Abstract is missing.
- Developing Secure Web Services for Computational PortalsChoon-Han Youn, Marlon E. Pierce, Geoffrey Fox. 367-372
- Design of a LDAP Schema Based on Network Security Policy Information Model for Storing Security PolicyGeonlyang Kim, Jung-Chan Na, Seung Won Sohn. 373-377
- Prevention of Buffer Overflow Exploits in IA-32 Based LinuxPrabhaker Mateti, Sowgandh Sunil Gadi. 378-384
- Detection of Loadable Kernel Module RootkitKyechan Lee, Kyubum Wee. 385-389
- Formulation of a Heuristic Rule for Misuse and Anomaly Detection for U2R Attacks in Solaris Operating System EnvironmentMaheshkumar Sabhnani, Gürsel Serpen. 390-396
- Supporting Interoperability to Multi Intrusion Detection System in Secure Networking FrameworkSang-Kil Park, Jongsoo Jang, BongNam Noh. 397-401
- Placement of Cryptographic Mechanisms in Operating SystemsAlexander Buchmann, Harald Görl, Sven Lachmund. 402-408
- Improve Network Security with Kernel-Level Intrusion Detection SensorBo-Heung Chung, Jeong-Nyeo Kim, Sung Won Sohn. 409-414
- A Web-Based Login System Using the Time Based Password (TBP)Su-Hong Min, Ok-Ran Jeong, Dong-Sub Cho. 415-420
- Operating System Support for Process ConfinementJosé R. Herrero, David Benlliure. 421-425
- A Protection of Mobile System in Network SystemsJong-Tak Kim, Chan Koh, Jin-Tak Choi. 426-432
- Accelerating FirewallJongwook Moon, Hakbong Cho, Changseok Choi, Gihyun Jung, Younkwang Jung, Kyunghee Choi. 433-437
- Fault Management Model and Implementation for Customer Network ManagementHyunchul Kang, Gil-Haeng Lee, Dae-Ung Kim. 438-443
- Cyber-Lecture Management System for XML-Based Secondary EducationHye-Young Kim, Hwa-Sun Kim, Heung-Sik Kim, Sang-Gyun Kim, Heung-Kook Choi. 444-448
- A New Architecture for Enhancing the Security of E-Mail SystemJangbok Kim, Hosung Lim, Kyunghee Choi, Gihyun Jung. 449-454
- Safe Patch Distribution Architecture in Intranet EnvironmentsTaeshik Shon, Jongsub Moon, Cheolwon Lee, Eul-Gyu Im, Jung-Taek Seo. 455-460
- Threats, Vulnerabilities and Exposures to Networked Manufacturing SystemsBoleslaw Fabisiak. 461-468
- Trust Management for Mobile IPv6 Binding UpdateHolly Xiao. 469-474
- The Methods of IPsec Applying Between MN and HA in Mobile IPv6Wonjoo Park, Dong Il Seo, Daeyoung Kim. 475-478
- A Secure Mobile Agent System Based on Identity-Based Digital Signature SchemeYeojin Lee, Taehoon Lee, Ilyong Chung. 479-485
- A Study on the High Crypto-System for the Multi-SessionsYoe-Sub Shin, Yang-Gyu Kim, Haeng-Seok Ko, Dong-Heyok Jang, Taejoo Chang, Oh-Seok Kwon. 486-490
- A Study on Bandwidth Consumption DDoS: Attack DefenseDong-ho Kang, Dong Il Seo, Jongsoo Jang. 491-494
- Performance Analysis of a Security Manager for Multi-Service Communication MiddlewareLeonardo Mattes, Frank Meylan, Adilson Eduardo Guelfi, João Antonio Zuffo. 495-501
- QoS Guaranteed Service Model in Mobile IPv6Misun Kim, Sangjin Park, Youngsong Mun. 502-507
- VDTS: The Design of Real-Time Virus Detection and Tracing SystemsSang-Hun Lee, Kyoung-Hwa Do, Kun-Won Jang, Moon-Seog Jun. 508-513
- Analysis of Web Service Performance for Network ManagementBernhard Thurm. 514-520
- Extended Probabilistic Packet Marking Scheme for IP TracebackMira Kwak, Dong-Sub Cho. 521-526
- Economic Perspective of Information SecurityGang Zhu, Jie Dai. 527-533
- The Subscriber Management of CO-LAN Gateway SystemShin-Kyung Lee, Tae Wan Kim, Dae-Ung Kim. 534-538
- Identifying Requirements for Network Security SoftwareDarryl A. White, Ghasem S. Alijani. 539-543
- The Development of Network Security Suite for Windows-Based ServersRemus Chua Choong Hee, Jianping Chen, Ben M. Chen. 544-550
- Robust Multimedia Authentication in Mobile Multicast EnvironmentMiyoun Yoon, Kiyoung Kim, Yongtae Shin. 551-557
- Simultaneous Data Compression and EncryptionChung-E Wang. 558-563
- Color Level Logo Image Watermarking on Multi Color SpaceSang-Hyun Bae, Hae Kyung Seong, Kang Hyeon Rhee. 564-569
- Key Generation for Secure High Speed CommunicationViktor Bunimov, Manfred Schimmler, Wolfgang Bziuk. 570-576
- Semi-Fragile Image Watermarking Based on Block Mean DifferenceDong-Hwan Shin, Jong-Weon Kim, Jong-Uk Choi. 577-583
- Randomized Traitor Tracing Algorithms for Broadcast SecuritySimon McNicol, Serdar Boztas. 584-590
- Image Fingerprinting with Multi-Bits WatermarkYoung-Ho Suh, Won Gyum Kim, Jong-Weon Kim, Chi-Jung Hwang. 591-594
- The Fingerprinting Algorithm for Digital Image and VideoHan Ho Lee, Jung-Soo Lee, Nam-Yong Lee, Jong-Weon Kim. 595-600
- Design and Implementation of Stego WaveK Through Improved Lowbit Encoding MethodYoung-Shil Kim, Young-Mi Kim, Seong-Jin Park, Doo-Kwon Baik. 601-606
- Implementation of an Elliptic Curve Cryptography Hardware Accelerator for Smart CardsSangwoo Lee, Yun-kyung Lee, Youngsae Kim, Youngsoo Park, Sung-Ik Jun, Kyo-Il Chung. 607-610
- Efficient Electronic Voting System with Secure Multiparty Fault-Detection ProtocolSoon Hwa Sung, Eunbae Kong. 611-617
- Development of Digital Content Viewer with Tracing Capability by Use of the Watermarking TechniqueF. Sang-Ju Song, S. Doo-Sung Lee, T. Sun-Hyung Kim. 618-625
- A New Multi-Layer Copyright Protection by Using Digital WatermarkingJong-Weon Kim, Jung-Soo Lee, Jong-Uk Choi. 626-632
- Efficient On-Line Electronic ChecksWei-Kuei Chen. 633-636
- On Different Approaches to Establish the Security of Cryptographic ProtocolsTom Coffey, Reiner Dojen, Tomas Flanagan. 637-643
- A Performance Comparison of Encryption AlgorithmsGuillermo A. Francia III, Aditya Kilaru, Le Phuong, Mehul B. Vashi. 644-649
- Inferential Disclosure Limitation in Multivariate Categorical DatabasesRandy Justice, Sumitra Mukherjee. 650-653
- An Information Security Management ModelTom Cribb, Asha Rao. 654-657
- Similarity Searches in Computer SecurityScott F. Smith 0002. 658-662
- On Fail-Stop Verifiable Secret Sharing SchemesWilly Susilo, Yi Mu. 663-667
- On Using Fast Exponentiation Algorithm in PDAs (or: How Secure is the Discrete Logarithm Problem Assumption in PDAs?)Willy Susilo, Jianyong Huang, Jennifer Seberry. 668-674
- Defending Against Denial of Service Attacks Using Secure Name ResolutionPrashant Dewan, Partha Dasgupta, Vijay Karamcheti. 675-681