Abstract is missing.
- A comparison of the standardized versions of ECIESVictor Gayoso Martínez, Fernando Hernández Álvarez, Luis Hernández Encinas, Carmen Sánchez Ávila. 1-4 [doi]
- Discriminative multinomial Naïve Bayes for network intrusion detectionMrutyunjaya Panda, Ajith Abraham, Manas Ranjan Patra. 5-10 [doi]
- Secure Universal Plug and Play networkVesa Pehkonen, Juha Koivisto. 11-14 [doi]
- A case analysis of a Contextual Model of Trust for digital identities using UML 2.0 and context graph algorithmsSean S. E. Thorpe. 15-20 [doi]
- Safeguarding Malaysia's critical national information infrastructure (CNII) against cyber terrorism: Towards development of a policy frameworkZahri Yunos, Syahrul Hafidz Suid, Rabiah Ahmad, Zuraini Ismail. 21-27 [doi]
- The five modes AES applications in sounds and imagesChi-Wu Huang, Chien-Lun Yen, Che-Hao Chiang, Kuo-Huang Chang, Chi-Jeng Chang. 28-31 [doi]
- Specification of attribute relations for access control policies and constraints using Policy MachineVincent C. Hu, David F. Ferraiolo, Serban I. Gavrila. 32-35 [doi]
- A hybrid Authentication and authorization process for control system networksDavid O. Manz, Thomas W. Edgar, Glenn Allen Fink. 36-39 [doi]
- Security preferences specification and implementation in a service-based workflowWendpanga Francis Ouedraogo, Frédérique Biennier, Nicolas Salatge. 40-43 [doi]
- Resource-efficient implementation of Blue Midnight Wish-256 hash function on Xilinx FPGA platformMohamed El-Hadedy, Martin Margala, Danilo Gligoroski, Svein J. Knapskog. 44-47 [doi]
- Novel technique for steganography in fingerprints images: Design and implementationHanan A. Mahmoud, Hanan Saad Al-Hulaibah, Sarah A. Al-Naeem, Suha Ali Al-Qhatani, Aljoharah Al-Dawood, Buthaina Saleh Al-Nassar, Dhay Yousef Al-Salman. 48-51 [doi]
- Novel algorithmic countermeasures for Differential Power Analysis attacks on smart cardsHanan A. Mahmoud, Khaled Alghathbar. 52-55 [doi]
- Insider threat discovery using automatic detection of mission critical data based on contentJonathan White, Brajendra Panda. 56-61 [doi]
- Benchmarking IP blacklists for financial botnet detectionDavid Oro, Jesus Luna, Toni Felguera, Marc Vilanova, Jetzabel Serna. 62-67 [doi]
- Using vulnerability information and attack graphs for intrusion detectionSebastian Roschke, Feng Cheng 0002, Christoph Meinel. 68-73 [doi]
- Detect multi-hop stepping-stone pairs with clock skewYing-Wei Kuo, Shou-Hsuan Stephen Huang, Christopher Hill. 74-79 [doi]
- Efficient defense strategies to minimize attackers' success probabilities in honeynetFrank Yeong-Sung Lin, Yu-Shun Wang, Po-Hao Tsang. 80-85 [doi]
- Scaling IDS construction based on Non-negative Matrix factorization using GPU computingJan Platos, Pavel Krömer, Václav Snásel, Ajith Abraham. 86-91 [doi]
- A structured approach to anomaly detection for in-vehicle networksMichael Müter, André Groll, Felix C. Freiling. 92-98 [doi]
- Intelligent response system to mitigate the success likelihood of ongoing attacksWael Kanoun, Nora Cuppens-Boulahia, Frédéric Cuppens, Samuel Dubus, Antony Martin. 99-105 [doi]
- Fast intrusion detection system based on Flexible Neural TreeTomás Novosad, Jan Platos, Václav Snásel, Ajith Abraham. 106-111 [doi]
- Towards intrusion detection by information retrieval and genetic programmingPavel Krömer, Jan Platos, Václav Snásel, Ajith Abraham. 112-117 [doi]
- RAPID: Reputation based approach for improving intrusion detection effectivenessAshley Thomas. 118-124 [doi]
- Detecting memory spoofing in secure embedded systems using cache-aware FPGA guardsEugen Leontie, Olga Gelbart, Bhagirath Narahari, Rahul Simha. 125-130 [doi]
- Secure architecture for healthcare Wireless Sensor NetworksKalyani Divi, Mohammed Raza Kanjee, Hong Liu. 131-136 [doi]
- End-to-end security policy description and management for collaborative systemZiyi Su, Frédérique Biennier. 137-142 [doi]
- A causal model for information security risk assessmentSuleyman Kondakci. 143-148 [doi]
- Threat modeling approaches and tools for securing architectural designs of an e-banking applicationCaroline Moeckel, Ali E. Abdallah. 149-154 [doi]
- Two tier detection model for misbehavior of low-power nodes in virtual MIMO based wireless networksYang Liu, Yue Wu, Junhua Tang. 155-160 [doi]
- The number of the isomorphism classes of hyperelliptic curves of genus four over finite fieldsLin You, Fugeng Zeng. 161-166 [doi]
- Fault attack on AES with single-bit induced faultsAlessandro Barenghi, Guido Marco Bertoni, Luca Breveglieri, Mauro Pellicioli, Gerardo Pelosi. 167-172 [doi]
- Anonymous service access for Vehicular Ad hoc NetworksHesiri Weerasinghe, Huirong Fu, Supeng Leng. 173-178 [doi]
- Patient's perception of health information security: The case of selected public and private hospitals in Addis AbabaTibebe Tesema, Dawn Medlin, Ajith Abraham. 179-184 [doi]
- A framework for integrated risk management process using survival analysis approach in information securityGanthan Narayana Samy, Rabiah Ahmad, Zuraini Ismail. 185-190 [doi]
- Extending the definition of guessworkReine Lundin, Stefan Lindskog. 191-196 [doi]
- Reconciling IHE-ATNA profile with a posteriori contextual access and usage control policy in healthcare environmentHanieh Azkia, Nora Cuppens-Boulahia, Frédéric Cuppens, Gouenou Coatrieux. 197-203 [doi]
- Inconsistency detection method for access control policiesRiaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo, Serge Mankovski. 204-209 [doi]
- Anonymous communication system using probabilistic choice of actions and multiple loopbacksKazuhiro Kono, Yoshimichi Ito, Noboru Babaguchi. 210-215 [doi]
- Assurance in identity management systemsMaya I. Chehab, Ali E. Abdallah. 216-221 [doi]
- Audited credential delegation - a user-centric identity management solution for computational grid environmentsAli Nasrat Haidar, Stefan J. Zasada, Peter V. Coveney, Ali E. Abdallah, Bruce Beckles. 222-227 [doi]
- Cooperative access control for the GridAlessio Merlo, Alessandro Armando. 228-233 [doi]
- CARMA: Composable-Adaptive Resource Management Authorization for ubiquitous environmentsRoberto Morales, Jetzabel Serna, Manel Medina, Jesus Luna. 234-239 [doi]
- A semantic based methodology to classify and protect sensitive data in medical recordsFlora Amato, Valentina Casola, Antonino Mazzeo, Sara Romano. 240-246 [doi]
- A naming system applied to a RESERVOIR cloudAntonio Celesti, Massimo Villari, Antonio Puliafito. 247-252 [doi]
- Identity federation in cloud computingValentina Casola, Massimiliano Rak, Umberto Villano. 253-259 [doi]
- Securing a tiered re-taskable sensing systemAlessandra De Benedictis, Andrea Gaglione, Nicola Mazzocca. 260-264 [doi]
- Integrating a network IDS into an open source Cloud Computing environmentClaudio Mazzariello, Roberto Bifulco, Roberto Canonico. 265-270 [doi]
- A two-tiered authentication and encryption scheme in secure healthcare sensor networksMohammed Raza Kanjee, Kalyani Divi, Hong Liu. 271-276 [doi]
- UDT -Authentication Option field: An approachDanilo Valeros Bernardo. 277-281 [doi]
- Data aggregation for information authentication in VANETsJezabel Molina-Gil, Pino Caballero-Gil, Candelaria Hernández-Goya, Cándido Caballero-Gil. 282-287 [doi]
- Secure protocol for ad hoc transportation systemJohnson P. Thomas, Vinay Abburi, Mathews Thomas, Ajith Abraham. 288-293 [doi]
- A hierarchical access authentication in networkHe Liu, Man-Gui Liang, Gao-Liang Qi, Xiaowei Chen. 294-297 [doi]
- Quantifying authentication Levels of Assurance in grid environmentsLi Yao, Ning Zhang. 298-303 [doi]
- A distributed and cooperative user authentication frameworkChris G. Hocking, Steven M. Furnell, Nathan L. Clarke, Paul L. Reynolds. 304-310 [doi]
- Optimum fusion of visual and thermal face images for recognitionMrinal Kanti Bhowmik, Debotosh Bhattacharjee, Mita Nasipuri, Dipak Kumar Basu, Mahantapas Kundu. 311-316 [doi]
- Automatic semantic annotation of images based on Web dataGuiguang Ding, Na Xu. 317-322 [doi]
- Comparison of real-time DSP-based edge detection techniques for license plate detectionZuwena Musoromy, Faycal Bensaali, Soodamani Ramalingam, Georgios Pissanidis. 323-328 [doi]
- Integrated security risk management for IT-intensive organizationsJeffrey Mounzer, Tansu Alpcan, Nicholas Bambos. 329-334 [doi]
- Link suggestions in terrorists networks using Semi Discrete DecompositionVáclav Snásel, Zdenek Horak, Ajith Abraham. 335-337 [doi]
- Fuzzified Aho-Corasick search automataZdenek Horak, Václav Snásel, Ajith Abraham, Aboul Ella Hassanien. 338-342 [doi]
- A framework for cyber surveillance of unlawful activities for critical infrastructure using computational gridsVáclav Snásel, Ajith Abraham, Khalid Saeed, Hameed Al-Qaheri. 343-348 [doi]