Evaluating the Impact of Intrusion Detection Deficiencies on the Cost-Effectiveness of Attack Recovery (English)
- New search for: Wang, H.
- New search for: Liu, P.
- New search for: Li, L.
- New search for: Wang, H.
- New search for: Liu, P.
- New search for: Li, L.
- New search for: Zhang, Kan
- New search for: Zheng, Yuliang
In:
Information security: 7th International conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004 : proceedings
;
146-157
;
2004
-
ISBN:
-
ISSN:
- Conference paper / Print
-
Title:Evaluating the Impact of Intrusion Detection Deficiencies on the Cost-Effectiveness of Attack Recovery
-
Contributors:
-
Conference:International conference; 7th, Information security: 7th International conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004 : proceedings ; 2004 ; Palo Alto, CA
-
Published in:LECTURE NOTES IN COMPUTER SCIENCE ; 146-157
-
Publisher:
- New search for: Springer
-
Place of publication:Berlin , [London]
-
Publication date:2004-01-01
-
Size:12 pages
-
Remarks:Includes bibliographical references and index.
-
ISBN:
-
ISSN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Practical Authenticated Key Agreement Using PasswordsKwon, T. et al. | 2004
- 13
-
Further Analysis of Password Authenticated Key Exchange Protocol Based on RSA for Imbalanced Wireless NetworksZhang, M. et al. | 2004
- 25
-
Storage-Efficient Stateless Group Key RevocationWang, P. / Ning, P. / Reeves, D. S. et al. | 2004
- 39
-
Low-Level Ideal Signatures and General Integrity IdealizationBackes, M. / Pfitzmann, B. / Waidner, M. et al. | 2004
- 52
-
Cryptanalysis of a Verifiably Committed Signature Scheme Based on GPS and RSACathalo, J. / Libert, B. / Quisquater, J.-J. et al. | 2004
- 61
-
How to Break and Repair a Universally Composable Signature FunctionalityBackes, M. / Hofheinz, D. et al. | 2004
- 73
-
RSA Accumulator Based Broadcast EncryptionGentry, C. / Ramzan, Z. et al. | 2004
- 87
-
Chameleon Hashing Without Key ExposureChen, X. / Zhang, F. / Kim, K. et al. | 2004
- 99
-
Radix-r Non-Adjacent FormTakagi, T. / Yen, S.-M. / Wu, B.-C. et al. | 2004
- 111
-
On Related-Key and Collision Attacks: The Case for the IBM 4758 CryptoprocessorPhan, R. C.-W. / Handschuh, H. et al. | 2004
- 123
-
Security Analysis of Two Signcryption SchemesWang, G. / Deng, R. H. / Kwak, D. / Moon, S. et al. | 2004
- 134
-
On The Security of Key Derivation FunctionsAdams, C. / Kramer, G. / Mister, S. / Zuccherato, R. et al. | 2004
- 146
-
Evaluating the Impact of Intrusion Detection Deficiencies on the Cost-Effectiveness of Attack RecoveryWang, H. / Liu, P. / Li, L. et al. | 2004
- 158
-
A Model for the Semantics of Attack Signatures in Misuse Detection SystemsMeier, M. et al. | 2004
- 170
-
Detection of Sniffers in an Ethernet NetworkTrabelsi, Z. / Rahmani, H. et al. | 2004
- 183
-
Using Greedy Hamiltonian Call Paths to Detect Stack Smashing AttacksFoster, M. / Wilson, J. N. / Chen, S. et al. | 2004
- 195
-
Securing DBMS: Characterizing and Detecting Query FloodsBertino, E. / Leggieri, T. / Terzi, E. et al. | 2004
- 207
-
An XML-Based Approach to Document Flow VerificationBertino, E. / Ferrari, E. / Mella, G. et al. | 2004
- 219
-
Model-Checking Access Control PoliciesGuelev, D. P. / Ryan, M. / Schobbens, P. Y. et al. | 2004
- 231
-
A Distributed High Assurance Reference MonitorChander, A. / Dean, D. / Mitchell, J. et al. | 2004
- 245
-
Using Mediated Identity-Based Cryptography to Support Role-Based Access ControlNali, D. / Adams, C. / Miri, A. et al. | 2004
- 257
-
Towards Human Interactive Proofs in the Text-Domain (Using the Problem of Sense-Ambiguity for Security)Bergmair, R. / Katzenbeisser, S. et al. | 2004
- 268
-
Image Recognition CAPTCHAsChew, M. / Tygar, J. D. et al. | 2004
- 280
-
A Hierarchical Key-Insulated Signature Scheme in the CA Trust ModelLe, Z. / Yi, O. / Ford, J. / Makedon, F. et al. | 2004
- 292
-
Certificate Recommendations to Improve the Robustness of Web of TrustJiang, Q. / Reeves, D. S. / Ning, P. et al. | 2004
- 304
-
Universally Composable Secure Mobile Agent ComputationXu, K. / Tate, S. R. et al. | 2004
- 318
-
Re-thinking Security in IP Based Micro-MobilityYlitalo, J. / Melen, J. / Nikander, P. / Torvinen, V. et al. | 2004
- 330
-
Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc GroupWu, Q. / Chen, X. / Wang, C. / Wang, Y. et al. | 2004
- 342
-
Prevent Online Identity Theft - Using Network Smart Cards for Secure Online TransactionsLu, H. K. / Ali, A. et al. | 2004
- 354
-
Provable Unlinkability Against Traffic Analysis Already After (log(n)) Steps!Gomulkiewicz, M. / Klonowski, M. / Kutylowski, M. et al. | 2004
- 367
-
An Efficient Online Electronic Cash with Unlinkable Exact PaymentsNakanishi, T. / Shiota, M. / Sugiyama, Y. et al. | 2004
- 379
-
Modifiable Digital Content Protection in P2PPark, H. / Kim, J. et al. | 2004
- 391
-
Survey on the Technological Aspects of Digital Rights ManagementKu, W. / Chi, C.-H. et al. | 2004
- 404
-
Detecting Software Theft via Whole Program Path BirthmarksMyles, G. / Collberg, C. et al. | 2004
- 416
-
Effective Security Requirements Analysis: HAZOP and Use CasesSrivatanakul, T. / Clark, J. A. / Polack, F. et al. | 2004
- 428
-
The Obfuscation ExecutiveHeffner, K. / Collberg, C. et al. | 2004