Abstract is missing.
- A Formal Comparison of the Bell & LaPadula and RBAC ModelsLionel Habib, Mathieu Jaume, Charles Morisset. 3-8 [doi]
- Threshold Proxy Signature Scheme with Strong Real-Time EfficiencyXiaoming Wang, Huoyan Chen. 9-14 [doi]
- A Purchase Protocol with Live Cardholder Authentication for Online Credit Card PaymentHannan Xiao, Bruce Christianson, Ying Zhang. 15-20 [doi]
- Comparison and Evaluation of Identity Management in Three Architectures for Virtual OrganizationsAli Nasrat Haidar, Ali E. Abdallah. 21-26 [doi]
- Speaker Identification by Multi-Frame Generative ModelsDonato Impedovo, Mario Refice. 27-32 [doi]
- Integrating Delegation with the Formal Core RBAC ModelAli E. Abdallah, Hassan Takabi. 33-36 [doi]
- Security Analysis of Temporal-RBAC Using Timed AutomataSamrat Mondal, Shamik Sural. 37-40 [doi]
- Secure Hybrid Group Key Management for Hierarchical Self-Organizing Sensor NetworkShu Yun Lim, Meng-Hui Lim, Sanggon Lee, Hoonjae Lee. 43-49 [doi]
- PHAL-256 - Parameterized Hash AlgorithmPrzemyslaw Rodwald, Janusz Stoklosa. 50-55 [doi]
- Steganography in TextilesSajad Shirali-Shahreza, Mohammad Shirali-Shahreza. 56-61 [doi]
- Persian/Arabic Unicode Text SteganographyMohammad Shirali-Shahreza, Sajad Shirali-Shahreza. 62-66 [doi]
- Efficient Hierarchical Group-Oriented Key Establishment and DecryptionSigurd Eskeland, Vladimir A. Oleshchuk. 67-72 [doi]
- Forward-Secure Proxy Signature Scheme for Multiple Proxy Signers Using Bellare-Miner Scheme with Proxy RevocationN. R. Sunitha, B. B. Amberker. 73-78 [doi]
- Data Hiding in Non-Expansion Visual Cryptography Based on Edge Enhancement MultitoningHao Luo, Fa-Xin Yu, Jeng-Shyang Pan. 79-82 [doi]
- Skin Segmentation Using Color Distance Map and Water-Flow PropertyMohammad Abdullah-Al-Wadud, Oksam Chae. 83-88 [doi]
- An Implementation Infrastructure for Server-Passive Timed-Release CryptographyKonstantinos Chalkias, Foteini Baldimtsi, Dimitrios Hristu-Varsakelis, George Stephanides. 89-94 [doi]
- A Group Key Agreement Scheme RevisitedZhengjun Cao, Lihua Liu. 95-98 [doi]
- Secure E-Passport Protocol Using Elliptic Curve Diffie-Hellman Key Agreement ProtocolMohamed Abid, Hossam Afifi. 99-102 [doi]
- A Server Based ASR Approach to Automated Cryptanalysis of Two Time Pads in Case of SpeechLiaqat Ali Khan, Muhammad Shamim Baig. 103-107 [doi]
- Dynamic Substitution ModelMohamed Abo El-Fotouh, Klaus Diepold. 108-111 [doi]
- Data Fusion Assurance for the Kalman Filter in Uncertain NetworksBonnie Zhu, Shankar Sastry. 115-119 [doi]
- A Time and Storage Efficient Solution to Remote File Integrity CheckA. V. Sarad, K. Sankar, M. Vipin. 120-125 [doi]
- A New Narrow Block Mode of Operations for Disk EncryptionMohamed Abo El-Fotouh, Klaus Diepold. 126-131 [doi]
- Provenance Tracking with Bit VectorsSiddharta S. Gadang, Brajendra Panda, Joseph E. Hoag. 132-137 [doi]
- Impact of Cheating and Non-Cooperation on the Stability and the Performances of Application-Level Multicast SessionsMothanna Alkubeily, Hatem Bettahar, Abdelmadjid Bouabdallah. 141-146 [doi]
- ACML: Capability Based Attack Modeling LanguageNavneet Kumar Pandey, S. K. Gupta, Shaveta Leekha, Jingmin Zhou. 147-154 [doi]
- Realistic Threats to Self-Enforcing PrivacyGiampaolo Bella, Francesco Librizzi, Salvatore Riccobene. 155-160 [doi]
- Operator-Centric and Adaptive Intrusion DetectionUlf Larson, Stefan Lindskog, Dennis K. Nilsson, Erland Jonsson. 161-166 [doi]
- A Queuing Theory Based Model for Studying Intrusion Evolution and Elimination in Computer NetworksPantelis Kammas, Thodoros Komninos, Yannis C. Stamatiou. 167-171 [doi]
- Matrix Factorization Approach for Feature Deduction and Design of Intrusion Detection SystemsVáclav Snásel, Jan Platos, Pavel Krömer, Ajith Abraham. 172-179 [doi]
- Ensemble of One-Class Classifiers for Network Intrusion Detection SystemAnazida Zainal, Mohd Aizaini Maarof, Siti Mariyam Hj. Shamsuddin, Ajith Abraham. 180-185 [doi]
- Web Application Attack Prevention for Tiered Internet ServicesSusanta Nanda, Lap-Chung Lam, Tzi-cker Chiueh. 186-191 [doi]
- LoSS Detection Approach Based on ESOSS and ASOSS ModelsMohd Fo ad Rohani, Mohd Aizaini Maarof, Ali Selamat, Houssain Kettani. 192-197 [doi]
- COTraSE: Connection Oriented Traceback in Switched EthernetMarios S. Andreou, Aad P. A. van Moorsel. 198-204 [doi]
- Improving the Efficiency of Misuse Detection by Means of the q-gram DistanceSlobodan Petrovic, Sverre Bakke. 205-208 [doi]
- An Efficient Approach to Minimum-Cost Network Hardening Using Attack GraphsFeng Chen, Lingyu Wang, Jinshu Su. 209-212 [doi]
- Developing a Security Typed Java ServletDoaa Hassan, Sherif El-Kassas, Ibrahim Ziedan. 215-220 [doi]
- Designing a DRM SystemFranco Frattolillo, Federica Landolfi. 221-226 [doi]
- Challenges for Security Typed Web Scripting Languages DesignDoaa Hassan, Sherif El-Kassas, Ibrahim Ziedan. 227-230 [doi]
- Systematic Website Verification for Privacy ProtectionJi-Hee Jeoung, Eun-Ji Shin, Seng-Phil Hong, Sung Hoon Kim, In-Ho Kim, Min-Woo Lee. 231-234 [doi]
- Abusing SIP AuthenticationHumberto J. Abdelnur, Tigran Avanesov, Michaël Rusinowitch, Radu State. 237-242 [doi]
- A Friend Mechanism for Mobile Ad Hoc NetworksShukor Abd Razak, Normalia Samian, Mohd Aizaini Maarof. 243-248 [doi]
- A Composite Network Security AssessmentSuleyman Kondakci. 249-254 [doi]
- Managing Reputation over MANETsGiampaolo Bella, Gianpiero Costantino, Salvatore Riccobene. 255-260 [doi]
- Network Level Privacy for Wireless Sensor NetworksRiaz Ahmed Shaikh, Hassan Jameel, Brian J. d Auriol, Sungyoung Lee, Young-Jae Song, Heejo Lee. 261-266 [doi]
- A Device Management Framework for Secure Ubiquitous Service DeliveryAdrian Leung, Chris J. Mitchell. 267-274 [doi]
- Automatic Verification of Simulatability in Security ProtocolsTadashi Araragi, Olivier Pereira. 275-280 [doi]
- A New Secure Binding Management Protocol for Mobile IPv6 NetworksOsama Elshakankiry, Andy Carpenter, Ning Zhang. 281-286 [doi]
- Geolocation-Based Trust for Vanet s PrivacyJetzabel Serna, Jesus Luna, Manel Medina. 287-290 [doi]
- An Automated Validation Method for Security Policies: The Firewall CaseRyma Abassi, Sihem Guemara El Fatmi. 291-294 [doi]
- Adaptive Dynamic Reaction to Automotive IT Security Incidents Using Multimedia Car EnvironmentTobias Hoppe, Stefan Kiltz, Jana Dittmann. 295-298 [doi]
- Semantics-Driven Introspection in a Virtual EnvironmentFrancesco Tamberi, Dario Maggiari, Daniele Sgandurra, Fabrizio Baiardi. 299-302 [doi]
- Information Assurance in Critical Infrastructures via Wireless Sensor NetworksMichele Albano, Stefano Chessa, Roberto Di Pietro. 305-310 [doi]
- A Model for the Study of Privacy Issues in Secure Shell ConnectionsMaurizio Dusi, Francesco Gringoli, Luca Salgarelli. 311-317 [doi]
- IRC Traffic Analysis for Botnet DetectionClaudio Mazzariello. 318-323 [doi]
- Key Distribution Using Dual Quantum ChannelsDi Jin, Pramode K. Verma, Stamatios V. Kartalopoulos. 327-332 [doi]
- Quantum Key Distribution Based on Multi-qubit Hadamard MatricesDazu Huang, Zhigang Chen. 333-337 [doi]
- Chaotic Quantum CryptographyStamatios V. Kartalopoulos. 338-342 [doi]