Abstract is missing.
- Model-Based Security EngineeringJan Jürjens.
- E-Business Strategy - Charting a Way through Uncertain Waters of Electronic CommerceDavid A. Marca.
- Redefining the Market Place: Only the Numbers are Different?Thomas Greene.
- Project Management for E-Business Initiatives . Project Framework, Proven Practices, Coordinated Work, Focused Sub-TeamsDavid A. Marca.
- IT Security Forensics: Promises and ShortcomingsManu Malek.
- Advances in Speech and Audio Coding and its Applications for Mobile MultimediaAnisse Taleb.
- Multimedia Representation in MPEG Standards: Achievements and ChallengesFernando Pereira.
- Wireless Communications, a new Emphasis for Effective Use of the Radio SpectrumLes Barclay.
- Security Enhancement for a Low Computation Cost User Authentication SchemeBehnam Sattarzadeh, Mahdi Asadpour, Rasool Jalili. 5-8
- The SECUREPHONE - A Mobile Phone with Biometric Authentication and e-Signature Support for Dealing Secure Transactions on the FlyR. Ricci, Gérard Chollet, M. V. Crispino, S. Jassim, Jacques C. Koreman, Andrew C. Morris, M. Olivar-Dimas, Sonia Garcia-Salicetti, Pedro Soria-Rodriguez. 9-16
- Person Verification by Fusion of Prosodic, Voice Spectral and Facial ParametersJavier Hernando, Mireia Farrús, Pascual Ejarque, Ainara Garde, Jordi Luque. 17-23
- Comparative Study between Bayesian Network and Possibilistic Network in Intrusion DetectionNajla Arfaoui, Farah Jemili, Montaceur Zaghdoud, Mohamed Ben Ahmed. 24-31
- Intrusion Detection for Web Applications (Short Version)Nathalie Dagorn. 32-39
- Spoofed ARP Packets Detection in Switched LAN NetworksZouheir Trabelsi, Khaled Shuaib. 40-47
- Evaluation of the Intrusion Detection Capabilities and Performance of a Security Operation CenterAbdoul Karim Ganame, Julien Bourgeois, Renaud Bidou, François Spies. 48-55
- Workload Hidden Markov Model for Anomaly DetectionJuan Manuel García, Tomás Navarrete, Carlos Orozco. 56-59
- Using Attack Graphs in Ad Hoc Networks - For Intrusion Prediction Correlation and DetectionMarianne Azer, Sherif El-Kassas, Magdi M. S. El-Soudani. 63-68
- Quantitative Analysis and Enforcement of the Principle of Least Privilege in Role-BasedChunren Lai, Chang N. Zhang. 69-74
- On the Self-Similarity of the 1999 DARPA/Lincoln Laboratory Evaluation DataKun Huang, Dafang Zhang. 75-79
- Access Control and Joint Management for Collaborative Peer GroupsWenhua Qi. 83-86
- Protecting Adaptive Multimedia Delivery and Adaptation Using Proxy Based ApproachAhmed Reda Kaced, Jean-Claude Moissinac. 87-90
- Digital Pseudonym Identity for E-CommerceRafael Martínez-Peláez, Francisco Rico-Novella, Luis A. Zarza-López. 91-94
- A Challenging but Feasible Blockwise-Adaptive Chosen-Plaintext Attack on SSLGregory V. Bard. 99-109
- Internet Routing Security: An Approach to Detect and to React to Incorrect AdvertisementsInes Feki, Xiaoli Zheng, Mohammed Achemlal, Ahmed Serhrouchni. 110-117
- Layered Architecture for Secure E-Commerce ApplicationsAmir Herzberg, Igal Yoffe. 118-125
- Trust Management without Reputation in P2P GamesAdam Wierzbicki. 126-134
- Protecting Cipher Block Chaining Against Adaptive Chosen Plaintext AttackChuan-Wen Loe, Khoongming Khoo. 135-140
- Forward-Secure Authenticated-Encryption in Multi-Receiver SettingKan Yasuda, Kazumaro Aoki, Eiichiro Fujisaki, Atsushi Fujioka. 141-148
- On the Design of a Low-Rate DoS Attack Against Iterative ServersGabriel Maciá-Fernández, Jesús E. Díaz-Verdejo, Pedro Garcia-Teodoro. 149-156
- Secure Access Modules for Identity Protection over the EAP-TLS - Smartcard Benefits for User Anonymity in Wireless InfrastructuresPascal Urien, Mohamad Badra. 157-163
- A Service Discovery Threat Model for Ad Hoc NetworksAdrian Leung, Chris J. Mitchell. 167-174
- Action-Triggered Public-Key System for GSM Using RSA with Phone-Dependent EncryptionRehab K. El Nemr, Imane Aly Saroit Ismail, S. H. Ahmed. 175-182
- Security Considerations in Current VoIP ProtocolsSteffen Fries. 183-191
- A DoS Attack Against the Integrity-Less ESP (IPSEC)Ventzislav Nikov. 192-199
- Combination of a Smartcard E-Purse and E-Coin to Make Electronic Payments on the InternetAntonio Ruiz-Martínez, Antonio F. Gómez-Skarmeta, Óscar Cánovas Reverte. 203-206
- Achieving Unconditional Security in Existing Networks Using Quantum CryptographyStefan Rass, Mohamed Ali Sfaxi, Solange Ghernaouti-Helie. 207-210
- Protocol Independent Lightweight Secure CommunicationM. Amaç Güvensan, A. Gökhan Yavuz. 211-217
- Traitor Tracing for Subscription-Based SystemsHongxia Jin, Jeffrey B. Lotspiech, Mario Blaum. 223-228
- Digital Object Rights Management - Interoperable Client-side DRM MiddlewareCarlos Serrão, Miguel Dias, Jaime Delgado. 229-236
- Efficient All-or-Nothing Encryption Using CTR ModeRobert P. McEvoy, Colin C. Murphy. 237-245
- Proposals for Iterated Hash FunctionsLars R. Knudsen, Søren S. Thomsen. 246-253
- Parallel Multiplication in F2n Using Condensed Matrix RepresentationChristophe Nègre. 254-259
- Chosen-IV Statistical Attacks on eStream CiphersMarkku-Juhani Olavi Saarinen. 260-266
- Digital Contract Signature Scheme Based on Multiple CryptosystemWang Lianhai, Manu Malek. 267-274
- Private Bidding for Mobile AgentsBartek Gedrojc, Kathy Cartrysse, Jan C. A. van der Lubbe. 277-282
- An Infinite Phase-Size BMAP/M/1 Queue and its Application to Secure Group CommunicationHiroshi Toyoizumi. 283-288
- On Use of Identity-Based Encryption for Secure EmailingChristian Veigner, Chunming Rong. 289-296
- More Robust Private InformationChun-Hua Chen, Gwoboa Horng. 297-302
- An Algorithm for Authentication of Digital ImagesDumitru Dan Burdescu, Liana Stanescu. 303-308
- Using OMA DRM 2.0 Protected Content - Ogg Vorbis Protected Audio under Symbian OSFrancisco Pimenta, Carlos Serrão. 311-315
- Design of Cryptographic Protocols by Means of Genetic Algorithms TechniquesLuis Zarza, Josep Pegueroles, Miguel Soriano, Rafael Martínez. 316-319
- Finite Field Multiplication in Lagrange Representation Using Fast Fourrier TransformChristophe Nègre. 320-323
- JASTEG2000 - Steganography for JPEG2000 Coded ImagesDomenico Introna, Francescomaria Marino. 329-336
- Network Security Evaluation Based on Simulation of Malfactor s BehaviorIgor V. Kotenko, Mikhail Stepashkin. 339-344
- Smooth Blocks-Based Blind Watermarking Algorithm in Compressed DCT DomainChun Qi, Haitao Zhou, Bin Long. 347-350
- Least Privilege in Separation KernelsTimothy E. Levin, Cynthia E. Irvine, Thuy D. Nguyen. 355-362
- Collaboration Security for Modern Information SystemsRichard Whittaker, Gonzalo Argote-Garcia, Peter J. Clarke, Raimund K. Ege. 363-370
- Inter-Node Relationship Labeling: A Fine-Grained XML Access Control Implementation Using Generic Security LabelsZheng Zhang, Walid Rjaibi. 371-378
- Using Microsoft Office Infopath to Generate XACML PoliciesManuel Sánchez, Gabriel López, Antonio F. Gómez-Skarmeta, Óscar Cánovas Reverte. 379-386
- Secure Online English AuctionsJarrod Trevathan, Wayne Read. 387-396
- Flexible License Transfer System Using Mobile TerminalMasaki Inamura, Toshiaki Tanaka, Toshiyuki Fujisawa, Kazuto Ogawa, Takeshi Kimura. 397-404
- Extending XML Signature and Applying it to Web Page SigningTakahito Tsukuba, Kenichiro Noguchi. 407-412
- Securing Web Services Using Identity-Based Encryption (IBE)Kari Anne Haaland, Chunming Rong. 413-418
- Defining Viewpoints for Security Architectural PatternsDavid G. Rosado, Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini. 419-424
- Security Risk Analysis in Web Services SystemsCarlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini. 425-430
- Design and Implementation of a Practical Secure Distributed Healthcare ApplicationZaobin Gan, Vijay Varadharajan. 431-436
- Improving Software Security Through an Integrated ApproachZaobin Gan, Dengwei Wei, Vijay Varadharajan. 437-442
- A New (t, n) Multi-Secret Sharing Scheme Based on Linear AlgebraSeyed Hamed Hassani, Mohammad Reza Aref. 443-449
- Undesirable and Fraudulent Behaviour in Online AuctionsJarrod Trevathan, Wayne Read. 450-458
- Modelling E-Business Security Using Business ProcessesSharon Nachtigal, Chris J. Mitchell. 459-464
- Secure Information Systems Development - Based on a Security Requirements Engineering ProcessDaniel Mellado, Eduardo Fernández-Medina, Mario Piattini. 467-470
- An Extended Role-Based Access Control for Web ServicesYi-qun Zhu, Jianhua Li, Quan-hai Zhang. 471-474