/sec/FlorencioH06">BibTeX</a></font>

<li><a name="KotapatiLL06" href="../../indices/a-tree/k/Kotapati:Kameswari.html">Kameswari Kotapati</a>, <a href="../../indices/a-tree/l/Liu:Peng.html">Peng Liu</a>, <a href="../../indices/a-tree/p/Porta:Thomas_F=_La.html">Thomas F. La Porta</a>:
<br><b>CAT - A Practical Graph &amp; SDL Based Toolkit for Vulnerability Assessment of 3G Networks.
</b>158-170<br><a href="http://dx.doi.org/10.1007/0-387-33406-8_14"><i>Electronic Edition</i></a> (link) <font size="-3"><a href="http://dblp.uni-trier.de/rec/bibtex/conf/sec/KotapatiLL06">BibTeX</a></font>

<li><a name="GruschkaL06" href="../../indices/a-tree/g/Gruschka:Nils.html">Nils Gruschka</a>, <a href="../../indices/a-tree/l/Luttenberger:Norbert.html">Norbert Luttenberger</a>:
<br><b>Protecting Web Services from DoS Attacks by SOAP Message Validation.
</b>171-182<br><a href="http://dx.doi.org/10.1007/0-387-33406-8_15"><i>Electronic Edition</i></a> (link) <font size="-3"><a href="http://dblp.uni-trier.de/rec/bibtex/conf/sec/GruschkaL06">BibTeX</a></font>

</ul>
<h2>Access Control and Authentication I</h2> 
<ul>
<li><a name="SansCC06" href="../../indices/a-tree/s/Sans:Thierry.html">Thierry Sans</a>, <a href="../../indices/a-tree/c/Cuppens:Fr=eacute=d=eacute=ric.html">Fr&eacute;d&eacute;ric Cuppens</a>, <a href="../../indices/a-tree/c/Cuppens=Boulahia:Nora.html">Nora Cuppens-Boulahia</a>:
<br><b>A Flexible and Distributed Architecture to Enforce Dynamic Access Control.
</b>183-195<br><a href="http://dx.doi.org/10.1007/0-387-33406-8_16"><i>Electronic Edition</i></a> (link) <font size="-3"><a href="http://dblp.uni-trier.de/rec/bibtex/conf/sec/SansCC06">BibTeX</a></font>

<li><a name="MattasMP06" href="../../indices/a-tree/m/Mattas:Andreas_K=.html">Andreas K. Mattas</a>, <a href="../../indices/a-tree/m/Mavridis:Ioannis.html">Ioannis Mavridis</a>, <a href="../../indices/a-tree/p/Pagkalos:Iason.html">Iason Pagkalos</a>:
<br><b>A Paradigm for Dynamic and Decentralized Administration of Access Control in Workflow Applications.
</b>196-207<br><a href="http://dx.doi.org/10.1007/0-387-33406-8_17"><i>Electronic Edition</i></a> (link) <font size="-3"><a href="http://dblp.uni-trier.de/rec/bibtex/conf/sec/MattasMP06">BibTeX</a></font>

<li><a name="ArdagnaDVFS06" href="../../indices/a-tree/a/Ardagna:Claudio_Agostino.html">Claudio Agostino Ardagna</a>, <a href="../../indices/a-tree/d/Damiani:Ernesto.html">Ernesto Damiani</a>, <a href="../../indices/a-tree/v/Vimercati:Sabrina_De_Capitani_di.html">Sabrina De Capitani di Vimercati</a>, <a href="../../indices/a-tree/f/Frati:Fulvio.html">Fulvio Frati</a>, <a href="../../indices/a-tree/s/Samarati:Pierangela.html">Pierangela Samarati</a>:
<br><b>CAS++: An Open Source Single Sign-On Solution for Secure e-Services.
</b>208-220<br><a href="http://dx.doi.org/10.1007/0-387-33406-8_18"><i>Electronic Edition</i></a> (link) <font size="-3"><a href="http://dblp.uni-trier.de/rec/bibtex/conf/sec/ArdagnaDVFS06">BibTeX</a></font>

</ul>
<h2>Security Protocols</h2> 
<ul>
<li><a name="ZhouOL06" href="../../indices/a-tree/z/Zhou:Jianying.html">Jianying Zhou</a>, <a href="../../indices/a-tree/o/Onieva:Jose_Antonio.html">Jose Antonio Onieva</a>, <a href="../../indices/a-tree/l/Lopez:Javier.html">Javier Lopez</a>:
<br><b>A Synchronous Multi-Party Contract Signing Protocol Improving Lower Bound of Steps.
</b>221-232<br><a href="http://dx.doi.org/10.1007/0-387-33406-8_19"><i>Electronic Edition</i></a> (link) <font size="-3"><a href="http://dblp.uni-trier.de/rec/bibtex/conf/sec/ZhouOL06">BibTeX</a></font>

<li><a name="BackesP06" href="../../indices/a-tree/b/Backes:Michael.html">Michael Backes</a>, <a href="../../indices/a-tree/p/Pfitzmann:Birgit.html">Birgit Pfitzmann</a>:
<br><b>On the Cryptographic Key Secrecy of the Strengthened Yahalom Protocol.
</b>233-245<br><a href="http://dx.doi.org/10.1007/0-387-33406-8_20"><i>Electronic Edition</i></a> (link) <font size="-3"><a href="http://dblp.uni-trier.de/rec/bibtex/conf/sec/BackesP06">BibTeX</a></font>

<li><a name="PengBD06" href="../../indices/a-tree/p/Peng:Kun.html">Kun Peng</a>, <a href="../../indices/a-tree/b/Boyd:Colin.html">Colin Boyd</a>, <a href="../../indices/a-tree/d/Dawson:Ed.html">Ed Dawson</a>:
<br><b>Sealed-Bid Micro Auctions.
</b>246-257<br><a href="http://dx.doi.org/10.1007/0-387-33406-8_21"><i>Electronic Edition</i></a> (link) <font size="-3"><a href="http://dblp.uni-trier.de/rec/bibtex/conf/sec/PengBD06">BibTeX</a></font>

</ul>
<h2>Intrusion Detection</h2> 
<ul>
<li><a name="BouzidaC06" href="../../indices/a-tree/b/Bouzida:Yacine.html">Yacine Bouzida</a>, <a href="../../indices/a-tree/c/Cuppens:Fr=eacute=d=eacute=ric.html">Fr&eacute;d&eacute;ric Cuppens</a>:
<br><b>Detecting Known and Novel Network Intrusions.
</b>258-270<br><a href="http://dx.doi.org/10.1007/0-387-33406-8_22"><i>Electronic Edition</i></a> (link) <font size="-3"><a href="http://dblp.uni-trier.de/rec/bibtex/conf/sec/BouzidaC06">BibTeX</a></font>

<li><a name="MazhelisPR06" href="../../indices/a-tree/m/Mazhelis:Oleksiy.html">Oleksiy Mazhelis</a>, <a href="../../indices/a-tree/p/Puuronen:Seppo.html">Seppo Puuronen</a>, <a href="../../indices/a-tree/r/Raento:Mika.html">Mika Raento</a>:
<br><b>Evaluating Classifiers for Mobile-Masquerader Detection.
</b>271-283<br><a href="http://dx.doi.org/10.1007/0-387-33406-8_23"><i>Electronic Edition</i></a> (link) <font size="-3"><a href="http://dblp.uni-trier.de/rec/bibtex/conf/sec/MazhelisPR06">BibTeX</a></font>

<li><a name="YinYS06" href="../../indices/a-tree/y/Yin:Xiaoxin.html">Xiaoxin Yin</a>, <a href="../../indices/a-tree/y/Yurcik:William.html">William Yurcik</a>, <a href="../../indices/a-tree/s/Slagell:Adam_J=.html">Adam J. Slagell</a>:
<br><b><i>VisFlowCluster-IP</i>: Connectivity-Based Visual Clustering of Network Hosts.
</b>284-295<br><a href="http://dx.doi.org/10.1007/0-387-33406-8_24"><i>Electronic Edition</i></a> (link) <font size="-3"><a href="http://dblp.uni-trier.de/rec/bibtex/conf/sec/YinYS06">BibTeX</a></font>

</ul>
<h2>Usability and Awareness</h2> 
<ul>
<li><a name="HerzogS06" href="../../indices/a-tree/h/Herzog:Almut.html">Almut Herzog</a>, <a href="../../indices/a-tree/s/Shahmehri:Nahid.html">Nahid Shahmehri</a>:
<br><b>A Usability Study of Security Policy Management.
</b>296-306<br><a href="http://dx.doi.org/10.1007/0-387-33406-8_25"><i>Electronic Edition</i></a> (link) <font size="-3"><a href="http://dblp.uni-trier.de/rec/bibtex/conf/sec/HerzogS06">BibTeX</a></font>

<li><a name="FurnellJKD06" href="../../indices/a-tree/f/Furnell:Steven.html">Steven Furnell</a>, <a href="../../indices/a-tree/j/Jusoh:Adila.html">Adila Jusoh</a>, <a href="../../indices/a-tree/k/Katsabas:Dimitris.html">Dimitris Katsabas</a>, <a href="../../indices/a-tree/d/Dowland:Paul.html">Paul Dowland</a>:
<br><b>Considering the Usability of End-User Security Software.
</b>307-316<br><a href="http://dx.doi.org/10.1007/0-387-33406-8_26"><i>Electronic Edition</i></a> (link) <font size="-3"><a href="http://dblp.uni-trier.de/rec/bibtex/conf/sec/FurnellJKD06">BibTeX</a></font>

<li><a name="NguyenI06" href="../../indices/a-tree/n/Nguyen:Thuy_D=.html">Thuy D. Nguyen</a>, <a href="../../indices/a-tree/i/Irvine:Cynthia_E=.html">Cynthia E. Irvine</a>:
<br><b>Utilizing the Common Criteria for Advanced Student Research Projects.
</b>317-328<br><a href="http://dx.doi.org/10.1007/0-387-33406-8_27"><i>Electronic Edition</i></a> (link) <font size="-3"><a href="http://dblp.uni-trier.de/rec/bibtex/conf/sec/NguyenI06">BibTeX</a></font>

</ul>
<h2>Privacy Enhancing Technologies III</h2> 
<ul>
<li><a name="Accorsi06" href="../../indices/a-tree/a/Accorsi:Rafael.html">Rafael Accorsi</a>:
<br><b>On the Relationship of Privacy and Secure Remote Logging in Dynamic Systems.
</b>329-339<br><a href="http://dx.doi.org/10.1007/0-387-33406-8_28"><i>Electronic Edition</i></a> (link) <font size="-3"><a href="http://dblp.uni-trier.de/rec/bibtex/conf/sec/Accorsi06">BibTeX</a></font>

<li><a name="ZhuLB06" href="../../indices/a-tree/z/Zhu:Huafei.html">Huafei Zhu</a>, <a href="../../indices/a-tree/l/Li:Tieyan.html">Tieyan Li</a>, <a href="../../indices/a-tree/b/Bao:Feng.html">Feng Bao</a>:
<br><b>Privacy-Preserving Shared-Additive-Inverse Protocols and Their Applications.
</b>340-350<br><a href="http://dx.doi.org/10.1007/0-387-33406-8_29"><i>Electronic Edition</i></a> (link) <font size="-3"><a href="http://dblp.uni-trier.de/rec/bibtex/conf/sec/ZhuLB06">BibTeX</a></font>

</ul>
<h2>Access Control and Authentication II</h2> 
<ul>
<li><a name="KirovskiJR06" href="../../indices/a-tree/k/Kirovski:Darko.html">Darko Kirovski</a>, <a href="../../indices/a-tree/j/Jojic:Nebojsa.html">Nebojsa Jojic</a>, <a href="../../indices/a-tree/r/Roberts:Paul.html">Paul Roberts</a>:
<br><b>Click Passwords.
</b>351-363<br><a href="http://dx.doi.org/10.1007/0-387-33406-8_30"><i>Electronic Edition</i></a> (link) <font size="-3"><a href="http://dblp.uni-trier.de/rec/bibtex/conf/sec/KirovskiJR06">BibTeX</a></font>

<li><a name="PetkovicCH06" href="../../indices/a-tree/p/Petkovic:Milan.html">Milan Petkovic</a>, <a href="../../indices/a-tree/c/Conrado:Claudine.html">Claudine Conrado</a>, <a href="../../indices/a-tree/h/Hammout=egrave=ne:Malik.html">Malik Hammout&egrave;ne</a>:
<br><b>Cryptographically Enforced Personalized Role-Based Access Control.
</b>364-376<br><a href="http://dx.doi.org/10.1007/0-387-33406-8_31"><i>Electronic Edition</i></a> (link) <font size="-3"><a href="http://dblp.uni-trier.de/rec/bibtex/conf/sec/PetkovicCH06">BibTeX</a></font>

</ul>
<h2>Access Control and Authentication III</h2> 
<ul>
<li><a name="DemchenkoGL06" href="../../indices/a-tree/d/Demchenko:Yuri.html">Yuri Demchenko</a>, <a href="../../indices/a-tree/g/Gommans:Leon.html">Leon Gommans</a>, <a href="../../indices/a-tree/l/Laat:Cees_de.html">Cees de Laat</a>:
<br><b>Using VO Concept for Managing Dynamic Security Associations.
</b>377-388<br><a href="http://dx.doi.org/10.1007/0-387-33406-8_32"><i>Electronic Edition</i></a> (link) <font size="-3"><a href="http://dblp.uni-trier.de/rec/bibtex/conf/sec/DemchenkoGL06">BibTeX</a></font>

<li><a name="JaatunTPJFD06" href="../../indices/a-tree/j/Jaatun:Martin_Gilje.html">Martin Gilje Jaatun</a>, <a href="../../indices/a-tree/t/T=oslash=ndel:Inger_Anne.html">Inger Anne T&oslash;ndel</a>, <a href="../../indices/a-tree/p/Paint:Fr=eacute=d=eacute=ric.html">Fr&eacute;d&eacute;ric Paint</a>, <a href="../../indices/a-tree/j/Johannessen:Tor_Hjalmar.html">Tor Hjalmar Johannessen</a>, <a href="../../indices/a-tree/f/Francis:John_Charles.html">John Charles Francis</a>, <a href="../../indices/a-tree/d/Duranton:Claire.html">Claire Duranton</a>:
<br><b>Secure Fast Handover in an Open Broadband Access Network using Kerberos-style Tickets.
</b>389-400<br><a href="http://dx.doi.org/10.1007/0-387-33406-8_33"><i>Electronic Edition</i></a> (link) <font size="-3"><a href="http://dblp.uni-trier.de/rec/bibtex/conf/sec/JaatunTPJFD06">BibTeX</a></font>

</ul>
<h2>Forensics</h2> 
<ul>
<li><a name="ChoLTT06" href="../../indices/a-tree/c/Cho:Chia_Yuan.html">Chia Yuan Cho</a>, <a href="../../indices/a-tree/l/Lee:Sin_Yeung.html">Sin Yeung Lee</a>, <a href="../../indices/a-tree/t/Tan:Chung_Pheng.html">Chung Pheng Tan</a>, <a href="../../indices/a-tree/t/Tan:Yong_Tai.html">Yong Tai Tan</a>:
<br><b>Network Forensics on Packet Fingerprints.
</b>401-412<br><a href="http://dx.doi.org/10.1007/0-387-33406-8_34"><i>Electronic Edition</i></a> (link) <font size="-3"><a href="http://dblp.uni-trier.de/rec/bibtex/conf/sec/ChoLTT06">BibTeX</a></font>

<li><a name="KarresandS06" href="../../indices/a-tree/k/Karresand:Martin.html">Martin Karresand</a>, <a href="../../indices/a-tree/s/Shahmehri:Nahid.html">Nahid Shahmehri</a>:
<br><b>Oscar - File Type Identification of Binary Data in Disk Clusters and RAM Pages.
</b>413-424<br><a href="http://dx.doi.org/10.1007/0-387-33406-8_35"><i>Electronic Edition</i></a> (link) <font size="-3"><a href="http://dblp.uni-trier.de/rec/bibtex/conf/sec/KarresandS06">BibTeX</a></font>

</ul>
<h2>IFIP WG 11.1/11.8 Security Culture Workshop</h2> 
<ul>
<li><a name="RuighaverM06" href="../../indices/a-tree/r/Ruighaver:Anthonie_B=.html">Anthonie B. Ruighaver</a>, <a href="../../indices/a-tree/m/Maynard:Sean_B=.html">Sean B. Maynard</a>:
<br><b>Organizational Security Culture: More Than Just an End-User Phenomenon.
</b>425-430<br><a href="http://dx.doi.org/10.1007/0-387-33406-8_36"><i>Electronic Edition</i></a> (link) <font size="-3"><a href="http://dblp.uni-trier.de/rec/bibtex/conf/sec/RuighaverM06">BibTeX</a></font>

<li><a name="ConeTIN06" href="../../indices/a-tree/c/Cone:Benjamin_D=.html">Benjamin D. Cone</a>, <a href="../../indices/a-tree/t/Thompson:Michael_F=.html">Michael F. Thompson</a>, <a href="../../indices/a-tree/i/Irvine:Cynthia_E=.html">Cynthia E. Irvine</a>, <a href="../../indices/a-tree/n/Nguyen:Thuy_D=.html">Thuy D. Nguyen</a>:
<br><b>Cyber Security Training and Awareness Through Game Play.
</b>431-436<br><a href="http://dx.doi.org/10.1007/0-387-33406-8_37"><i>Electronic Edition</i></a> (link) <font size="-3"><a href="http://dblp.uni-trier.de/rec/bibtex/conf/sec/ConeTIN06">BibTeX</a></font>

<li><a name="Zakaria06" href="../../indices/a-tree/z/Zakaria:Omar.html">Omar Zakaria</a>:
<br><b>Internalisation of Information Security Culture amongst Employees through Basic Security Knowledge.
</b>437-441<br><a href="http://dx.doi.org/10.1007/0-387-33406-8_38"><i>Electronic Edition</i></a> (link) <font size="-3"><a href="http://dblp.uni-trier.de/rec/bibtex/conf/sec/Zakaria06">BibTeX</a></font>

<li><a name="BakariTMY06" href="../../indices/a-tree/b/Bakari:Jabiri_Kuwe.html">Jabiri Kuwe Bakari</a>, <a href="../../indices/a-tree/t/Tarimo:Charles_N=.html">Charles N. Tarimo</a>, <a href="../../indices/a-tree/m/Magnusson:Christer.html">Christer Magnusson</a>, <a href="../../indices/a-tree/y/Yngstr=ouml=m:Louise.html">Louise Yngstr&ouml;m</a>:
<br><b>Bridging the Gap between General Management and Technicians - A Case Study in ICT Security.
</b>442-447<br><a href="http://dx.doi.org/10.1007/0-387-33406-8_39"><i>Electronic Edition</i></a> (link) <font size="-3"><a href="http://dblp.uni-trier.de/rec/bibtex/conf/sec/BakariTMY06">BibTeX</a></font>

<li><a name="DrevinKS06" href="../../indices/a-tree/d/Drevin:Lynette.html">Lynette Drevin</a>, <a href="../../indices/a-tree/k/Kruger:Hennie_A=.html">Hennie A. Kruger</a>, <a href="../../indices/a-tree/s/Steyn:Tjaart.html">Tjaart Steyn</a>:
<br><b>Value-Focused Assessment of Information Communication and Technology Security Awareness in an Academic Environment.
</b>448-453<br><a href="http://dx.doi.org/10.1007/0-387-33406-8_40"><i>Electronic Edition</i></a> (link) <font size="-3"><a href="http://dblp.uni-trier.de/rec/bibtex/conf/sec/DrevinKS06">BibTeX</a></font>

<li><a name="DodgeF06" href="../../indices/a-tree/d/Dodge:Ronald_C=.html">Ronald C. Dodge</a>, <a href="../../indices/a-tree/f/Ferguson:Aaron_J=.html">Aaron J. Ferguson</a>:
<br><b>Using Phishing for User Email Security Awareness.
</b>454-459<br><a href="http://dx.doi.org/10.1007/0-387-33406-8_41"><i>Electronic Edition</i></a> (link) <font size="-3"><a href="http://dblp.uni-trier.de/rec/bibtex/conf/sec/DodgeF06">BibTeX</a></font>

</ul>
<h2>IFIP WG 11.4 I-NetSec'06 Workshop</h2> 
<ul>
<li><a name="Camenisch06a" href="../../indices/a-tree/c/Camenisch:Jan.html">Jan Camenisch</a>:
<br><b>Anonymous Credentials: Opportunities and Challenges.
</b>460<br><a href="http://dx.doi.org/10.1007/0-387-33406-8_42"><i>Electronic Edition</i></a> (link) <font size="-3"><a href="http://dblp.uni-trier.de/rec/bibtex/conf/sec/Camenisch06a">BibTeX</a></font>

<li><a name="Kerschbaum06" href="../../indices/a-tree/k/Kerschbaum:Florian.html">Florian Kerschbaum</a>:
<br><b>Practical Private Regular Expression Matching.
</b>461-470<br><a href="http://dx.doi.org/10.1007/0-387-33406-8_43"><i>Electronic Edition</i></a> (link) <font size="-3"><a href="http://dblp.uni-trier.de/rec/bibtex/conf/sec/Kerschbaum06">BibTeX</a></font>

<li><a name="PearsonM06" href="../../indices/a-tree/p/Pearson:Siani.html">Siani Pearson</a>, <a href="../../indices/a-tree/m/Mont:Marco_Casassa.html">Marco Casassa Mont</a>:
<br><b>A System for Privacy-Aware Resource Allocation and Data Processing in Dynamic Environments.
</b>471-482<br><a href="http://dx.doi.org/10.1007/0-387-33406-8_44"><i>Electronic Edition</i></a> (link) <font size="-3"><a href="http://dblp.uni-trier.de/rec/bibtex/conf/sec/PearsonM06">BibTeX</a></font>

<li><a name="TothH06" href="../../indices/a-tree/t/T=oacute=th:Gergely.html">Gergely T&oacute;th</a>, <a href="../../indices/a-tree/h/Horn=aacute=k:Zolt=aacute=n.html">Zolt&aacute;n Horn&aacute;k</a>:
<br><b>The APROB Channel: Adaptive Semi-Real-Time Anonymous Communication.
</b>483-492<br><a href="http://dx.doi.org/10.1007/0-387-33406-8_45"><i>Electronic Edition</i></a> (link) <font size="-3"><a href="http://dblp.uni-trier.de/rec/bibtex/conf/sec/TothH06">BibTeX</a></font>

</ul><p><div class="footer">
<a href="../../index.html">Home</a> | <a href="../indexa.html">Conferences</a> | <a href="../../journals/index.html">Journals</a> | <a href="../../series/index.html">Series</a> | <a href="../../about/faq.html">FAQ</a> &#151; Search: <a href="http://dblp.l3s.de">Faceted</a> | <a href="http://dblp.mpi-inf.mpg.de/dblp-mirror/index.php">Complete</a> | <a href="../../indices/a-tree/index.html">Author</a></div>
<small><a href="../../copyright.html">Copyright &#169;</a> Sat May 16 23:37:20 2009
 by <a href="http://www.informatik.uni-trier.de/~ley/addr.html">Michael Ley</a> (<a href="mailto:ley@uni-trier.de">ley@uni-trier.de</a>)</small></p></body></html>
 
Document Actions