ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
2008 International Conference on Security Technology
Latest Publications
TOTAL DOCUMENTS
64
(FIVE YEARS 0)
H-INDEX
8
(FIVE YEARS 0)
Published By IEEE
9780769534862
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Times-Based Usage Control Model and Its Implication
2008 International Conference on Security Technology
◽
10.1109/sectech.2008.23
◽
2008
◽
Author(s):
Jian Fang
◽
Junhua Zou
Keyword(s):
Control Model
◽
Usage Control
Download Full-text
SMS Encryption for Mobile Communication
2008 International Conference on Security Technology
◽
10.1109/sectech.2008.48
◽
2008
◽
Cited By ~ 16
Author(s):
David Lisonek
◽
Martin Drahanský
Keyword(s):
Mobile Communication
Download Full-text
An Efficient Security Framework for Detection and Isolation of Attackers in Low Rate Wireless Personal Area Networks
2008 International Conference on Security Technology
◽
10.1109/sectech.2008.55
◽
2008
◽
Author(s):
S. Padma Priya
◽
Jayaram Pradhan
Keyword(s):
Personal Area Networks
◽
Wireless Personal Area Networks
◽
Security Framework
◽
Low Rate
Download Full-text
Mitigating Resource-Draining DoS Attacks on Broadcast Source Authentication on Wireless Sensors Networks
2008 International Conference on Security Technology
◽
10.1109/sectech.2008.20
◽
2008
◽
Author(s):
Chakib Bekara
◽
Maryline Laurent-Maknavicius
◽
Kheira Bekara
Keyword(s):
Wireless Sensors
◽
Dos Attacks
◽
Source Authentication
◽
Wireless Sensors Networks
Download Full-text
Exception Handling of Multi-criteria Workflow Task Assignment
2008 International Conference on Security Technology
◽
10.1109/sectech.2008.29
◽
2008
◽
Author(s):
Yu Ouyang
◽
Xi-ping Yang
Keyword(s):
Task Assignment
◽
Exception Handling
Download Full-text
A Survivable Scheme for Critical Information System
2008 International Conference on Security Technology
◽
10.1109/sectech.2008.56
◽
2008
◽
Author(s):
Jianming Zhu
◽
Chao Wang
Keyword(s):
Information System
◽
Critical Information
Download Full-text
A Novel E-Mail Protocol Using Three-Party Password-Authenticated Key Exchange
2008 International Conference on Security Technology
◽
10.1109/sectech.2008.34
◽
2008
◽
Cited By ~ 2
Author(s):
Chin-Chen Chang
◽
Yu-Ching Wu
◽
Shih-Chang Chang
Keyword(s):
Key Exchange
◽
Authenticated Key Exchange
◽
E Mail
Download Full-text
A Novel Visualization Approach for Efficient Network Scans Detection
2008 International Conference on Security Technology
◽
10.1109/sectech.2008.47
◽
2008
◽
Cited By ~ 3
Author(s):
Zhang Jiawan
◽
Li Liang
◽
Lu Liangfu
◽
Zhou Ning
Download Full-text
Trust and Reputation Aware Security for Resource Selection in Grid Computing
2008 International Conference on Security Technology
◽
10.1109/sectech.2008.46
◽
2008
◽
Cited By ~ 10
Author(s):
V. Vijayakumar
◽
R. S. D. WahidhaBanu
Keyword(s):
Grid Computing
◽
Resource Selection
◽
Trust And Reputation
Download Full-text
Research on the Application of CRFs Based on Feature Sets in Network Intrusion Detection
2008 International Conference on Security Technology
◽
10.1109/sectech.2008.26
◽
2008
◽
Cited By ~ 3
Author(s):
Jianping Li
◽
Huiqiang Wang
◽
Jianguang Yu
Keyword(s):
Intrusion Detection
◽
Network Intrusion Detection
◽
Feature Sets
◽
Network Intrusion
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close