Abstract is missing.
- A Fast FPGA Implementation of Tate Pairing in Cryptography over Binary FieldJian Huang, Jooheung Lee, Hao Li. 3-9
- Impossible Differential Cryptanalysis of Safer++Behnam Bahrak, Taraneh Eghlidos, Mohammad Reza Aref. 10-14
- Cryptographic Voter-Verifiability: Practical ApproachSantosh Kumar Yadav. 15-21
- Using a PC Camera to Generate Cryptographically Strong Random NumbersRigan Ap-apid. 22-27
- Exploration of Quantum Cryptography in Network Security: The Case Study of The DARPA Quantum Cryptography NetworkMehrdad Sharbaf. 28-33
- Invertibility Issues of Truncated Polynomials in NTRU CryptosystemsKrishna Subba Rao Pulugurta, Venkata Satyavathi Lakshmi Jagadamba Pulugurtha, Viswanadham Balla. 34-37
- Incremental Fingerprint Recognition Model for Distributed AuthenticationQikan Fang, Nandita Bhattacharjee. 41-47
- How to Integrate Diverse Client Authentication Protocol with various authentication meansHyungkyu Lee, Jongwook Han, Kyoil Chung. 48-52
- Realization of Customer Authentication by SMS and a New Way to Pay in e-CommerceBen Salah Abderrazak. 53-57
- A Method of Automatic User Authentication by Fulltime Monitoring of Keystroke TimingsMasanori Nakakuni, Hiroshi Dozono, Eisuke Ito, Yoshiaki Kasahara. 58-63
- Ownership Transfer of RFID Tags based on Electronic FingerprintSenthilkumar Chinnappa Gounder Periaswamy, Dale Thompson, Jia Di. 64-67
- E-mail Security and Authentication Using Captcha and DSAS. Giftson Selladurai, S. Aathi Lingam, J. Anish Jeo Blysis, Sylvia Lilly Jebarani. 68-74
- General Authentication TestJiafen Liu, Mingtian Zhou. 75-80
- Digital Watermarking Technique for Ownership Claim using Buyer SignatureSarabjeet Singh Bedi, Harpreet Singh Sobti, Rabia Bano, Shekhar Verma. 81-86
- Efficient Biometrics Remote User Authentication SchemeMing-Jheng Li, Justie Su-tzu Juan. 87-90
- A Novel Group Key Management Scheme for Privacy Protection Sensitive Information SystemsXianping Wu, Huy Hoang Ngo, Phu Dung Le, Balasubramaniam Srinivasan. 93-99
- An Authorization Scheme Using partial ID for Privacy protection in RFIDChung S. Rhee, Shi Mei Jin Jin, Yong Zhen Li Li. 100-105
- Making A CASE for PACE: Components of the Combined Authentication Scheme Encapsulation for a Privacy Augmented Collaborative EnvironmentGeoff Skinner. 106-112
- A Theory of Probabilistic One-Time PasswordsMark Bedworth. 113-118
- Password Entry Scheme Resistant to EavesdroppingBogdan Hoanca, Kenrick J. Mock. 119-125
- Design of an Automatic Password Protection Mechanism for Digital DocumentsShashank Kaushik, Thomas Way. 126-132
- Visual Applications of Probabilistic One-Time Passwords for Personal AuthenticationMark Bedworth, Colin Allison. 133-138
- Virtual Password: Virtual Environment Based User AuthenticationM. N. Doja, Naveen Kumar. 139-144
- Experiments with a Visual Probabilistic One-Time Password Authentication SystemColin Allison, Mark Bedworth. 145-148
- Automated Intrusion Response System: Surveys and AnalysisBoutheina A. Fessi, Mohamed Hamdi, Salah Benabdallah, Noureddine Boudriga. 149-155
- IPSec Mechanism for Implementing VPNOlalekan Adeyinka. 156-160
- Remote IP Addresses Based Intrusion DetectionSeon Hwan Kim, Jang-Su Park, Byoungchul Ahn. 161-164
- Website Registration Using Link for PrivacyJong-Hyuk Roh, Seung Hun Jin. 165-167
- Forensic Protocol Filtering of Phone ManagersWayne Jansen, Aurélien Delaitre. 171-177
- Conceptual Modeling of Information Systems for Integrated IT-Risk and Security ManagementHeinz Lothar Grob, Gereon Strauch, Christian Buddendick. 178-184
- A Security Design for Information Sharing between Control System and Information SystemJeong Ryou. 185-189
- Raising Awareness in Information Security: Everyone Should ParticipateIlze Murane. 190-195
- On Providing Automatic Parental Consent over Information Collection from ChildrenKarthik Channakeshava, Kaigui Bian, Michael S. Hsiao, Jung Min Park, Robert E. Crossler, France Belanger, Payal Aggarwal, Janine Hiller. 196-202
- Approximate Packet Pre-filtering to Accelerate Pattern MatchingBenfano Soewito, Ning Weng. 203-209
- Physical Access Control with Biometric KeysMasakatsu Nishigaki, Yoichi Shibata. 213-219
- Service Independent Access Control Architecture for User Generated Content (UGC)Akira Yamada, Ayumu Kubota, Yutaka Miyake. 220-226
- Comparison of Threshold Proxy Signature SchemesHarsh Kumar Verma, Kamalpreet Kaur, Raman Kumar. 227-231
- A Generalized Chaos Synchronization Based Digital Signature Scheme with ApplicationLi Cao, Ye Ji, Lequan Min. 232-237
- New Proxy Signature, Proxy Blind Signature and Blind Proxy Signature Based on the Okamoto SignatureHoda Jannati, Javad Mohajeri, Mahmoud Salmasizadeh. 238-242
- Abstracting Parent Mitigations from the CAPEC Attack Pattern DictionaryPatrick Henry Engebretson, Joshua J. Pauli, Kevin Streff. 245-250
- DDoS Attack Detection Based on Compensation Non-Parameter CUSUM AlgorithmFen Yan, Yiqun Chen, Xinchun Yin, Hao Huang. 251-257
- A Framework of Decentralized PKI Key Management Based on Dynamic TrustZhiqian Xu, Hai Jiang. 258-264
- Design Principles of a Decision Support System for Critical Information Infrastructure ProtectionHeinz Lothar Grob, Jan Hermans, Gereon Strauch. 267-273
- TUVNL: An Experimental Network Security Lab for Research and EducationChung-Han Chen. 274-277
- Secure Resource Sharing in Ad hoc NetworksMichaela Greiler, Peter Schartner. 278-284
- Securing Security Policies in Autonomic Computing SystemsGhassan Jabbour, Daniel A. Menascé. 285-291
- Performance Evaluation of Secured versus Non-Secured EIGRP Routing ProtocolKhalid Abu Al-Saud, Hatim Mohd Tahir, Adel A. El-Zoghabi, Mohammad Saleh. 292-297
- A Multi-Layered Approach to Botnet DetectionRobert Erbacher, Adele Cutler, Pranab Banerjee, Jim Marshall. 301-308
- Phishing Guard and Antivirus: A New ApproachBahram Sadeghi Bigham, Sasha Chernin, Akram Madadi, Najme Madadi, Pedram Tavajoh. 309-312
- Web SpoofingAhmad Ghafarian. 313-317
- Steps for Improving Data Comprehension for Digital Security and ForensicsRobert Erbacher. 318-326
- Multi-Map Orbit Hopping Chaotic CipherXiaowen Zhang, Li Shu, Ke Tang. 327-332
- Combining the SMTP tar pit simulator with white listingTobias Eggendorfer. 333-339
- Security at the Terminal Building at AirportsKatalin Emese Bite. 340-344
- Considerations of the SLA management systemJun-Woo Lee, Mi Kyung Han, Gil-heang Lee. 345-349
- 3D Face Recognition for Unattended Border ControlChristoph Busch, Alexander Nouak. 350-356
- A Client-Server Approach to Capture Web Browsing HistoryScott Peterson, Ray Kresman. 357-362
- Managing Diversity in NetworksAbdulrahman Alarifi. 363-373
- System Isolation Beyond BIOS using the Unified Extensible Firmware InterfaceVincent Zimmer. 374-380
- Distributed Authorization CacheChing-Ching Lee, Kamalendu Biswas. 381-386
- Detection of Malicious User in Oracle 10g DBMS and Cost of EliminationMd. Saifuddin Khalid, Md. Ruhul Amin. 387-390
- The Multi-Map Orbit Hopping MechanismXiaowen Zhang. 391-394
- An Improved Indexing Scheme for Range QueriesYvonne Yao, Huiping Guo, Chengyu Sun. 397-403
- Robust Distance-Based Watermarking for Digital ImageA. S. Abdul-Ahad, Baran Çürüklü, Waleed A. Mahmoud. 404-409
- Forensic Data Acquisition from Cell Phones using JTAG InterfaceKeonwoo Kim, Dowon Hong, Jae-Cheol Ryu. 410-414
- Secure Inter-Vehicle Vital Signal Communication via Short Dynamic Group ManagementXidong Wang, Charlie Gladden, Huirong Fu. 415-421
- Support for multiple federation technologies in a Single Sign On architectureManuel Sánchez, Óscar Cánovas Reverte, Gabriel López. 422-427
- Requirements for Digital Forensics Investigation Domain-Specific LanguagesPhillip Bradford, Daniel Ray. 428-434
- Synchronous Key Generation from Chaotic SystemsAnthony Weitekamp, Dulal Kar, Mario Garcia, George Tintera. 437-442
- Memetic & Genetic Algorithms: A Comparison between two approaches for the cryptanalysis of Simplified Data Encryption Standard algorithmPoonam Garg Poonam, Atul Garg Atul. 443-448
- Encryption and Decryption of Bitmap Images via Blowfish and Pseudo Triple DES Block Cipher Algorithms in Distributed SystemsKiavash Bahreini. 449-455
- DES Enhancement Using Key-Based Randomized Initial PermutationShakir Hussain, Hussein Al-Bahadili. 456-459
- New S-box Design of Advance Encryption Standard, AESMohammad Ibrahim Al-qudah Doa. 460-465
- A Scalable Security Protocol for Wireless Sensor NetworksMohamed Watfa, Marwa El-Ghali, Hiba Halabi. 466-472
- Implementing Cryptography for Packet Level AuthenticationBilly Bob Brumley. 475-480
- Secure Authentication in Virtual Community by Using Media Access Control address (MAC)Sunghyuck Hong, Junghoon An. 481-485
- Security Modification for the Hwang-Wen-Hwang s E-voting SchemeMaryam Rajabzadeh Asaar, Javad Mohajeri, Mahmoud Salmasizadeh. 486-490
- Implementations of Montgomery Multiplication Algorithms in Machine LanguagesEmre Celebi, Mesut Gozutok, Levent Ertaul. 491-497
- Implementation of Domingo Ferrer s a New Privacy Homomorphism (DF a New PH) in Securing Wireless Sensor Networks (WSN)Levent Ertaul, Johan H. Yang. 498-504
- A Cryptographic Protocol for E-Voting SystemsKevin Daimi, Ya-Chin Hsu, Yu-Ping Lin, Lingyun Zheng. 505-513
- Real Time Cryptanalysis of Unsystematic CipherEsen Akkemik, Orhun Kara. 514-520
- A Secure Online Chat SystemOleg Epelbaum, Afrand Agah, Mehran Asadi. 523-531
- Developing Applications for Lego Robots Using Multiple PlatformsStanley Perli, Mehran Asadi, Afrand Agah. 532-537
- Automatic Formation of Abstract State Space Representations for Reinforcement Learning Agents Agents with Hierarchical Skill SetsMehran Asadi, Manfred Huber. 538-543
- Decision Assistant Model for the Identity Selector in User-Centric IdmSeung-Hyun Kim, Seung Hun Jin. 547-554
- An Ad Hoc Trust Inference Model for Flexible and Controlled Information SharingDanfeng Yao. 555-561
- Web Intrusion Detection Using a Graph-based Sequence Learning AlgorithmYuhong Dong, Bing Wu. 565-570
- An Integrated Face-Gait System for Automatic Recognition of HumansRabia Jafri, Hamid R. Arabnia, Kathy J. Simpson. 571-581
- Intrusion Detection System for Wireless Sensor NetworksRahat Qureshi, Min Chang, Hesiri Weerasinghe, Huirong Fu. 582-585
- Ontology-based Approach to the Common Criteria Compliant IT Security DevelopmentAndrzej Bialas. 586-592
- Forensic Implications of Using the Firewire Memory Exploit with Microsoft Windows XPAndrew Woodward, Peter Hannay. 593-597
- Is There an Ideal Forensic Process?Patricia A. H. Williams. 598-603
- A Study into the Forensic Recoverability of Data from 2nd Hand Blackberry Devices: World-Class Security, Foiled by HumansCraig Valli, Andy Jones. 604-607
- What Artifacts do Current BitTorrent Clients Leave Behind?Andrew Woodward. 608-613
- Integrating Forensics Capabilities into Web Applications: Teaching Students the Why and HowJustin Brown, Greg Baatard. 614-619
- Cold Boot Memory Acquisition: An Investigation into Memory Freezing and Data Retention ClaimsPeter Hannay, Andrew Woodward. 620-622
- A Comparison Between Residues of Prime Numbers and Arithmetic Modulo Powers of Two for S-Box ImplementationEltayeb S. Abuelyaman, Abdul-Aziz S. Alsehibani. 623-630
- Matrix Cipher and Its Application in Computer SecurityNgoc Bao Tran, Dinh Thuc Nguyen. 631-637
- Authentication Architecture Based on Crypto-Biometric SystemsParman Sukarno, Nandita Bhattacharjee. 638-644
- Towards a Mobile Applications Security ApproachSofien Beji, Nabil El-Kadhi. 645-654
- Identity Authentication ServicesMaria Jesús Poza, Luis A. Puente, Belén Ruíz, Juan Miguel Gómez. 655-659
- A Knowledge-Based Distributed Biometric Authentication Entity MechanismMaria Jesús Poza, Luis A. Puente, Diego Carrero, Juan Miguel Gómez. 660-662
- An Adaptive Coding Algorithm for Secret Transmission of InformationCharlie Obimbo. 663-668
- An Image-Based Website User Authentication Mechanism Using Smart CardMisbahuddin Mohammed, P. Premchand, A. Govardhan. 669-674
- Framework Proposal for Sender s AuthenticationPedro Ashidani, Jamil Barbar, Luis Faina, Ítalo S. Cunha. 675-679