Abstract is missing.
- A Security Architecture for a Web Portal of Sensitive Archival RecordsBinh Q. Nguyen. 3-8
- A Unified Framework for Mobile Device SecurityWayne A. Jansen, Serban I. Gavrila, Vlad Korolev. 9-14
- Ontology-Based Framework for E-Survivability AnalysisHiep Pham, Zhuhan Jiang. 15-24
- User Authentication with Smart Cards in Trusted Computing ArchitecturePatrick George. 25-31
- A Protocol for Secure Seamless HandoverAnand R. Prasad, Hu Wang. 32-40
- Machine Authentication and Security ComplianceMary Rossell, Alan D. Ross. 41-45
- Malware Mitigation Using Host Intrusion Prevention in the EnterpriseAlan D. Ross, Dennis Morgan. 46-54
- Managing Access Rights for Terminated EmployeesDennis Heimbigner. 55-60
- A Survey of Biometric Authentication SystemsFarhan A. Qazi. 61-67
- Byzantine Agreement with Threshold Cryptography in Unknown NetworksSoon Hwa Sung, Eunbae Kong. 68-74
- User Isolation and Policy-Based Security ManagementM. Ammar Rayes, Michael Cheung. 75-79
- The Analysis of Graffiti Input and Its Application to Personal IdentificationHiroshi Dozono, Hiroaki Sanada, Masanori Nakakuni, Yoshio Noguchi. 80-83
- Authentication and Authorization for Network Security ServiceTaesung Kim, Sangrae Cho, Seunghun Jin. 84-88
- The Key Authority - Secure Key Management in Hierarchical Public Key InfrastructuresAlexander Wiesmaier, Marcus Lippert, Vangelis Karatsiolis. 89-93
- A Graphical Password Scheme Strongly Resistant to SpywareDawei Hong, Shushuang Man, Barbra Hawes, Manton M. Matthews. 94-100
- 2 Channel AuthenticationRaghavan Subramanian. 101-108
- Analysis of ISO/IEC 17799: 2000 to be Used in Security MetricsCarlos Villarrubia, Eduardo Fernández-Medina, Mario Piattini. 109-117
- Vulnerabilities in 802.11b Wireless Local Area NetworksJesús Arturo Pérez Díaz, Gerardo Del Valle Torres. 118-124
- Secure Business Processes Optimization SystemAntonio Sarasa-Cabezuelo, Daniel Ruiz-Zorrilla Gonzalo, Marcos Muiños Martín. 125-134
- Towards a Perfect Secure Routing Protocol for Mobile Ad Hoc NetworksChunxiao Chigan, Rahul Bandaru. 135-140
- Legal File and Profit Sharing in a Peer to Peer NetworkGiancarlo Ruffo. 141-146
- Repute Relationships for Reputation Management in Peer-to-Peer Communication - IFarookh Khadeer Hussain, Elizabeth Chang, Tharam S. Dillon. 147-153
- 802.11b Wireless Networks Insecure at Any SpeedCraig Valli, Peter Wolski. 154-158
- Detecting Packet Mishandling in MANETsSirisha Medidi, Muralidhar Medidi, Sireesh Gavini, Richard L. Griswold. 159-162
- Secure IP Multicast for DMSJing Wu, Jennifer Seberry, Tianbing Xia. 163-167
- Scenarios for Hijacking Execution Flow of .NET Managed CodeA. Maslov. 168-172
- Measures for Detecting Network Attacks at the Aggregate Traffic Level on High-Speed Internet Backbone LinksWonjoon Choi, Byeong-hee Roh, Seung W. Yoo. 173-178
- Analysis and Management of Intrusion Data CollectionRobert F. Erbacher. 179-185
- A State Transition Model Case Study for Intrusion Detection SystemsBrian J. d Auriol, Kishore Surapaneni. 186-192
- An Architectural Framework for Distributed Intrusion Detection Using Smart AgentsVasilis Chatzigiannakis, Georgios Androulidakis, Mary Grammatikou, Basil S. Maglaris. 193-199
- Intrusion-Based Survivability ArchitectureHiep Pham, Zhuhan Jiang. 200-206
- Tolerating Intrusions in Grid SystemsLuis Sardinha, Nuno Ferreira Neves, Paulo Veríssimo. 207-220
- An XML-Based Impact Analysis Using Security Management with IAVNNamho Yoo, Hwajung Lee, Hyeong-Ah Choi. 217-220
- Possible Attacks on and Countermeasures for Secure Multi-Agent ComputationRegine Endsuleit, Arno Wagner. 221-227
- A Systematic Approach to Security Deployment in a Networking EnvironmentMyron Sheu, Le Tang, Ravi Mukkamala. 228-234
- Testing IPv6 SecurityAlbert Ball, Donald G. Cole, Michael L. Nelson. 235-241
- General Considerations on Data Warehouse SecurityRodolfo Villarroel, Eduardo Fernández-Medina, Mario Piattini. 242-248
- A Study on Security Risk Modeling over Information and Communication InfrastructureIn-Jung Kim, Yoon-Jung Jung, JoongGil Park, Dongho Won. 249-253
- A Study on CRL Distribution for Response Time Reduction in Distributed OCSPSung-Ock Hong, Kyoung-Ja Kim, Tae-Mu Chang. 254-257
- The Development of Risk Analysis Methodology for Information Asset on NetworkYoon-Jung Jung, In-Jung Kim, Namhoon Lee, JoongGil Park. 258-261
- Proposal and Implementation of Router-Based Traceback TechniqueYuhei Kawakoya, Yoichi Muraoka. 262-266
- Experimental Analysis of the Arcanum Key Exchange ProtocolAjmal S. Mian, Raja Iqbal. 267-271
- Web Spoofing Techniques, Implementation and SolutionsTarek K. Alameldin, Amitesh Sinha. 272-277
- Survivable Systems Analysis for Real Time Control Systems in Critical InfrastructuresMatt Benke, John Waite, Paul W. Oman, Ahmed Abdel-Rahim. 278-286
- Using Metadata to Protect the Audiovisual Contents in MPEG-7 ApplicationsLeon Pan, Chang N. Zhang. 287-293
- Boolean Functions with Good PropertiesTianbing Xia, Jennifer Seberry, Jing Wu. 294-299
- An Efficient Access Control Model Based on User-Classification and Role-DivisionYong-Seok Kim, Jun-Cheol Jeon, Jin-woo Jeon, Kee-Young Yoo. 300-304
- NSPPM: A Node Sampling Approach to Probabilistic Packet Marking-Based IP TracebackJin Shu, Fengyu Liu, Manwu Xu. 305-311
- DPA Methods of Smart CardsHee Bong Choi, Jong-Gil Kim, Sang-Yun Han, Mung-Gil Choi, Chun-Soo Kim, Hyoon Jae Lee. 312-317
- A New Modulo (2:::n:::+1) Multiplier for IDEAYi-Jung Chen, Dyi-Rong Duh, Hun Yunghsiang Sam Han. 318-324
- A ZRP Based Reliable Route Discovery Scheme in Ad-Hoc NetworksKyoung-Ja Kim, Tae-Mu Chang. 325-331
- CAPTCHA-Based Anti-Spam Mail ModelPhen-Lan Lin, Juen-Lin Huang, Ting-Jung Chang. 332-340
- ASAM: An Automated System for Authorisation Data Change Management in GRID EnvironmentsNick Antonopoulos, Tatjana Bitzakidis, Roger M. A. Peel. 341-347
- EZ-Park: An Innovative Secure M-Commerce ApplicationJeff Adams, Ranjit Abbadasari, Ravi Mukkamala. 348-352
- A Hardware Implementation of Speaker Verification Using Support Vector MachineYongwha Chung, Byung-Hee Hwang, Woo-Yong Choi, Daesung Moon, Sung Bum Pan, Sang-Hwa Chung. 353-358
- TCP SYN Flood Sensor for Internet BackboneMadiha Zafar, S. M. H. Zaidi. 359-364
- KLADS: Unix Based Kernel Level Anomaly Detection SystemVamshi Krishna Venapally, William S. Harrison, Nadine Hanebutte. 365-368
- JxPS:::2::: - An Intelligent, Portable and Pluggable Security Service for Web Applications Using Java, XML and JIProlog (Java Internet Prolog)Mathias Fonkam, Chamraj Bathirappan. 369-375
- Survivable Systems Analysis of the North American Power Grid Communications InfrastructurePatrick R. Merry, Axel W. Krings, Paul W. Oman. 376-386
- Abnormal Traffic Detection for Network Intrusion DetectionYoung-Jun Heo, Keol-Woo Ryu. 387-390
- Data Confidentiality in E-Government and E-CommerceFariborz Farahmand, Shamkant B. Navathe, Gunter P. Sharp, Philip H. Enslow Jr.. 391-394
- A Comparison of the trusted Computing Group Security Model with Clark-WilsonNed M. Smith. 395-401
- A Proposal for an Automated Approach to Real Time Profiling of IT Security CompromisesNajib Saylani. 402-407
- An Efficient Protocol for Mutual Authentication and Key Agreement Using the Subscriber Identity ModuleMun-Kyu Lee, Dowon Hong. 408-413
- Processing Biometric Information for Smart Cards Using a Dedicated Hash FunctionGhasem S. Alijani, Nam Tran, J. Steven Welsh. 414-420
- Modeling Host Status Transition for Network Intrusion DetectionMira Kwak, Dong-Sub Cho. 421-426
- The Security Issues in the Ad-Hoc on Demand Distance Vector Routing Protocol (AODV)Shamila Makki, Niki Pissinou, Hui Huang. 427