Abstract is missing.
- Towards an Authentication Protocol for Service Outsourcing Over IP NetworksHua Wang, Zhongwei Zhang, David Lai. 3-9
- On Intelligent Agent-based Decoy SystemsJiwei Wei, Zhixin Sun. 10-16
- Enhancing Security Functionality on Open Router ArchitectureMichihiro Aoki, Takafumi Hamano, Takeshi Miyasaka, Kentaro Ogawa, Masaaki Inami, Keishi Habara, Shinichiro Chaki. 17-23
- redAlert: Data-Mining and Visualisation for IP Data AnalysisEd Kirkham, Paul Botham. 24-32
- A Distributed Certificate Status Verification Using Mobile Code PSTU(Proactive Self Transaction Unit) of Secure Mobile Agent in PKI(Public Key Infrastructure)Soon Hwa Sung, Eunbae Kong. 33-39
- Faster RSA Encryption/Decryption Architecture Using an Efficient High Speed Overlay MultiplierHimanshu Thapliyal, M. B. Srinivas, Hamid R. Arabnia. 40-44
- A Study on Variable Modulo Number Based Public Key Cryptosystem in Mobile NetworkHyunHee Choi, Injung Kim, Jeong Ryou. 45-50
- Efficient Date-Constraint Hierarchical Key Assignment SchemeWei-Bin Lee, Jia-Hong Li, Chyi-Ren Dow. 51-57
- Security Analysis of A Proxy Signature Scheme Based on the Elliptic Curve CryptosystemYing Wu, Yongping Zhang, Tianjie Cao. 58-64
- A Secret Key Based Authentication Scheme Using Smart CardsEun-Jun Yoon, Jae-Hyung Jung, Woo-Hun Kim, Kee-Young Yoo. 65-71
- Cryptanalysis of A Key Authentication Scheme Based on Discrete LogarithmsEun-Jun Yoon, Eun-Kyung Ryu, Woo-Hun Kim, Kee-Young Yoo. 72-78
- Incorporating Attacker Behavior in Stochastic Models of SecurityKarin Sallhammar, Bjarne E. Helvik, Svein J. Knapskog. 79-85
- Cooperative Mechanism Against DDoS AttacksGuangsen Zhang, Manish Parashar. 86-96
- RADICL: A Reconfigurable Attack-Defend Instructional Computing LaboratorySergio Caltagirone, Paul Ortman, Sean Melton, David Manz, Kyle King, Paul W. Oman. 97-103
- Baseline - A Passive Approach to Tolerate and Detect DoS/DDoS AttacksJin Shu, Fengyu Liu, Manwu Xu. 104-110
- A Prediction and Early Warning Model for Hacker AttacksHenghui Zou, Hengming Zou. 111-118
- Known Session Key Attack Against a Collection of Signcryption SchemesJonathan Wong, Duncan S. Wong. 119-126
- An Approach to Reduce False Alarms in an Intrusion Detection SystemHamidReza Haydari, Ali Moeini, MahdiReza Mohajerani. 127-132
- A Conceptual Space Model for Intrusion DetectionBrian J. d Auriol, Afolami Akinsanmi. 133-139
- A Computation-Communication Sequencing Model for Intrusion Detection SystemsBrian J. d Auriol, Kishore Surapaneni. 140-143
- Enterprise Wide Centralized Logging Mechanism for Application Level Intrusion DetectionRiaz Ahmed Shaikh, Saeed Rajput, S. M. H. Zaidi, Kashif Shairf. 144-148
- Intrusion Detection with Agent-Based SystemRichard A. Wasniowski. 149-154
- Novel Congestion-Based Pricing Scheme for QoS-Enabled NetworksRamzi El-Haddadeh, Gareth Taylor. 155-162
- An approach to the formal verification of the three-principal security protocolsYuqing Zhang, Xiuying Liu, Dengguo Feng. 163-169
- Privacy Protocol for Quantum ChannelGagneja Kanwalinder Jit Kaur. 170-175
- Network Vertical Intrusion Model (NetVIM)Brian J. d Auriol. 176-179
- Information Assurance Security Frameworkfor Enterprise NetworksM. D. Kesari, S. D. Sudarsan, T. Velayutham, Manisha Jagadhane, U. Sailaja. 180-186
- Client-Side Deception Using Architectural DegradationDennis Heimbigner. 187-193
- A Knowledge-Based Alert Evaluation and Security Decision Support FrameworkJinqiao Yu, Y. V. Ramana Reddy, Sentil Selliah, Sumitra Reddy. 194-200
- Designing a Secure Trust Intermediary Service (STIS) for Web Services: a WS-Trust ApproachKibaya Erisania, Xie DongQing. 201-207
- A model to support fine-grained delegation of authorizationRichard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu, Yan Woo. 208-212
- Design of Packet Filtering on Network ProcessorYoungho Kim, Jeongnyeo Kim. 213-220
- Security Awareness Management - Foundations and Implementation of Security AwarenessJan vom Brocke, Christian Buddendick. 221-227
- Real-Time Interactive Visual Port Monitoring and AnalysisRobert F. Erbacher, Menashe Garber. 228-234
- Computer Security Awareness of College StudentsChlotia Posey Garrison. 235-240
- Observance and Contravention of Information Security MeasuresJohn Gathegi, Michael Workman. 241-247
- Computer Forensic Tools and TechniquesGuillermo A. Francia III, Keion Clinton. 248-252
- On The Improvement of XML Web Services SecurityBrian Brammeier, Eltayeb Abuelyaman. 253-259
- Preventing Service Flooding on Internet DNS Servers thru an Application-Level Mechanism: A Performance AnalysisZubair A. Baig. 260-268
- Secure Information Sharing Using Attribute Certificates and Role Based Access ControlGanesh Godavari, C. Edward Chow. 269-276
- Establishing Trustworthy Terminal with Smart CardJianwu Zheng, Mingsheng Liu. 277-282
- Rotation and Scaling Invariant Watermarking on Base of a Linear Polar Grid RepresentationAlexander Bahrushin, Kiseon Kim. 283-289
- A Secure and Robust Algorithm for Exchanging Secret MessagesHesham Elzouka. 290-296
- Combining User and Platform Trust Properties to Enhance VPN Client AuthenticationPatrick George, Gérald Maunier. 297-303
- Role Authentication for Secure DBMSDugyu Ryoo, Seonho Kim, Moonseog Jun. 304-312
- Ouflanking and Securely Using the PIN/TAN-SystemAlexander Wiesmaier, Mike Fisher, Marcus Lippert, Johannes Buchmann. 313-319
- Reconfirming Change in Secure Software Systems: An Adaptable Security ApproachLawrence Chung, Nary Subramanian. 320-326
- Dynamic Integrity Verification for Software Self-defenseYan Woo, Lucas Chi Kwong Hui, K. P. Chow, Siu-Ming Yiu. 327-333
- Screen oriented technique for reducing the incidence of shoulder surfingBogdan Hoanca, Kenrick J. Mock. 334-340
- Redundancy of Check-Point Unit as a Method to Increase the Resistance to Fault Influence in ECCIhor V. Vasyltsov, Hee-Kwan Son. 341-347
- An Efficient Authentication Mechanism on Ad-Hoc Telematics EnvironmentEui-nam Huh, Seung-Yeon Lee, Youngsong Mun, Hyunseung Choo. 348-356
- An Enhanced One-Time Password ImplementationTeik Guan Tan. 357-363
- Online Fraud Detection System Based on Non-Stationery Anomaly DetectionJianyun Xu, Andrew H. Sung, Qingzhong Liu. 364-370
- Implementation of A Fast Square In RSA Encryption/Decryption ArchitectureHimanshu Thapliyal, M. B. Srinivas, Hamid R. Arabnia. 371-374
- A Parallel NIDS Pattern Matching Engine and Its Implementation on Network ProcessorJianming Yu, Jun Li. 375-384
- Group Communication: Design Challenges in the Development of Key Management Frameworks in Wireless Mobile EnvironmentsMiss Laiha Mat Kiah, Keith M. Martin. 385-391
- Steganography Analysis on Mobile DevicesTarek K. Alameldin, Saeed Iqbal, Vishal Saberwal. 392-397
- Proximity-Based Authentication for Mobile DevicesWayne A. Jansen, Serban I. Gavrila, Vlad Korolev. 398-404
- Spy Agents: Evaluating Trust in Remote EnvironmentsGeorgios Kalogridis, Chris J. Mitchell, Gary Clemo. 405-411
- Remote User Authentication Scheme with User AnonymityWei-Bin Lee, Hsing-Bai Chen, Chyi-Ren Dow. 412-420
- Verification of Fingertip Pattern on Gun HandleZong Chen, Michael Recce. 421-424
- Coarse Fingerprint Matching Based on Singular PointsYuan Luo, Marina L. Gavrilova. 425-433
- Dynamic Handgrip RecognitionZong Chen, Michael Recce. 434-439
- The Analysis of Pen Pressures of Handwritten Symbols on PDA Touch Panel using Self Orgazining MapsHiroshi Dozono, Daichi Takata, Masanori Nakakuni, Yoshio Noguchi. 440-445
- Biometric Authentication Using PKIChikara Ohkubo, Yoichi Muraoka. 446-452
- Design of IPv6-Based Mobile Routers for Network Mobility ApplicationsJiann-Liang Chen, Shih-Feng Sun. 453-459
- A Learning Model for Intrusion Detection Using Tolerance RelationFu-Shing Sun, Chun-Hung Tzeng. 460-466
- The changing face of application security: A look at the evolving security infrastructureNitin Gupta. 467-472
- Compound inversive congruential generator as a source of keys for stream ciphersJanusz Stoklosa, Jaroslaw Bubicz. 473-478
- The Data Handling Method of a Data Dispatcher Module in Web-Based SLA Monitoring and Reporting (WSMR) SystemEunjin Ko, Boosun Jeon, Nosam Park, Gilhaeng Lee. 479-483
- Design and Implementation of a Data Sharing Scheme with Security and Flexibility Applicable to Extended P2P SystemsGoo Yeon Lee, Yong Lee, Hwa Jong Kim, Choong Kyo Jeong, Dong-Eun Lee. 484-490
- Biometrics - Evaluating Security Technologies for Brazilian AirportsAlexandre Fernandes de Moraes, João Batista Camargo Jr.. 491-496
- AC/V Segmentation Approach for Mandarin Speech Based on Wavelet TransformChing-Tang Hsieh, Chu-Sheng Cheng, Chih-Hsu Hsu. 497-501
- IT Security ModelingAndrzej Bialas. 502-505
- A Spyware Prevention Model: A Proactive ApproachBrian P. Briammeier, Eltayeb Salih Abuelyaman. 506-511
- A Study on the Data Encipherment Equipment with Rijndael Algorithm in ATM NetworkSung-Yeal Im, Ki-Dong Chung. 512-517
- Host State Representation for Intrusion DetectionMira Kwak, Dong-Sub Cho. 518-523
- A Linear Dimension Reduction Technique For Face RecognitionMuhammad Almas, Muhammad Younus, Abdul Basit. 524