Keynote Address.- BitBlaze: A New Approach to Computer Security via Binary Analysis.- Languages and Formal Methods.- On the Decidability of Model-Checking Information Flow Properties.- Synthesizing Enforcement Monitors wrt. the Safety-Progress Classification of Properties.- Implicit Flows: Can’t Live with ‘Em, Can’t Live without ‘Em.- Protocols.- A Robust Reputation Scheme for Decentralized Group Management Systems.- Complexity of Checking Freshness of Cryptographic Protocols.- Secure Internet Voting Based on Paper Ballots.- Short Papers.- A Secure Round-Based Timestamping Scheme with Absolute Timestamps (Short Paper).- A Framework for Trustworthy Service-Oriented Computing (Short Paper).- Revisiting Bluetooth Security (Short Paper).- A Verification Framework for Temporal RBAC with Role Hierarchy (Short Paper).- Keynote Address.- Computing on Encrypted Data.- Ongoing Research.- Identification of Cryptographically Strong and Weak Pseudorandom Bit Generators.- Proxy Re-signature Schemes.- Keynote Address.- Fast Signature Matching Using Extended Finite Automaton (XFA).- Intrusion Detection.- Real-Time Alert Correlation with Type Graphs.- Incorporation of Application Layer Protocol Syntax into Anomaly Detection.- A Parallel Architecture for Stateful, High-Speed Intrusion Detection.- Biometrics, Forensics and Steganography.- Indexing Multimodal Biometric Databases Using Kd-Tree with Feature Level Fusion.- Audio Watermarking Based on Quantization in Wavelet Domain.- Overwriting Hard Drive Data: The Great Wiping Controversy.- Practical Applications.- Optimizing the Block Cipher and Modes of Operations Overhead at the Link Layer Security Framework in the Wireless Sensor Networks.- Privacy Management for Facebook.- HyDRo – Hybrid Development of Roles.- KeynoteAddress.- The Enlightened Era of Enterprise Security (Invited Talk).
Ask a Question About this Product More... |