Abstract is missing.
- Ensuring Dependability in Service Oriented ComputingRune Gustavsson. 3-11
- A Framework for the User-Oriented Personal Information ProtectionKenichi Takahashi, Kouichi Sakurai. 12-19
- A Semiformal Approach to the Security Problem of the Target of Evaluation (TOE) ModelingAndrzej Bialas. 19-25
- Novel Attack Detection Using Fuzzy Logic and Data MiningNorbik Bashah Idris, Bharanidharan Shanmugam. 26-31
- Custom Plugin - A Solution to Phishing and Pharming AttacksOmer Mahmood. 32-37
- The Fault Detecting Method for Supporting SLA Fault Metrics of IPTV ServiceEunjin Ko, Yongsun Ryu, Gilhaeng Lee, Youngsun Kim. 38-43
- SPS-VN: Research on the Security Policy System for Virtual NetworkGuannan Gong, Liang Hu, Kuo Zhao, Jinxin He, Yuefeng Xu, Ying Duan. 44-47
- The Information Security Guideline for SMEs in KoreaGang Shin Lee, Mi Hyun Ahn, Ho-Seong Kim, Jae-il Lee. 48-56
- A Survey of Unimodal Biometric MethodsShahram Latifi, Nimalan Solayappan. 57-63
- A New Robust and Secure Steganographic System for Greyscale ImagesHesham Elzouka. 64-71
- Security Requirements for Multimodal Biometric SystemsKevin Daimi, Katherine Snyder. 72-77
- A Proposal of One-Time Biometric AuthenticationYoshifumi Ueshige, Kouichi Sakurai. 78-83
- Case Study: An Implementation of a Secure Steganographic SystemXuan-Hien Dang, Krishna C. S. Kota. 84-90
- Using Synthetic Decoys to Digitally Watermark Personally-Identifying Data and to Promote Data SecurityJonathan White, Dale Thompson. 91-99
- The Analyses of Key Stroke Timings using Self Organizing Maps and its Application to AuthenticationHiroshi Dozono, Yoshio Noguchi, Masanori Nakakuni, Hisao Tokushima. 100-105
- A Study on DRM System for On/Off Line Key AuthenticationKun-Won Jang, Chan-Kil Park, Jung-jae Kim, Moon-Seog Jun. 106-111
- MRAS: A Multi-Layered Remote Authentication SystemWilfrid Mirville, Jamie Kobie, Michael Nelson. 112-117
- A New Approach For Source Authentication Of Multicast DataJinxin He, Gaochao Xu, Zhiguo Zhou, Guannan Gong. 118-121
- Efficient and Secure Authentication Protocols for Mobile VoIP CommunicationsHuang-Ju Chen, Jyh-Ming Huang, Lei Wang. 122-128
- A New Secure Authentication Scheme Based Threshold ECDSA For Wireless Sensor NetworkHao Wang, Zhongfu Wu, Xin Tan. 129-133
- Security Analysis of the Digital Transmission Copy Protection SpecificationHaibo Tian, YuMin Wang. 134-137
- An ID-based Anonymous Proxy Signature From Bilinear PairingsZemao Zhao, Xiangxong Tang, Bin Li, Longhai Zhu. 138-144
- Cryptcoding - Encryption and Error-Correction Coding in a Single StepDanilo Gligoroski, Svein J. Knapskog, Suzana Andova. 145-151
- Finding Minimum Optimal Path Securely Using Homomorphic Encryption Schemes in Computer NetworksLevent Ertaul, Vaidehi Kedlaya. 152-158
- Pairing-Based Multi-Recipient Public Key EncryptionLi Lu, Lei Hu. 159-165
- Enhanced Group Key Generation ProtocolSunghyuck Hong, Noé Lopez-Benitez. 166-171
- Mobile Agent SecurityLevent Ertaul, Jayalalitha Panda. 172-178
- Secret Key Leakage Caused by Hamming-weight Timing Analysis on Modular ExponentiationMykola Karpinskyy, Lesya Vasylkiv, Marcin Gizycki. 179-185
- Flexible Cryptographic Component Design for Secure Web ApplicationsTae-Ho Kim, Jong Jin Kim, Chang Hoon Kim, Chun-Pyo Hong. 186-192
- FireCrocodile: A Checker for Static Firewall ConfigurationsNorbert Lehmann, Reinhard Schwarz, Jörg Keller. 193-199
- Agent-based Distributed Intrusion Detection Methodology for MANETsHongmei Deng, Roger Xu, Frank Zhang, Chiman Kwan, Leonard Haynes. 200-206
- Gibraltar: A Mobile Host-Based Intrusion Protection SystemGrant A. Jacoby, Thadeus Hickman, Stuart Warders, Barak Griffin, Aaron Darensburg, Daniel Castle. 207-212
- Firewall Rules AnalysisThawatchai Chomsiri, Chotipat Pornavalai. 213-219
- Connputer - A Framework of Intrusion-Free Secure Computer ArchitectureShuangbao Wang, Fengjing Shao, Robert S. Ledley. 220-225
- Design and Implementation of a High-Performance Active Network Security SystemWen Ouyang, Kun-Ming Yu, Wen-Ping Lee. 226-232
- Session Based Logging (SBL) for IP-Traceback on Network ForensicsOmer Demir, Ping Ji, Jinwoo Kim. 233-239
- Network Intrusion Detection System with Data MartRichard Wasniowski. 240-244
- Remodeling and Simulation of Intrusion Detection Evaluation DatasetJun Qian, Chao Xu, Meilin Shi. 245-251
- Modelling to Enhance GSM Network SecurityJohnnes Arreymbi. 252-260
- Comparison of Two Sampling-Based Data Collection Mechanisms for Intrusion Detection SystemKuo Zhao, Liang Hu, Guannan Gong, Meng Zhang, Kexin Yang. 261-265
- Integrating the Generalized-Honeycomb-Torus for Sustainable Parking Structures in the Globalizing AgeHsun-Jung Cho, Li-Yen Hsu. 266-271
- Firewall Design: Understandable, Designable and TestableYan-ning Huang, Yong Jiang. 272-278
- Secure E-commerce Protection ProfileAnil Kumar Venkataiahgari, Mourad Debbabi, J. William Atwood. 279-285
- An Efficient Bloom Filter Based Solution for Multiparty Private MatchingPierre K. Y. Lai, Siu-Ming Yiu, K. P. Chow, C. F. Chong, Lucas Chi Kwong Hui. 286-292
- Application of Gaussian Estimation for Devising Reliable Vulnerability Assessment on SIP-based VoIP InfrastructureMohammad Chowdhury, Bon Sy, Rasheed Ahmad. 293-299
- Combining SMTP and HTTP tar Pits to Proactively Reduce SpamJörg Keller, Tobias Eggendorfer. 300-306
- Modeling Role-based Trust and Authority in Open EnvironmentsDongwan Shin. 307-313
- Developing Dual-Surveillance Based Vehicle Security Management with Generalized Honeycomb ToriLi-Yen Hsu, Shin-Shin Kao. 314-320
- Using Aspects and Compilation Techniques to Dynamically Manage ApplicationsBernard Kaddour, Joël Quinqueton. 321-327
- Acoustic Surveillance of Physically Unmodified PCsMichael LeMay, Jack Tan. 328-334
- Software Vaccine Technique and Its Application in Early VirusXiaodong Yuan, Dajiong Yue. 335-340
- On Achieving Trustworthy SOA-Based Web ServicesJianwu Zheng, Mingsheng Liu, Hui Liu. 341-350
- Adaptive Security Metrics for Computer SystemsSatish Baddelpeli, Gregory Vert. 351-356
- Architectural Framework Design for Authentication Mechanism in Mobile Adhoc Networks (MANETs)Rajasekhar Yakkali, Gregory Vert. 357-363
- An Enhanced Pretty Good Privacy (EPGP) System with Mutual Non-RepudiationGregory Vert, Manaf Alfize. 364-370
- User Interface Design of the Interactive Fingerprint Recognition (INFIR) SystemSara Nasser, Sergiu Dascalu, Gregory Vert. 371-377
- Optical Wireless: Chromatic Encoded Visual Data TransferArthur Reloj, Gregory Vert. 378-383
- Secure Simultaneous Search of Distributed, Heterogeneous Bioinformatics DatabasesGregory Vert, Nic Herndon. 384-389
- Role Based Access Control and the JXTA Peer-to-Peer FrameworkAmit Mathur, Suneuy Kim, Mark Stamp. 390-398
- Do No Harm: The Use of RFID Tags in a Medical EnvironmentChristopher Bolan. 399-403
- Data Security and wireless networks: mutually exclusive?Andrew Woodward. 404-409
- The Insider Threat to Medical Records; Has the Network Age Changed Anything?Craig Valli. 410-414
- The Role of Standards in Medical Information Security: An Opportunity for ImprovementPatricia A. H. Williams. 415-420
- SQL Injection - Threats to Medical Systems: The Issues and CountermeasuresCraig Valli. 421-425
- Security Immunization Using Basic CountermeasuresPatricia A. H. Williams. 426-434
- A Visual Environment for Characterization of State Changes in Computer SystemsGregory Vert, Sergiu M. Dascalu, Frederick C. Harris Jr., Sermsak Buntha. 435-440
- Increasing Security in Mobile Ad Hoc Networks by Incentives to Cooperate and Secure RoutingEbrahim Khosravi, Brandy Tyson. 441-447
- TRINETR: Facilitating Alerts Analysis and Response Decision MakingJinqiao Yu, Y. V. Ramana Reddy, Sumitra Reddy. 448-455
- On Security in TCP/IP over Wireless NetworkShamila Makki, Wunnava V. Subbarao. 456-461
- Conference Key Agrement Protocol Employing a Symmetric Balanced Incomplete Block DesignOkbin Lee, Seongyeol Kim. 462-467
- Mechanism-Based PKI - A Real-Time Key Generation from FingerprintsYoichi Shibata, Masahiro Mimura, Kenta Takahashi, Masakatsu Nishigaki. 468-474
- Keeping An Educational Network Healthy: Differentiating Malicious And Naive Students On An Educational Network EnvironmentCesar Monroy, Rayford B. Vaughn. 475-481
- Stochastic Modeling of Worm Propagation in Trusted NetworksVivek Kumar Sehgal. 482-488
- Reinforcing Access Control Using Fuzzy Relation EquationsAli Berrached, André de Korvin. 489-493
- Framework for realizing Mobile and Computer Communications through Color SignalsRajarshi Sanyal. 494-500
- Securing Collaborative ApplicationsManoj B. Sastry, Michael J. Covington, Deepak J. Manohar. 501-508
- The Value of Hardware-Based Security Solutions and its Architecture for Security Demanding Wireless ServicesRongzhen Yang, Liang He, Shoufeng Yang, Forni Gary, Fei Liu, Jiayue Chang, Manxue Guo. 509-514
- Trusted Storage: Focus on Use CasesRobert Thibadeau, Michael Willett. 515-521
- Risk of Insider Threats in Information Technology Outsourcing: Can Deceptive Techniques be Applied?Pravesh Gaonjur, Chandradeo Bokhoree. 522