Advertisement

Computer Network Security

Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003. Proceedings

  • Vladimir Gorodetsky
  • Leonard Popyack
  • Victor Skormin

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2776)

Table of contents

  1. Front Matter
  2. Invited Papers

    1. Kulesh Shanmugasundaram, Nasir Memon, Anubhav Savant, Herve Bronnimann
      Pages 1-16
    2. Ravi Sandhu, Jaehong Park
      Pages 17-31
    3. Thumrongsak Kosiyatrakul, Susan Older, Polar Humenn, Shiu-Kai Chin
      Pages 32-46
    4. Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu
      Pages 57-81
  3. Mathematical Models and Architectures for Computer Network Security

    1. Stefano Bistarelli, Iliano Cervesato, Gabriele Lenzini, Fabio Martinelli
      Pages 86-99
    2. Lazaros Gymnopoulos, Stelios Dritsas, Stefanos Gritzalis, Costas Lambrinoudakis
      Pages 100-111
    3. Spyros Kokolakis, Costas Lambrinoudakis, Dimitris Gritzalis
      Pages 112-121
    4. Michael Smirnov
      Pages 135-146
    5. Peter D. Zegzhda, Dmitry P. Zegzhda, Maxim O. Kalinin
      Pages 147-156
  4. Intrusion Detection

    1. Salem Benferhat, Fabien Autrel, Frédéric Cuppens
      Pages 157-170
    2. John Bigham, David Gamez, Ning Lu
      Pages 171-182
    3. Victor A. Skormin, Douglas H. Summerville, James S. Moronski
      Pages 195-205
  5. Public Key Distribution, Authentication, Access Control

    1. Dae Hyun Yum, Jae Eun Kang, Pil Joong Lee
      Pages 229-240
    2. Antonio Lain, Viacheslav Borisov
      Pages 241-254
    3. Jose L. Munoz, Jordi Forne, Oscar Esparza, Miguel Soriano
      Pages 255-266
  6. Cryptography

    1. Youngdai Ko, Deukjo Hong, Seokhie Hong, Sangjin Lee, Jongin Lim
      Pages 298-307
    2. Alexander Rostovtsev, Elena Makhovenko
      Pages 328-336
    3. N. Sklavos, A. A. Moldovyan, O. Koufopavlou
      Pages 337-348
  7. Steganography

    1. Kaiwen Zhang, Shuozhong Wang, Xinpeng Zhang
      Pages 360-370
    2. Valery Korzhik, Guillermo Morales-Luna, Irina Marakova, Carlos Patiño-Ruvalcaba
      Pages 371-382
    3. Shuozhong Wang, Xinpeng Zhang, Kaiwen Zhang
      Pages 383-394
    4. Xinpeng Zhang, Shuozhong Wang, Kaiwen Zhang
      Pages 395-406
    5. Xinpeng Zhang, Shuozhong Wang, Kaiwen Zhang
      Pages 407-418
  8. Short Papers

    1. Mohamed Al-Ibrahim, Anton Cerny
      Pages 419-423
    2. Alexander Grusho, Elena Timonina
      Pages 428-431
    3. Lilian Mitrou, Konstantinos Moulinos
      Pages 432-435
    4. Hyun-Sung Kim, Sung-Ho Hwang
      Pages 436-439
    5. Francisco J. Martin, Enric Plaza
      Pages 444-448
    6. N. D. Goots, B. V. Izotov, A. A. Moldovyan, N. A. Moldovyan
      Pages 449-452
    7. Yuri Melnikov, Alexander Tarakanov
      Pages 453-456
    8. Gustavo Santana, Leonid B. Sheremetov, Miguel Contreras
      Pages 457-460
    9. Taeshik Sohn, Taewoo Noh, Jongsub Moon
      Pages 461-464
    10. Svetlana P. Sokolova, Ruslan S. Ivlev
      Pages 465-468
  9. Back Matter

About these proceedings

Keywords

access control authentication computer network security computer security cryptography data security information security intrusion detection network security privacy secure communications secure networking security systems security

Editors and affiliations

  • Vladimir Gorodetsky
    • 1
  • Leonard Popyack
    • 2
  • Victor Skormin
    • 3
  1. 1.St. Petersburg Intitute for Informaticsand AutomationSt. PetersburgRussia
  2. 2.AFRL/IFRomeUSA
  3. 3.US Air Force, Binghamton University (SUNYI)BinghamtonUSA

Bibliographic information

  • DOI https://doi.org/10.1007/b12005
  • Copyright Information Springer-Verlag Berlin Heidelberg 2003
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-40797-3
  • Online ISBN 978-3-540-45215-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Energy, Utilities & Environment
Aerospace
Oil, Gas & Geosciences
Engineering