Abstract is missing.
- Intrusion Detection System to Detect Wormhole Using Fault Localization TechniquesMaitreya Natu, Adarshpal S. Sethi. 3-9
- Intrusion Detection in Wireless Sensor NetworksHong Nguyen, Ravi Palaniappan, Nevin Aydin, Shiyuan Jin, Damla Turgut. 10-16
- Distance Measures for Anomaly Intrusion DetectionWei Wang, Sylvain Gombault. 17-23
- An Intrusion Detection Model Based on Intention ModelingJun Lu, Chong-Jun Wang, Jun Wang, Shifu Chen. 24-29
- Intelligent Mobile Agent for Intrusion Detection SystemRéginalds Lips, Nabil El-Kadhi. 30-38
- An Overview of Multi-modal Biometrics for AuthenticationSlobodan Dokic, Andrea Kulesh, Megha Dombal, Huirong Fu. 39-44
- A study on biometric key generation from fingerprints: Fingerprint-key generation from stable feature valueYoichi Shibata, Masahiro Mimura, Kenta Takahashi, Masakatsu Nishigaki. 45-51
- On the Generation of X.509v3 Certificates with Biometric InformationGuillermo Martínez-Silva, Francisco Rodríguez-Henríquez, Nareli Cruz Cortés, Levent Ertaul. 52-57
- Improvement of User Authentication Using Schema of Visual Memory: Guidance by Verbal CueTakumi Yamamoto, Atsushi Harada, Takeo Isarida, Masakatsu Nishigaki. 58-64
- An Efficient Authentication Protocol for GSMAshutosh Saxena, Shailaja Gummadidala, Phani Kumar Kancharla. 65-69
- Combinatorial Approach For Authentication Based on Face RecognitionAtluri Kavitha, Dhavala Lalitha Bhaskari, Peri S. Avadhani. 70-75
- User Authentication via Mouse Biometrics and the usage of Graphic User Interfaces: An Application ApproachJ. Octavio Gutiérrez-García, Félix F. Ramos Corchado, Herwig Unger. 76-82
- A Unified Approach To Construct Non-perfect Secret Sharing And Traitor Tracing SchemesKannan Karthik, Dimitrios Hatzinakos. 83-89
- Visual Multi-Secret Sharing Scheme with Cheater IdentificationNu-El Choi, Eun-Jun Yoon, Hyun-Jin Park, Kee-Young Yoo. 90-96
- ParseKey+: A Five-Way Strong Authentication Procedure as an Approach to Client/Server Impersonation Avoidance using Steganography for Key EncryptionBehnam Rahnama, Atilla Elçi. 97-106
- Steganographic File System Development Based On The Information Hiding Scheme By Permutation Of Sequence ElementsHayk Ghazaryan. 107-111
- Proposal on Automatic Authentication of Cellular Phones by Using Force SensorJujia Wang, Yoichi Muraoka. 112-117
- A New Steganography Scheme using a FrameHyun-Jin Park, Eun-Jun Yoon, Kee-Young Yoo. 118-122
- Performance Optimization of Close-Color Pair SteganalysisPaul Seymer, George Dimitoglou. 123-130
- A Time-Bound Hierarchical Key Assignment Cryptosystem with No Lifetime LimitJyh-haw Yeh. 131-137
- Colored Probabilistic Visual Cryptography Scheme with ReversingFeng Yi, Daoshun Wang, Xiaobo Li, Yiqi Dai. 138-141
- RSA and Elliptic Curve- ElGamal Threshold Cryptography (ECCEG-TC) Implementations for Secure Data Forwarding in MANETsLevent Ertaul, Nitu Chavan. 142-146
- Using Generated Digital Images to Modify the PGP Cryptography ProtocolHilal M. Yousif Al-Bayatti, Abdul Monem Rahma, Hala Bahjat AbdulWahab. 147-151
- Solving Semantic Problems in Chaff and Winnowing Problem by Using CryptographySara Mohamadrezaei, Bahram Sadeghi Bigham. 152-156
- Exploiting Silence for Ciphertext Only Cryptanalysis of Stream Ciphered Digitized VoiceLiaqat Ali Khan, M. Shamim Baig, M. Ashraf Ashraf. 157-164
- A Formal Approach for Security Policy Enforcement in Concurrent ProgramsMahjoub Langar, Mohamed Mejri, Kamel Adi. 165-171
- Triangulating the Views of Human and Non-Human Stakeholders in Information System Security Risk AssessmentLizzie Coles-Kemp, Richard E. Overill. 172-178
- Security Based Heuristic SAX for XML ParsingWei Wang. 179-185
- Calculating the Return on Security Investments - An Approach Based on Principles of Capital BudgetingJan vom Brocke, Heinz Lothar Grob, Gereon Strauch, Christian Buddendick. 186-191
- Security and Privacy: Open Issues with RFIDShoua Yang, Shanti Sukumaran, Dipali Yermalkar, Hesiri Weerasinghe, Huirong Fu. 192-197
- Universally Unique Identifiers: How To Ensure Uniqueness While Protecting The Issuer s PrivacyMartin Schaffer, Peter Schartner, Stefan Rass. 198-204
- Enhanced User Privacy on Trusted ProcessorsValli Kumari Vatsavayi, K. V. S. V. N. Raju. 205-210
- Implementation of Protections as the Element of Information System Security Management. Experiences of Polish EnterprisesAdam Nowicki, Artur Rot, Leszek Ziora. 211-216
- Secure Web Applications: A Systematic ApproachHabtamu Bogale, Jigang Liu. 217-222
- Modeling the Security Objectives According to the Common Criteria MethodologyAndrzej Bialas. 223-229
- Extending Security/Sustainability through Pervasive Spider Web Networks in UrbanismLi-Yen Hsu, Shin-Shin Kao. 230-235
- Advance Diagnosis of Information Security for the Mobile RFID ServiceKi-Hyang Hong, Gang Shin Lee, Jae-il Lee, Ik-Sub Lee. 236-241
- A Study of Estimate Risk Level Model Based on Security MaturityJin-Sub Park, Young-Sun Shin, Jung-Jin Park, Sung-Gi Kang. 242-247
- More Security on Tunisian e-Commerce Payments by Using SMS for Customer s Authenticity With National Post OfficeBen Salah Abderrazak. 248-254
- A Brief Study of Students Attitudes, Curiosity, Interest, and Perceptions of Information and National SecuritySarah M. North, Max M. North. 255-259
- A Key-Set Label Model for Protecting Information SecurityMin Guo, Meng Cao. 260-266
- A Secure Key Distribution Scheme in Wireless Sensor Networks Using Dynamic Clustering AlgorithmsDongmin Choi, Yeojin Lee, Choongyong Cho, Okbin Lee, Yongkeun Bae, Ilyong Chung. 267-273
- Enhanced Multi-Level Security: Secure SharingShima Izadpanahi, Muhammad Reza Fatemi. 274-276
- A Trusted Domain-based Approach for Authorization and Delegation on Mobile Distributed SystemGuoqing Tu, Pingxiang Li. 277-281
- 4G and Manet, Wireless Network of Future BattlefieldMarcin Szczodrak, Jinwoo Kim. 282-290
- Economic Evaluation of IT SecurityMohammed Ketel. 291-297
- A Generic Metric for Evaluation of Database SecurityGregory Vert, Phanid Dogiparthi. 298-305
- Evaluation of the S-Box Construction Using Arithmetic Modulo Prime NumbersEltayeb Abuelyaman, Mohammed El-Affendi. 306-309
- On the Security of 802.11 and 802.1X: Evaluating an Embedded Network StackHareesh Khattri, Salvador Mandujano. 310-316
- Analysis of Probabilistic Information Flow Security PropertiesBo Chen, Baohua Zhao, Chao Lu. 317-322
- Analysis of Smart Card-Based Remote User Authentication SchemesRonggong Song, Larry Korba, George Yee. 323-329
- Analysis of Software Vulnerability in Sensor NodesQijun Gu. 330-336
- The Analysis of Key Typing Sounds using Self Organizing MapsHiroshi Dozono, Shinsuke Ito, Hisao Tokushima, Masanori Nakakuni. 337-341
- A Survey on Digital Watermarking TechnologiesHesham Elzouka, Fatma Zada. 342-349
- A Study about DDoS Attacks in SIP EnvironmentsLuigi Alcuri, Pietro Cassarà. 350-357
- Survey on Reputation Management Systems in P2P NetworkEunJoung Byun, SungJin Choi, Chong-Sun Hwang, SangKeun Lee. 358-366
- Software Protection by Hardware and ObfuscationBin Fu, Sai Aravalli, John Abraham. 367-373
- An Ontology for the Management of Heteregenous Alerts of Information SystemFatiha Benali, Véronique Legrand, Stéphane Ubéda. 374-380
- Allocation of Partitioned Data by Using A Neural Network Based ApproachManghui Tu, Dongfeng Wang, Peng Li, Nasser Tadayon. 381-387
- Reducing Spam Using Network Management TechniquesTobias Eggendorfer. 388-394
- Immunity to Passive Attacks on Generic RNG ModelIhor Vasyltsov, Eduard Hambardzumyan. 395-399
- Platform Trust Beyond BIOS Using the Unified Extensible Firmware InterfaceVincent Zimmer. 400-405
- Contextual Risk-Based Access ControlNguyen Ngoc Diep, Sungyoung Lee, Young-Koo Lee, Heejo Lee. 406-412
- A Practical English Auction Based on the Discrete LogarithmsMing-Jheng Li, Justie Su-tzu Juan. 413-419
- Efficient Encrypted Storage Structure for Prevention of Information LeakageMeixing Le, Jiajin Le. 420-425
- Finding the Change-Point in a Binary Stream with Two Unknown, but Distant, DistributionsPhillip G. Bradford, Daniel A. Ray. 426-431
- Non-linear and Non-group Cellular Automata for Cryptographic ApplicationsSe-Min Kim, Jun-Cheol Jeon, Byung-Heon Kang, Sang-Ho Shin, Kee-Young Yoo. 432-438
- A Secure E-cash Scheme with Optional TraceabilityChih-Hung Wang, Chien-Chang Feng. 439-445
- Totally Asynchronous Stream Ciphers + Redundancy = CryptcodingDanilo Gligoroski, Smile Markovski, Ljupco Kocarev. 446-451
- A PDA Implementation of an Off-line e-Cash ProtocolEfrén Clemente-Cuervo, Francisco Rodríguez-Henríquez, Daniel Ortiz Arroyo, Levent Ertaul. 452-458
- Design and Performance Analysis of an Enhanced Group Key Generation ProtocolSunghyuck Hong, Noé Lopez-Benitez. 459-466
- Security Tools for GRID- SystemsA. Palagin, N. Alishov, George Markowsky, Anatoly Sachenko, Volodymyr Turchenko. 467-473
- Survey of Supercomputer Cluster Security IssuesGeorge Markowsky, Linda Markowsky. 474-480
- RF Eavesdropping Beowulf ClustersGeorge Markowsky. 481-488
- The Issues Involved in Securing Electronic Health Information in TransitRachel J. Mahncke, Patricia A. H. Williams. 489-495
- Implications for Use of Different Encryption Algorithms on Power Consumption for Mobile Devices in the Healthcare IndustryDanny Ng, Andrew Woodward. 496-500
- Wireless Rx - Risk Assessment and Recommendations for Securing a Wireless Network in a Medical PracticeAndrew Woodward, Patricia A. H. Williams. 501-505
- IT Sharps: Issues Relating to Securely Disposing of Hard Disks from Medical Information SystemsCraig Valli. 506-509
- A Holistic Perspective on Models for Medical Information SecurityPatricia A. H. Williams. 510-519
- KILL Features of RFID Tags in a Medical Environment: Boon or Burden?Christopher Bolan. 520-526
- The Use of Watermark for the Authentication of Digital Images Mapped Through the Use of the Wavelet TransformFernanda Mendes, Jamil Salem Barbar, Gustavo S. B. do Carmo. 527-533
- PCA-Based Methods for Face RecognitionRabia Jafri, Hamid R. Arabnia. 534-541
- Using Honeynets and Alerts Correlation for Intrusion Detection and PreventionRichard A. Wasniowski. 542-545
- A New Public Key Encryption Scheme Equivalent to FactoringKooshiar Azimian, Javad Mohajeri, Mahmoud Salmasizadeh. 546-552
- Enhancement of Information Hiding Using XMLAmit Jain. 553-558
- Remote Group User Authentication with Forward Secrecy and Key Agreement with SmartcardDan T. F. Chan, Siu-Ming Yiu, Lucas Chi Kwong Hui. 559-565
- Further Discussions on the Security of a Nominative Signature SchemeLifeng Guo, Guilin Wang, Duncan S. Wong, Lei Hu. 566-572
- A Novel Unified Control Architecture for a High-Performance Network Security AcceleratorHaixin Wang, Yao Yue, Chunming Zhang, Guoqiang Bai, Hongyi Chen. 573-579
- A MLS Cooperation System Based on Virtual Machine MonitorDong GuiShan, Li Xin, Lu XianLiang. 580-584
- Education in Software SecurityChung-Han Chen, Hira N. Narang. 585-590
- Embedded Processor SecurityBrian J. d Auriol, Tuyen Nguyen, Vo Quoc Hung, Duc Thang, Hassan Jameel, Le Xuan Hung, Syed Muhammad Khaliq-ur-rehman Raazi, Dao Phuong Thuy, Ngo Trong Canh, Adil Mehmood Khan, Sunghyun Kim, Shu Lei, Sakib Pathan, Tran Van Phuong, Sungyoung Lee, Young-Koo Lee. 591