Abstract is missing.
- Secure M-commerce Transactions: A Third Party Based Signature ProtocolLi-Sha He, Ning Zhang, Li-Rong He, Ian Rogers. 3-8 [doi]
- Secure E-Commerce Protocol for Purchase of e-Goods - Using Smart CardSatish Devane, Madhumita Chatterjee, Deepak Phatak. 9-14 [doi]
- Certified Email Delivery with Offline TTPHao Wang, Yuyi Ou, Jie Ling, Lu Liang, Xiang Xu. 15-20 [doi]
- An Effective and Secure Buyer-Seller Watermarking ProtocolIbrahim M. Ibrahim, Sherif Hazem Nour El-Din, Abdel Fatah A. Hegazy. 21-28 [doi]
- Towards an Autonomic Security System for Mobile Ad Hoc NetworksMohamad Aljnidi, Jean Leneutre. 29-32 [doi]
- A Secure Authenticated Key Agreement Protocol For Wireless SecurityPierre E. Abi-Char, Abdallah Mhamed, Bachar El Hassan. 33-38 [doi]
- Hierarchical Multi-Party Key Agreement for Wireless NetworksSigurd Eskeland, Vladimir A. Oleshchuk. 39-43 [doi]
- Applying Secure Data Aggregation techniques for a Structure and Density Independent Group Based Key Management ProtocolKashif Kifayat, Madjid Merabti, Qi Shi, David Llewellyn-Jones. 44-49 [doi]
- A Performance Comparison of Wireless Ad Hoc Network Routing Protocols under Security AttackSu Mon Bo, Hannan Xiao, Aderemi Adereti, James A. Malcolm, Bruce Christianson. 50-55 [doi]
- On Detecting Packets Droppers in MANET: A Novel Low Cost ApproachTarag Fahad, Djamel Djenouri, Robert Askwith. 56-64 [doi]
- Threshold SKI Protocol for ID-based CryptosystemsAshutosh Saxena. 65-70 [doi]
- Fuzzy Key Extraction from Fingerprint Biometrics based on Dynamic Quantization MechanismThian Song Ong, Andrew Beng Jin Teoh. 71-76 [doi]
- Low-cost Anonymous Timed-Release EncryptionDimitrios Hristu-Varsakelis, Konstantinos Chalkias, George Stephanides. 77-82 [doi]
- Integrating Multi-Modal Circuit Features within an Efficient Encryption SystemEvangelos Papoutsis, Gareth Howells, Andrew B. T. Hopkins, Klaus D. McDonald-Maier. 83-88 [doi]
- A Secure Authenticated Key Agreement Protocol Based on Elliptic Curve CryptographyPierre E. Abi-Char, Abdallah Mhamed, Bachar El Hassan. 89-94 [doi]
- Inclusion of a Montgomery Multiplier Unit into an Embedded Processor’s Datapath to Speed-up Elliptic Curve CryptographySandro Bartolini, Cinzia Castagnini, Enrico Martinelli. 95-100 [doi]
- An LSB Data Hiding Technique Using Prime NumbersSandipan Dey, Ajith Abraham, Sugata Sanyal. 101-108 [doi]
- Binding Update Authentication Scheme for Mobile IPv6Irfan Ahmed, Usman Tariq, Shoaib Mukhtar, Kyung-suk Lhee, S. W. Yoo, Piao Yanji, Manpyo Hong. 109-114 [doi]
- An Authentication Scheme Using Non-Commutative SemigroupsM. M. Chowdhury. 115-118 [doi]
- Function-Based Authorization Constraints Specification and EnforcementWei Zhou, Christoph Meinel. 119-124 [doi]
- Separation of Duty in Role-Based Access Control Model through Fuzzy RelationsHassan Takabi, Morteza Amini, Rasool Jalili. 125-130 [doi]
- Enhancing Role-Based Access Control Model through Fuzzy RelationsHassan Takabi, Morteza Amini, Rasool Jalili. 131-136 [doi]
- A Theoretical Security Model for Access Control and Security AssuranceBo-Chao Cheng, Huan Chen, Ryh-Yuh Tseng. 137-142 [doi]
- A Purpose-Based Access Control ModelNaikuo Yang, Howard Barringer, Ning Zhang. 143-148 [doi]
- SARBAC07: A Scoped Administration Model for RBAC with Hybrid HierarchyYue Zhang, James B. D. Joshi. 149-154 [doi]
- Levels of Authentication Assurance: an InvestigationAleksandra Nenadic, Ning Zhang, Li Yao, Terry Morrow. 155-160 [doi]
- Vulnerability Assessment by Learning Attack Specifications in GraphsVirginia N. L. Franqueira, Raul H. C. Lopes. 161-164 [doi]
- Automatic Patch Generation for Buffer Overflow AttacksAlexey Smirnov, Tzi-cker Chiueh. 165-170 [doi]
- Protecting IP Multimedia Subsystem (IMS) Service Delivery Platform from Time Independent AttacksMuhammad Sher, Thomas Magedanz. 171-176 [doi]
- Cyber Threat Trend Analysis Model Using HMMDo-Hoon Kim, Taek Lee, Sung-Oh David Jung, Hoh Peter In, Heejo Lee. 177-182 [doi]
- DIPS: A Framework for Distributed Intrusion Prediction and Prevention Using Hidden Markov Models and Online Fuzzy Risk AssessmentKjetil Haslum, Ajith Abraham, Svein J. Knapskog. 183-190 [doi]
- Detection and Honeypot Based Redirection to Counter DDoS Attacks in ISP DomainAnjali Sardana, Krishan Kumar, Ramesh Chandra Joshi. 191-196 [doi]
- IP protection: Detecting Email based breaches of confidenceNeil Cooke, Lee Gillam, Ahmet M. Kondoz. 197-202 [doi]
- Non-Stationary Markov Models and Anomaly Propagation Analysis in IDSArnur G. Tokhtabayev, Victor A. Skormin. 203-208 [doi]
- Building Trustworthy Intrusion Detection through VM IntrospectionFabrizio Baiardi, Daniele Sgandurra. 209-214 [doi]
- Early DoS Attack Detection using Smoothened Time-Series andWavelet AnalysisPravin Shinde, Srinivas Guntupalli. 215-220 [doi]
- A Security Model for Detecting Suspicious Patterns in Physical EnvironmentSimon Fong, Zhuang Yan. 221-226 [doi]
- Detection of Web Defacements by means of Genetic ProgrammingEric Medvet, Cyril De Fillon, Alberto Bartoli. 227-234 [doi]
- Team Edit Automata for Testing Security PropertyZhenrong Yang, Aiman Hanna, Mourad Debbabi. 235-240 [doi]
- Analysing the Security Threats against Network Convergence ArchitecturesPatroklos G. Argyroudis, Robert McAdoo, Stephen Toner, Linda Doyle, Donal O Mahony. 241-246 [doi]
- Modelling Quality of Protection in Outsourced Business ProcessesFabio Massacci, Artsiom Yautsiukhin. 247-252 [doi]
- Modeling Security Protocols as GamesMohamed Saleh, Mourad Debbabi. 253-260 [doi]
- A Secure Storage Service for the gLite MiddlewareDiego Scardaci, Giordano Scuderi. 261-266 [doi]
- FPGA/ASIC based Cryptographic Object Store SystemDan Feng, Lanxiang Chen, Lingfang Zeng, Zhongying Niu. 267-272 [doi]
- An Architecture for Privacy Preserving Collaborative Filtering on Web PortalsWaseem Ahmad, Ashfaq A. Khokhar. 273-278 [doi]
- Enforcing Privacy by Means of an Ontology Driven XACML FrameworkDhiah el Diehn I. Abou-Tair, Stefan Berlik, Udo Kelter. 279-284 [doi]
- Addressing privacy issues in CardSpaceWaleed A. Alrodhan, Chris J. Mitchell. 285-291 [doi]
- Second-LSB-Dependent Robust Watermarking for Relational DatabaseXiangrong Xiao, Xingming Sun, Minggang Chen. 292-300 [doi]
- Operational risk: acceptability criteriaDaniel Gideon Dresner, J. Robert (Bob) G. Wood. 301-306 [doi]
- HPRS: A Hybrid P2P Reputation System using File and Peer RatingSrinivasan T., Varun Ramachandran, Arun Vedachalam, S. K. Ghosh. 307-312 [doi]
- Resource Classification Based Negotiation in Web ServicesDiala Abi Haidar, Nora Cuppens-Boulahia, Frédéric Cuppens, Hervé Debar. 313-318 [doi]
- Managing Behaviour Trust in Grids Using Statistical Methods of Quality AssuranceElvis Papalilo, Bernd Freisleben. 319-324 [doi]
- Dynamic Risk Mitigation in Computing InfrastructuresReiko Ann Miura-Ko, Nicholas Bambos. 325-328 [doi]
- Risk management in coalition networksWim Mees. 329-336 [doi]
- On the Definition and Policies of ConfidentialityJohs Hansen Hammer, Gerardo Schneider. 337-342 [doi]
- Enhanced Availability and Security by Rate Control Using Extended Policy Framework in SELinuxPravin Shinde, Priyanka Sharma, Srinivas Guntupalli. 343-348 [doi]
- CCARCH: Architecting Common Criteria Security RequirementsJose Romero-Mariona, Hadar Ziv, Debra J. Richardson. 349-356 [doi]
- Organized Anonymous AgentsMartijn Warnier, Frances M. T. Brazier. 357-362 [doi]
- Comparing the Trust and Security Models of Mobile AgentsMichail Fragkakis, Nikos Alexandris. 363-368 [doi]
- Program Fragmentation as a Metamorphic Software ProtectionBobby D. Birrer, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Robert W. Bennington. 369-374 [doi]
- Accurate Application-Specific Sandboxing for Win32/Intel BinariesWei Li, Lap-Chung Lam, Tzi-cker Chiueh. 375-382 [doi]
- Computational Forensics: Towards Hybrid-Intelligent Crime InvestigationKatrin Franke, Sargur N. Srihari. 383-386 [doi]
- Shoeprint Image Retrieval Based on Local Image FeaturesDanny Crookes, H. Su, Ahmed Bouridane, Mourad Gueham. 387-392 [doi]
- Statistical Disk Cluster Classification for File CarvingCor J. Veenman. 393-398 [doi]
- Application of Language Models to Suspect Prioritisation and Suspect Likelihood in Serial CrimesRichard Bache, Fabio Crestani, David Canter, Donna Youngs. 399-404 [doi]
- Improving the Efficiency of Digital Forensic Search by Means of the Constrained Edit DistanceSlobodan Petrovic, Katrin Franke. 405-410 [doi]
- Information-theoretical comparison of likelihood ratio methods of forensic evidence evaluationDaniel Ramos, Joaquin Gonzalez-Rodriguez, Grzegorz Zadora, Janina Zieba-Palus, Colin Aitken. 411-416 [doi]
- Study of structural features of handwritten grapheme ‘th’ for writer identificationVladimir Pervouchine, Graham Leedham. 417-422 [doi]
- Generative Models for Fingerprint Individuality using Ridge TypesGang Fang, Sargur N. Srihari, Harish Srinivasan. 423-428 [doi]
- Craniofacial Superimposition in Forensic Identification using Genetic AlgorithmsLucia Ballerini, Oscar Cordón, Sergio Damas, Jose Santamaría, Inmaculada Aleman, Miguel Botella. 429-434 [doi]
- The Influence of Frame Length on Speaker Identification PerformanceDonato Impedovo, Mario Refice. 435-438 [doi]
- On Periodic Properties of Interpolation and Their Application To Image AuthenticationBabak Mahdian, Stanislav Saic. 439-446 [doi]
- Detection of Hidden Information in Webpages Based on RandomnessJunwei Huang, Xingming Sun, Huajun Huang, Gang Luo. 447-452 [doi]
- A Weighted Stego Image Detector for Sequential LSB ReplacementAndrew D. Ker. 453-456 [doi]
- A Framework for Design and Analysis of Asymmetric Fingerprinting ProtocolsGeong Sen Poh, Keith M. Martin. 457-461 [doi]
- An Analysis of Database Watermarking SecurityJulien Lafaye. 462-467 [doi]
- A New Data Hiding Scheme with Quality Control for Binary Images Using Block ParityM. Venkatesan, P. Meenakshi Devi, K. Duraiswamy, K. Thiagarajah. 468-471 [doi]
- Metrics-based Evaluation of Slicing ObfuscationsAnirban Majumdar, Stephen Drape, Clark D. Thomborson. 472-477 [doi]
- Structural Digital Signature and Semi-Fragile Fingerprinting for Image Authentication in Wavelet DomainYan Zhu, Chang-Tsun Li, Hong-Jia Zhao. 478-483 [doi]
- A novel anti-collusion coding scheme tailored to track linear collusionsKannan Karthik, Dimitrios Hatzinakos. 484-489 [doi]
- Research on Steganalysis for Text Steganography Based on Font FormatLingyun Xiang, Xingming Sun, Gang Luo, Can Gan. 490-495 [doi]
- Protection of Mammograms Using Blind Steganography and WatermarkingYue Li, Chang-Tsun Li, Chia-Hung Wei. 496-500 [doi]