Abstract is missing.
- Reliable Process for Security Policy DeploymentStere Preda, Nora Cuppens-Boulahia, Frédéric Cuppens, JoaquÃn GarcÃa-Alfaro, Laurent Toutain. 5-15
- Pragmatic ComputingKecheng Liu. 5
- Utility Computing: Reality and BeyondIvan Ivanov. 7
- SOA WisdomTony C. Shan. 9-10
- Cross-Layer Resource Allocation in Satellite NetworksFranco Davoli. 11
- Recent Trends in the Design of Video Signal Processing IPS and Multimedia SoCsSantanu Dutta. 13
- Future and Challenges of the Security of e-Systems and Computer NetworksMohammad S. Obaidat. 15-16
- A Combinatorics Proliferation Model to Determine the Timing for Blocking Scanning MalwareKazumasa Omote, Takeshi Shimoyama, Satoru Torii. 16-24
- Infrastructures for Authentication, Authorization and Privilege Management Scope, Evaluation and use in the Access-eGov ProjectGünther Pernul. 17
- Practical Secure Biometrics using Set Intersection as a Similarity MeasureDaniel Socek, Dubravko Culibrk, Vladimir Bozovic. 25-32
- On the Effect of Score Equalization in SVM Multimodal Biometric SystemsPascual Ejarque, Javier Hernando. 33-38
- MAIS: Mobile Agent Integrity System - A Security System to IDS based on Autonomous AgentsRafael Páez, Joan Tomà s, Jordi Forné, Miguel Soriano. 41-47
- Implementation and Analysis of a Handwritten Signature Verification TechniqueAlan McCabe, Jarrod Trevathan. 48-58
- Towards User Authentication FlexibilityLaurent Gomez, Ivonne Thomas. 59-66
- Combined Data Mining Approach for Intrusion DetectionUrko Zurutuza, Roberto Uribeetxeberria, E. Azketa, G. Gil, Jesus Lizarraga, Miguel Fernández. 67-73
- Detecting Anomalous Traffic using Statistical Processing and Self-Organizing MapsPaola Baldassarri, Anna Montesanto, Paolo Puliti. 74-79
- An Improved Model for Secure Cryptographic Integrity Verification of Local CodeChristian Payne. 80-84
- Role and Task Based Authorization Management for Process-ViewMei-Yu Wu, Duen-Ren Liu. 85-90
- On the Improvement of Remote Authentication Scheme with Smart CardsLih-Yang Wang, Chao-Chih Chen. 93-97
- Towards a Multi-model Views Security FrameworkLei Xia, Hao Huang, Shuying Yu. 98-101
- An Efficient Intrusion Detection System for Networks with Centralized RoutingPaulo F. Andrade, Fernando Mira da Silva, Carlos Ribeiro. 102-106
- Integrated Right Management for Home Content - A SIM based Right Management Solution for Home NetworksGyörgy Kálmán, Josef Noll. 107-111
- Remote Algorithmic Complexity Attacks against Randomized Hash TablesNoa Bar-Yosef, Avishai Wool. 117-124
- A 3g IMS-based Testbed for Secure Real-Time Audio SessionsPaolo Cennamo, Antonio Fresa, Anton Luca Robustelli, Francesco Toro, Maurizio Longo, Fabio Postiglione. 125-132
- A Query Unit for The IPSec DatabasesAlberto Ferrante, Sathish Chandra, Vincenzo Piuri. 133-139
- Wise Guard - MAC Address Spoofing Detection System for Wireless LANsKai Tao, Jing Li, Srinivas Sampalli. 140-147
- Modified Temporal Key Integrity Protocol for Efficient Wireless Network SecurityM. Razvi Doomun, K. M. Sunjiv Soyjaudah. 151-156
- Practical and Universal Interpretation Functions for SecrecyHanane Houmani, Mohamed Mejri. 157-164
- Identity Based Public Key Exchange (IDPKE) for Wireless Ad Hoc NetworksClare McGrath, Ghazanfar Ali Safdar, Máire McLoone. 167-170
- Mobile Secret Key Distribution with Network CodingPaulo F. Oliveira, Rui A. Costa, João Barros. 171-174
- Secure Service Publishing with Untrusted Registries - Securing Service DiscoverySlim Trabelsi, Yves Roudier. 175-179
- Investigation of Cooperative Defense against DDoSIgor V. Kotenko, Alexander Ulanov. 180-183
- Securing OpenSSL against Micro-Architectural AttacksMarc Joye, Michael Tunstall. 189-196
- Efficient Large-Scale Distributed Key Generation against Burst InterruptionJheng-Ru Ou, Shi-Chun Tsai, Wen-Guey Tzeng. 197-203
- K2: A Stream Cipher Algorithm using Dynamic Feedback ControlShinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai. 204-213
- A More Efficient Convertible Nominative SignatureDennis Y. W. Liu, Shuang Chang, Duncan S. Wong. 214-221
- On the Key-Compromise Impersonation Vulnerability of One-Pass Key Establishment ProtocolsKonstantinos Chalkias, F. Mpaldimtsi, Dimitris Hristu-Varsakelis, George Stephanides. 222-228
- Subquadratic Binary Field Multiplier in Double Polynomial SystemPascal Giorgi, Christophe Nègre, Thomas Plantard. 229-236
- Additive Proofs of Knowledge - A New Notion for Non-Interactive ProofsAmitabh Saxena. 239-244
- Utilizing Social Networking Platforms to Support Public Key InfrastructuresVolker Gruhn, Malte Hülder, Vincent Wolff-Marting. 245-250
- Secure License Management - Management of Digital Object Licenses in a DRM EnvironmentCarlos Serrão, Miguel Sales Dias, Jaime Delgado. 251-256
- Clock Control Sequence Reconstruction in the Generalized Shrinking GeneratorSlobodan Petrovic. 259-262
- An Effective and Secure Watermarking Protocol for Digital Rights Protection over the Second-Hand MarketIbrahim M. Ibrahim, Sherif Hazem Nour El-Din, Abdel Fatah A. Hegazy. 263-268
- The Polynomial Multicomposition Problem in (Z/nZ)Neculai Daniel Stoleru, Victor Valeriu Patriciu. 269-272
- Improving Security in Chaotic Spread Spectrum Communication Systems with a Novel Bit Power Parameter Spectrum MeasureBranislav Jovic, Charles Unsworth. 273-280
- Anonymous Prepaid Content Viewing System with Mobile TerminalToshiyuki Fujisawa, Kazuto Ogawa, Takeshi Kimura, Masaki Inamura, Toshiaki Tanaka. 281-288
- Private Computing with Beehive Organized AgentsBartek Gedrojc, Jan C. A. van der Lubbe, Martin van Hensbergen. 289-294
- A Closer Look at Broadcast Encryption and Traitor Tracing for Content ProtectionHongxia Jin. 295-298
- Mobile Agent Security with Efficient Oblivious TransferWataru Hasegawa, Masakazu Soshi, Atsuko Miyaji. 299-304
- A Provably Secure Multi-Receiver Identity-based Signcryption using Bilinear MapsShivaramakrishnan Narayan, Parampalli Udaya. 305-308
- An Anonymous waterMarking Scheme for Content Distribution Protection using Trusted ComputingAdrian Leung, Geong Sen Poh. 319-326
- Utilizing Extension Character Kashida with Pointed Letters for Arabic Text Digital WatermarkingAdnan Abdul-Aziz Gutub, Lahouari Ghouti, Alaaeldin A. Amin, Talal M. Alkharobi, Mohammad K. Ibrahim. 329-332
- Independent Voter Verifiability for Remote Electronic VotingJordi Puiggali, Victor Morales-Rocha. 333-336
- Using Steganography to Improve Hash Functions Collision ResistanceEmmanouel Kellinis, Konstantinos Papapanagiotou. 337-340
- Secure Computation of Common Data among Malicious PartnersSebastian Obermeier, Stefan Böttcher. 345-354
- Developing a Model and a Tool to Manage the Information Security in Small and Medium EnterprisesLuÃs Enrique Sanchez, Daniel Villafranca, Eduardo Fernández-Medina, Mario Piattini. 355-362
- A High-Level Aspect-Oriented based Language for Software Security HardeningAzzam Mourad, Marc-André Laverdière, Mourad Debbabi. 363-370
- Extensible Access Control Model for XML Document CollectionsGoran Sladic, Branko Milosavljevic, Zora Konjovic. 373-380
- Privacy Preserving k-Means Clustering in Multi-Party EnvironmentSaeed Samet, Ali Miri, Luis Orozco-Barbosa. 381-385
- Dynamic Context-Aware Access Control - Use of Resource Hierarchies to Define Fine-grained, Adaptable Authorization PoliciesAnnett Laube, Laurent Gomez. 386-393
- Securing Healthgrid EnvironmentsChristos Ilioudis, Dimitrios A. Baltatzis, George Pangalos, Christos K. Georgiadis. 394-401
- Practical Verification of Untrusted Terminals using Remote AttestationSimone Lupetti, Gianluca Dini. 402-407
- e-Business Security Design using Process Security Requirements SeptetSharon Nachtigal. 408-413
- A Secure Jailing System for Confining Untrusted ApplicationsGuido van t Noordende, Ãdám Balogh, Rutger F. H. Hofman, Frances M. T. Brazier, Andrew S. Tanenbaum. 414-423
- Implementation and Evaluation of New Illegal Copy Protection - Protection Against Making a Illegal Copy of a CopyMasaki Inamura, Toshiaki Tanaka. 427-432