Abstract is missing.
- A Stochastic Model of the Damage Propagation in Database SystemsHai Wang, Su Yan. 3-9
- Adaptive Risk-Aware Application-Level Access ControlHassan Rasheed, Randy Y. C. Chow. 10-16
- Investigation of Computer Security and Ethics Awareness in University EnvironmentMax M. North, Greg Quinet, Robert Thacker, DeAnthony Perryman, John Crunk, Sarah M. North. 17-21
- Information Security and Threats: A study on E-CommerceMohammed Karim, Mohammad Rahman, Aliar Hossain. 22-27
- A Translation of NIST Security Controls Into DBMS Security Procedures (FISMA Compliance)Michael Pollard, Gejuan Clements, Max M. North, Sarah M. North, Greg Quinet. 28-30
- Detecting Anomalies in Network Traffic with Entropy based MA-RMSE AlgorithmsBreno Silva Pinto, Varin Khera, Lance Fung. 31-36
- An Analysis of Data Protection StrategiesAhmad Ghafarian, Jason Garruto. 37-41
- Steganographic System with Dynamically Reconfigurable StructureGevorg Margarov, Vahan Markarov, Ashot Khachaturov. 43-45
- A New Element in Information Security Process Security Aware Smart Household EmployeeIlze Murane. 46-51
- Advanced Network Traffic Visualization in the Service of Network SecurityPavel MinarÃk, Zdenek Vrbka, Marek Winkler. 52-55
- An organizational pattern for contributing to the deployment of secure Virtual EnterprisesMichel Kamel, Romain Laborde, François Barrère, Abdelmalek Benzekri. 56-61
- A New Practical Scheme for Protecting Web ContentEric Ke Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu. 62-66
- Computer Support of Risk Analysis in Information Technology EnvironmentArtur Rot. 67-71
- Today & Tomorrow: IEEE 802.11 WLAN SecurityLevent Ertaul, Omicel Catambay. 73-77
- New Data Encryption Algorithm and its Implementation for Online User AuthenticationArtan Luma, Bujar Raufi. 81-85
- Analysis of Chinese Remainder Theorem Based Group Key Management ProtocolsRonggong Song, Khalil El-Khatib, Peter Mason. 86-92
- A Performance Comparison of Microsoft SQL Server 2008 Transparent Data Encryption and NetLib EncryptionizerPhillip D. Colbert, Ben A. Juliano. 93-98
- Security Requirements for Scalable IPTV ServicesSeungmin Lee, Jaehoon Nah, Dongil Seo. 99-102
- A Framework for Online Examination Security Based on Cryptology and BiometricsKevin Daimi. 103-112
- An AES-Based Encryption Algorithm with ShufflingAdbelfatah Yahya, Ayman Abdalla. 113-116
- Cryptanalysis of an Identification Scheme Based on the Perceptron Problem using a Hybridization of Deterministic Optimization and Genetic AlgorithmLe Thi Hoai An, Pham Dinh Tao, Sarra Bouallagui. 117-123
- Design and Anlysis of Cryptographically Strong S-Boxes: A Novel ApproachSharma Abhishek Srinivasan, Ravi Mukkamala, K. Venkataramaniah. 124-129
- A Secure Intranet VoIP FrameworkAlessandro Brawerman, Jose W. Bohner Jr., Victor D. Ribeiro. 130-135
- Cryptanalysis of RSA with Constrained Low Public ExponentPing Luo, Haijian Zhou, Daoshun Wang, Yiqi Dai. 136-142
- A Novel And Efficient Algorithm To Enhance The Complexity Of Elliptic Curve CryptographySiddharth Sharma, Akshay Atrey, Saurabh Jain. 143-148
- Metrics for Analysis of Cryptograhic AlgorithmsMani Arora, Poonamjeet Kaur, Nishima Gakhar, Gauravjeet Singh. 149-156
- Cryptanalysis of Finite Automata Public Key CryptosystemsGevorg Margarov, Siranush Chopuryan, Yeghisabet Alaverdyan. 157-161
- Optical Encryption with Jigsaw Transform using MatlabLeidy Marcela Giraldo Castano, Edward Yesid Villegas Pulgarin. 162-165
- Design of a Cryptographic Software for Wireless Network SecurityRobert Okonigene, Isimhemen Oborkhale. 166-169
- Prevention of ATM Fraud Using F-PINJoon Park, Yasir Shaikh, Rohit Mahajan. 173-178
- A Practical SMS-based Mutual Authentication Protocol for Secure Online BankingEric Ke Wang, Yi Jun He, Lucas Chi Kwong Hui, Siu-Ming Yiu. 179-183
- Differentiated Services to Provide Efficient Node Authentication in VANETsPino Caballero-Gil, Candelaria Hernández-Goya, Amparo Fúster-Sabater. 184-187
- A Shoulder-Surfing-Resistant Image-Based Authentication System with Temporal Indirect Image SelectionTakumi Yamamoto, Yuko Kojima, Masakatsu Nishigaki. 188-194
- Study of Biometric Authentication Method Using Behavior Characteristics on Game ConsolesHiroshi Dozono, Masanori Nakakuni, Takayuki Inoue, Hidetaka Nozaki. 195-200
- Usage Control in Conditional Access System with malicious Set-top BoxYong-Zhong He, Zhen Han, Huirong Fu. 201-205
- Secure Authentication Using Visual CryptographyNaveen Kumar. 206-210
- Fingerprint Biometric Solution for Securely Secret SharingGevorg Margarov, Maha Tolba. 211-213
- Conditional Access Systems for Internet Content ProtectionStella C. Chiemeke, Olumide B. Longe. 214-219
- An Agent-Based Single Sign-On Scheme for Web Services EnvironmentsWoei-Jiunn Tsaur, You-Mine Lin. 220-226
- RFID Authentication Protocol Conforming to EPC Class-1 Generation-2 StandardGuiyue Jin, Eun Young Jeong, Ho-Youl Jung, Ki-Dong Lee. 227-231
- An Effective Method for Revocable Biometric Key GenerationSunil V. K. Gaddam, Manohar Lal. 232-237
- A Secure Certificate for Secure Group CommunicationSunghyuck Hong. 238-240
- Authentication Practices At The User Interface: Vulnerability Of Users And Organizations In NigeriaVeronica Akwukwuma, Annie Egwali. 241-247
- Realistic Approach against Worm Attack on Computer Networks by Emulating Human Immune SystemOssama Toutonji, Seong-Moo Yoo. 251-257
- Denial of Service Attack Resilience on Area Expanded WLAN ServicesRyu Watanabe, Toshiaki Tanaka. 258-264
- Simplified Single Packet AuthorizationRichard Lundeen, Charles Burns. 265-270
- Artificial Neural Network for IDS SolutionFarah Barika, Karim Hadjar, Nabil El-Kadhi. 271-277
- Validation of the Specification Means Ontology on the Simple Firewall CaseAndrzej Bialas. 278-284
- An Intrusion Detection System for Mobile Ad-Hoc NetworksCharlie Obimbo. 285-290
- A Database Firewall Server Using Data MaskingEun-Ae Cho, Chang-Joo Moon, Dae-Ha Park, Jeong-Oog Lee, Doo-Kwon Baik. 291-296
- Data Mining and Anonymous Opt-outSamuel Shepard, Larry Dunning Dunning, Ray Kresman. 297-303
- Two Efficient Proxy Signature Schemes for Delegation Chains with Nonrepudiation and UntraceabilityStarsky H. Y. Wong, Zoe L. Jiang, Lucas Chi Kwong Hui, Siu-Ming Yiu. 307-313
- A Tripartite Strong Designated Verifier Scheme Based On Threshold RSA SignaturesJerome Dossogne, Olivier Markowitch. 314-317
- Intelligent Anti-Internet Worm Automatically Detect and Update Signatures ServerMohammad M. Rasheed, Norita Norwawi, Mohammed M. Kadhum, Osman Ghazali. 318-322
- Bilinear-pairings Based Designated-verifier Threshold Proxy Signature SchemeQingshui Xue, Fengying Li, Yuan Zhou, Jiping Zhang, Zhenfu Cao, Haifeng Qian. 323-327
- Cloud Net-Booting Beyond BIOS Using the Unified Extensible Firmware InterfaceVincent Zimmer. 331-339
- A Secure Multi-Provider OSGi Platform Enabling Process-Isolation by Using DistributionTobias Wegner. 340-345
- Security Level Determination Using Branes for Contextual Based Global Processing: An ArchitectureGreg Vert, Evangelos Triantaphyllou. 346-350
- Access Control Beyond BIOS Using the Unified Extensible Firmware InterfaceVincent Zimmer. 351-359
- Evaluation of Secure Routing Protocols in Mobile Ad Hoc Networks (MANETs)Levent Ertaul, Dilraba Ibrahim. 363-369
- Analysis of RFID Authentication Protocols Based on Static and Dynamic Shared SecretXiaowen Zhang, Qinghai Gao, Mohamed Saad. 370-376
- A Service Framework based on Grades of IdPs and SPsSato Hiroyuki. 379-385
- Design Considerations for a Cyber Incident Mission Impact Assessment (CIMIA) ProcessMichael R. Grimaila, Larry Fortson, Janet Sutton. 386-391
- USB Data leakage prevention Using hardware based data inspection techniqueDongHo Kang, BoHeung Jung, KyoungSon Jhang, Kiyoung Kim. 392-396
- Incremental Information Flow Analysis of Role Based Access ControlMikhail I. Gofman, Ruiqi Luo, Jian He, Yingbin Zhang, Ping Yang. 397-403
- Location Contexts in Role-based Security Policy EnforcementRattikorn Hewett, Phongphun Kijsanayothin. 404-410
- Securing the Environment: A Methodology for Weighting and Analyzing Attack GraphsFrancis Manning. 411-416
- Multi-region based Clustering Analysis Method for Unknown Malicious Code DetectionByoung-Koo Kim, Seungyong Yoon, Ikkyun Kim, Jintae Oh. 417-422
- Tamper Detection and Localization for Categorical Data Using Fragile Watermarks for Multi Owner DatabasesKanaka Rajanala, Huiping Guo, Chengyu Sun. 423-428
- The Stability of Trapdoor One Way Function Based on Finite AutomataSiranush Chopuryan. 429-433
- Ontology Driven Security for Mobile ApplicationsNabil El-Kadhi, Sofien Beji. 434-440
- Security Metrics-Review and Research DirectionsGuillermo Francia III, Suprasith Jarupathirun. 441-446
- Artificial Neural Networks as a Tool for Identifying Image SpamPriscilla Hope, Jason Bowling, Kathy Liszka. 447-451
- Abnormal Traffcic Detection using Flow-based Traffic Measuring SchemeSeungyong Yoon, Byoung-Koo Kim, Hwashin Moon, Ikkyun Kim, Jintae Oh. 452-456
- Digital ID Wallet: Provide Selective Disclosure and Users Control of Identity InformationSeung-Hyun Kim, Daeseon Choi, Seung Hun Jin. 457-462
- Phishpin: An Integrated Anti-Phishing FrameworkHicham Tout, William Hafner, Wei Li, Easwar A. Nyshadham. 463-468
- Split-DFA (SDFA) for Scalable Pattern Matching in Network SecurityLucas Vespa, Ning Weng. 469-474
- Visualization for Rapid Assessment and Projection in Cyber Situational AwarenessRobert F. Erbacher. 475-480
- A Multi-secret Sharing Scheme in an Access StructureYe Liu, Zhihui Li, Rui Guo. 481-484
- Rule-Based Auditing System for Security Assurance in Ubiquitous ComputingSungdo Park, Bokman Jang, Hyokyung Chang, Bong-hoi Kim, Eui-in Choi. 485-489
- A Framework for Building and Managing Secured ERP LandscapeAnton Romanov, Eiji Okamoto. 490-495
- Multiple Watermarking for Relational DataMadhavi Nidamarthy, Huiping Guo, Chengyu Sun. 496-500
- A Matter of Trust: Studies of Organizational Systems of Justice Perceptions on Attitudes about Corporate SurveillanceMichael Workman. 501-508
- Increasing Security Awareness: Designing a Socially Engineered E-mail WormErlo Meister, Elmarie Biermann. 509-514
- Using a Statistical Approach for Optimal Security Parameter DeterminationAnand Singh, David J. Lilja. 515-520
- On the Randomness and Regularity of Reduced Edon-R Compression FunctionRune Steinsmo Odegard, Danilo Gligoroski. 521-525
- Improving the Client Security Using the Smart Card and Trusted ServerHossein Rezaei Ghaleh, Mohammad-Ali Doostari. 529-534
- The Detection and Response Mechanism against Abnormal Traffic Attack in ATN NetworkSeung-Hee Oh, Deok-Gyu Lee, Jong-Wook Han, Jong Hyuk Park. 535-540
- Fingerprint Based Secure Authentication Protocol using OTP in e-BankingWan S. Yi, Woong Go, Soo-Kyun Kim, Dongho Won, Jin Kwak. 541-546
- Security and Efficiency Analyses of Security Mechanisms in e-Passport SystemsWan S. Yi, Dongbum Lee, Sang-Soo Yeo, Dongho Won, Jin Kwak. 547-553
- On the Security and Efficiency of Secure Channel Coding Schemes Based on Punctured CodesAli Akbar Sobhi Afshar, Alireza Sharifi, Taraneh Eghlidos. 557-562
- Biometric Fuzzy Extractor Scheme for Iris TemplatesFernando Hernandez Alvarez, Luis Hernández Encinas, Carmen Sanchez-Avila. 563-569
- A Study on Multi-Resipient Encryptions for Selective DisclosureYasuo Hatano, Kunihiko Miyazaki, Toshinobu Kaneko. 570-575
- Graphic Multisecret Sharing Schemes with One-Dimensional Cellular AutomataRaul Duran Diaz, Fernando Hernandez Alvarez, Luis Hernández Encinas. 576-582
- On the use of Continued Fractions for Stream CiphersAmadou Moctar Kane. 583-589
- Tantra: A Fast PRNG Algorithm and its ImplementationMahadevan Gomathisankaran, Ruby Lee. 593-598
- The Development of a Security Engineering Course at Tuskegee UniversityMuhammad Ali, Deepthi Jangum. 599-602
- Specialized Solutions for Improvement of Firewall Performance and Conformity to Security PolicyVladimir S. Zaborovsky, Anton Titov. 603-608
- Fun & Games: An Introduction to Console ForensicsPeter Hannay. 609-612
- SCADA Security - Slowly Circling a Disaster AreaCraig Valli, Andrew Woodward. 613-617
- Snort IDS for SCADA NetworksCraig Valli. 618-621
- Do Current BitTorrent Clients Running on Windows 7 Beta Leave Behind Meaningful Data?Andrew Woodward. 622-617
- Selecting Trust Peers Based on Updated Credit Value in Peer-to-Peer NetworksLei Hou, Hai-Xin Duan, Jianping Wu. 628-634
- Firewire Forensics in Modern Operating SystemsPeter Hannay, Andrew Woodward. 635-638
- Data Protection in Object-based Storage DevicesZhiqian Xu, Hai Jiang. 639-644
- Detection of Specific Semantic Functionalities, such as Self-Replication Mechanism, in Malware Using Colored Petri NetsArnur G. Tokhtabayev, Victor A. Skormin, Andrey Dolgikh, Mamirbek Beisenbi, Moldir Kargaldayeva. 645-651
- A modified Knuth-Morris-Pratt Algorithm for Zero-day Polymorphic Worms DetectionMohssen M. Z. E. Mohammed, H. Anthony Chan, Neco Ventura, Mohsin Hashim, Izzeldin Amin. 652-657
- Proposed New Quantum Cryptography System Using Quantum Description Techniques for Generated CurvesHala Bahjat Abdul Wahab, Abdul Monem Rahma, Hilal M. Yousif Al-Bayatti. 658-664
- Self Generating Multi Keys Cryptosystem Model for Non-Invertible Matrices based on Hill CipherMousa Farajallah, Rushdi Hamamreh. 665-672