ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
2008 International Conference on Information Security and Assurance (isa 2008)
Latest Publications
TOTAL DOCUMENTS
118
(FIVE YEARS 0)
H-INDEX
12
(FIVE YEARS 0)
Published By IEEE
9780769531267
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Sufficient Conditions for Secrecy under Any Equational Theories
2008 International Conference on Information Security and Assurance (isa 2008)
◽
10.1109/isa.2008.102
◽
2008
◽
Cited By ~ 1
Author(s):
Hanane Houmani
◽
Mohamed Mejri
Keyword(s):
Sufficient Conditions
◽
Equational Theories
Download Full-text
Anomaly Detection Using LibSVM Training Tools
2008 International Conference on Information Security and Assurance (isa 2008)
◽
10.1109/isa.2008.12
◽
2008
◽
Cited By ~ 18
Author(s):
Chu-Hsing Lin
◽
Jung-Chun Liu
◽
Chia-Han Ho
Keyword(s):
Anomaly Detection
Download Full-text
A New Forensic Image Format for High Capacity Disk Storage
2008 International Conference on Information Security and Assurance (isa 2008)
◽
10.1109/isa.2008.109
◽
2008
◽
Cited By ~ 1
Author(s):
Sang Su Lee
◽
Tae-Sik Park
◽
Sang-Uk Shin
◽
Sung-Kyong Un
◽
Do-Won Hong
Keyword(s):
High Capacity
◽
Disk Storage
◽
Image Format
Download Full-text
Implicit Detection of Hidden Processes with a Local-Booted Virtual Machine
2008 International Conference on Information Security and Assurance (isa 2008)
◽
10.1109/isa.2008.22
◽
2008
◽
Cited By ~ 4
Author(s):
Yan Wen
◽
Jinjing Zhao
◽
Huaimin Wang
Keyword(s):
Virtual Machine
Download Full-text
Integrating Trust and Role for Secure Interoperation in Multi-Domain Environment
2008 International Conference on Information Security and Assurance (isa 2008)
◽
10.1109/isa.2008.30
◽
2008
◽
Cited By ~ 3
Author(s):
Jianfeng Lu
◽
Ruixuan Li
◽
Zhengding Lu
◽
Bing Li
Keyword(s):
Secure Interoperation
Download Full-text
A Comparative Study of RFID Solutions for Security and Privacy: POP vs. Previous Solutions
2008 International Conference on Information Security and Assurance (isa 2008)
◽
10.1109/isa.2008.89
◽
2008
◽
Cited By ~ 2
Author(s):
Krishan Sabaragamu Koralalage
◽
Jingde Cheng
Keyword(s):
Comparative Study
◽
Security And Privacy
Download Full-text
A New Electronic Communication Technology - VT Position Code Communication Technology and Its Implementation
2008 International Conference on Information Security and Assurance (isa 2008)
◽
10.1109/isa.2008.43
◽
2008
◽
Author(s):
Shi Ying Zhou
◽
Gui He Qin
◽
Yu Bo Jin
Keyword(s):
Communication Technology
◽
Electronic Communication
◽
Position Code
◽
Electronic Communication Technology
Download Full-text
Security Research on WiMAX with Neural Cryptography
2008 International Conference on Information Security and Assurance (isa 2008)
◽
10.1109/isa.2008.17
◽
2008
◽
Cited By ~ 5
Author(s):
Dong Hu
◽
YuYan Wang
Keyword(s):
Security Research
Download Full-text
Secure Deniable Authentication Protocol Based on ElGamal Cryptography
2008 International Conference on Information Security and Assurance (isa 2008)
◽
10.1109/isa.2008.85
◽
2008
◽
Cited By ~ 1
Author(s):
Eun-Jun Yoon
◽
Kee-Young Yoo
Keyword(s):
Authentication Protocol
◽
Deniable Authentication
Download Full-text
Towards Reliable Trust Management based on Structural Trust Scopes of Distributed Roles
2008 International Conference on Information Security and Assurance (isa 2008)
◽
10.1109/isa.2008.94
◽
2008
◽
Author(s):
Gang Yin
◽
Ning Zhou
◽
Huaimin Wang
Keyword(s):
Trust Management
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close