Abstract is missing.
- e-Business Innovation - Surviving the Coming DecadesDavid A. Marca. 5-16
- Detection of Illicit Traffic using Neural NetworksPaulo Salvador, António Nogueira, Ulisses França, Rui Valadas. 5-12
- Novel and Anomalous Behavior Detection using Bayesian Network ClassifiersSalem Benferhat, Karim Tabia. 13-20
- Improving Reliability in Commercial IP NetworksYaakov Kogan. 17-19
- Cryptographic Algorithms - Successes, Failures and ChallengesBart Preneel. 21-27
- New Schemes for Anomaly Score Aggregation and ThresholdingSalem Benferhat, Karim Tabia. 21-28
- Application to a Shared Terminal of a Roaming User Profile Set Up through LDAP-Smart Card Authentication CooperationKazuto Kuzuu, Yasushi Hirano, Kenji Mase, Toyohide Watanabe. 29-34
- Watermarking, Steganography and Content ForensicsIngemar J. Cox. 29-29
- Rethinking Digital SignaturesUeli M. Maurer. 31-33
- The Importance of Metrology in Wireless Communication Systems - From AM/FM to SDR SystemsNuno Borges Carvalho. 35-35
- Next Generation CDMA Technologies for Futuristic Wireless CommunicationsHsiao-Hwa Chen. 37
- Improved Fuzzy Vault Scheme for Fingerprint VerificationCengiz Örencik, Thomas Brochmann Pedersen, Erkay Savas, Mehmet Keskinoz. 37-43
- Ensuring Privacy of Biometric Factors in Multi-Factor Authentication SystemsKikelomo Maria Apampa, Tian Zhang, Gary B. Wills, David Argles. 44-49
- Alert Correlation based on a Logical Handling of Administrator Preferences and KnowledgeSalem Benferhat, Karima Sedki. 50-56
- Interactivity for Reactive Access ControlYehia Elrakaiby, Frédéric Cuppens, Nora Cuppens-Boulahia. 57-64
- Honeyd Detection Via Abnormal Behaviors Generated by the ARPD DaemonA. Boulaiche, Kamel Adi. 65-71
- Functionality-based Application Confinement - Parameterised Hierarchical Application RestrictionsZ. Cliffe Schreuders, Christian Payne. 72-77
- Security Policy Instantiation to React to Network Attacks - An Ontology-based Approach using OWL and SWRLJorge E. López de Vergara, Enrique Vázquez, Javier Guerra. 78-83
- Cryptonet: Secure E-Mail SystemSead Muftic, Gernot Schmoelzer. 84-91
- An Improvement of Strong Proxy Signature and Its ApplicationsMin-Shiang Hwang, Shiang-Feng Tzeng, Shu-Fen Chiou. 95-98
- A Note on Biometrics-based Authentication with Portable DeviceShinsuke Ohtsuka, Satoshi Kawamoto, Shigeru Takano, Kensuke Baba, Hiroto Yasuura. 99-102
- A Polynomial based Hashing AlgorithmV. Kumar Murty, Nikolajs Volkovs. 103-106
- Intrusion Detection and Prevention System using Secure Mobile AgentsMuhammad Awais Shibli, Sead Muftic. 107-113
- A Fast Encryption Scheme for Networks ApplicationsMohamed Abo El-Fotouh, Klaus Diepold. 119-127
- Quantifying Misbehaviour Attacks Against the Self-Organized Public Key Management on ManetsEduardo da Silva, Aldri Luiz dos Santos, Luiz Carlos Pessoa Albini, Michele N. Lima. 128-135
- Multiphase Deployment Models for Fast Self Healing in Wireless Sensor NetworksOmer Zekvan Yilmaz, Albert Levi, Erkay Savas. 136-144
- Novel Neurocomputing-based Scheme to Authenticate WLAN Users Employing Distance Proximity ThresholdTarik Guelzim, Mohammad S. Obaidat. 145-153
- SAKE - Secure Authenticated Key Establishment in Sensor NetworksMuhammad Yasir, Mureed Hussain, Kahina Kabri, Dominique Seret. 154-160
- Kerberos Implementation in ManetsAtta-ur-Rahman, Mureed Hussain, Kahina Kabri, Dominique Seret. 161-166
- SCFS: Towards Design and Implementation of a Secure Distributed FilesystemJuan Vera del Campo, Juan Hernández-Serrano, Josep Pegueroles. 169-176
- Key Management of Quantum Generated Keys in IPsecAndreas Neppach, Christian Pfaffel-Janser, Ilse Wimberger, Thomas Lorünser, Michael Meyenburg, Alexander Szekely, Johannes Wolkerstorfer. 177-183
- Ensuring the Correctness of Cryptographic Protocols with Respect to SecrecyHanane Houmani, Mohamed Mejri. 184-189
- Efficient Localization Schemes in Sensor Networks with Malicious NodesKaiqi Xiong, David J. Thuente. 190-196
- New Techniques to Enhance the Capabilities of the Socks Network Security ProtocolMukund Sundararajan, Mohammad S. Obaidat. 197-201
- An Efficient Methodology to Limit Path Length Guaranteeing Anonymity in Overlay NetworksJuan Pedro Muñoz-Gea, Josemaria Malgosa-Sanahuja, Pilar Manzanares-Lopez, Juan Carlos Sanchez-Aarnoutse, Joan GarcÃa-Haro. 205-208
- Price to Provide RFID Security and Privacy?Tim Good, Mohammed Benaissa. 209-213
- An e-Voting Protocol based on Pairing Blind SignaturesL. López-GarcÃa, Francisco RodrÃguez-HenrÃquez, Miguel León Chávez. 214-217
- Yet Another Secure Distance-Bounding ProtocolVentzislav Nikov, Marc Vauclair. 218-221
- Sec-SNMP: Policy-based Security Management for Sensor NetworksQinghua Wang, Tingting Zhang. 222-226
- Applying SRP on SIP AuthenticationCelalettin Kilinc, A. Gökhan Yavuz. 227-231
- A Multiple Birthday Attack on NTRURaphael Overbeck. 237-244
- Forward-Secure Proxy Signature and Revocation Scheme for a Proxy Signer with Multiple Original SignersB. B. Amberker, N. R. Sunitha. 245-252
- On the (In)Security of Two Buyer-Seller Watermarking ProtocolsGeong Sen Poh, Keith M. Martin. 253-260
- Key Distribution based on Quantum Fourier TransformMarius Nagy, Selim G. Akl, Sean Kershaw. 263-269
- FPGA-Targeted Hardware Implementations of K2Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai. 270-277
- Multi-Collisions Attack in Ring Hash StructureNasour Bagheri, Baback Sadeghiyan, Majid Naderi. 278-284
- Efficient IBE-PKE Proxy Re-EncryptionTakeo Mizuno, Hiroshi Doi. 285-293
- A Fair e-Tendering ProtocolVijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang. 294-299
- A General Framework for Guess-and-Determine and Time-Memory-Data Trade-Off Attacks on Stream CiphersGuanhan Chew, Khoongming Khoo. 300-305
- Secure Communication in Mobile Ad Hoc Network using Efficient Certificateless EncryptionPeter Hyun-Jeen Lee, Shivaramakrishnan Narayan, Parampalli Udaya. 306-311
- REBEL - Reconfigurable Block Encryption LogicMahadevan Gomathisankaran, Ka-Ming Keung, Akhilesh Tyagi. 312-318
- An Efficient Multiplication Algorithm using Binomial Residue RepresentationYin Li, Christophe Negre. 319-324
- A New Probabilistic Rekeying Method for Secure Dynamic GroupsShankar Joshi, Alwyn R. Pais. 325-330
- Traitor Tracing for Anonymous Attack in Content ProtectionHongxia Jin. 331-336
- Experimental Research and Capability Valuation on Security of SOA-SCA based SDOPeng Xu, Zhiyi Fang, Hang Su, Chuyi Wei. 337-341
- Identity-based Signcryption without Random OraclesShivaramakrishnan Narayan, Parampalli Udaya, Peter Hyun-Jeen Lee. 342-347
- Anonymous Message Authentication - Universally Composable Definition and ConstructionKazuki Yoneyama. 351-354
- An Efficient Reconfigurable SOS Montgomery Multiplier in GF (P) usign FPGA DSP SlicesMuhammed Nauman Qureshi, Muhammad Nadeem Sial, Nassar Ikram. 355-358
- A Short Note on Secret Sharing using Elliptic CurvesVolker Müller. 359-362
- Low Area Scalable Montgomery Inversion Over GF(2m)Mohamed N. Hassan, Mohammed Benaissa. 363-367
- Proper Key Generation for the IzoSign AlgorithmLoránd Szöllösi, Gábor Fehér, Tamás Marosits. 368-372
- Point Multiplication on Supersingular Elliptic Curves Defined over Fields of Characteristic 2 and 3Kwang Ho Kim, Christophe Nègre. 373-376
- Geographic Data and Steganography - Using Google Earth and KML Files for High-Capacity SteganographyMalte Diehl. 381-387
- Practical Application of a Security Management Maturity Model for SMEs based on Predefined SchemasLuÃs Enrique Sanchez, Daniel Villafranca, Eduardo Fernández-Medina, Mario Piattini. 391-398
- CSteg: Talking in C Code - Steganography of C Source Code in TextJorge Blasco AlÃs, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda Garnacho. 399-406
- An Event-Driven, Inclusionary and Secure Approach to Kernel IntegritySatyajit Grover, Divya Naidu Kolar Sunder, Samuel O. Moffatt, Michael E. Kounavis. 411-420
- The Substitution Cipher Chaining ModeMohamed Abo El-Fotouh, Klaus Diepold. 421-429
- A Heuristic Polynomial Algorithm for Local Inconsistency Diagnosis in Firewall Rule SetsSergio Pozo Hidalgo, Rafael Ceballos, Rafael Martinez Gasca. 430-441
- Security Requirements in Software Product LinesDaniel Mellado, Eduardo Fernández-Medina, Mario Piattini. 442-449
- A 640 Mbit/S 32-Bit Pipelined Implementation of the AES AlgorithmGuido Marco Bertoni, Luca Breveglieri, Roberto Farina, Francesco Regazzoni. 453-459
- Towards Language-Independent Approach for Security Concerns WeavingAzzam Mourad, Dima Alhadidi, Mourad Debbabi. 460-465
- Securing the Email Services - New System for Secure Managing the Organization s Mail ServiceRaúl Herbosa, Gabriel DÃaz, Manuel Castro. 469-472
- Metrics Application in Metropolitan Broadband Access Network Security AnalysisRodrigo Sanches Miani, Bruno Bogaz Zarpelão, Leonardo de Souza Mendes, Mario Lemes Proença Jr.. 473-476
- Security and Authentication for Networked StorageV. Kumar Murty, Guangwu Xu. 477-480
- A Review of Trust Management, Security and Privacy Policy LanguagesJuri Luca De Coi, Daniel Olmedilla. 483-490
- Autonomic Trust Management for a Pervasive SystemZheng Yan. 491-500
- Selecting Trustworthy Content using TagsDaniele Quercia, Licia Capra, Valentina Zanardi. 501-508
- Dynamics of Trust Evolution - Auto-configuration of Dispositional Trust DynamicsChristian Damsgaard Jensen, Thomas Rune Korsgaard. 509-517
- Trust Model for High Quality RecommendationGabriele Lenzini, Nabil Sahli, Henk Eertink. 518-528
- Enhanced Secure Interface for a Portable e-Voting TerminalAndré Zúquete. 529-537
- Reputation Management in Grid-based Virtual OrganisationsÃlvaro Enrique Arenas, Benjamin Aziz, Gheorghe Cosmin Silaghi. 538-545
- Formalizing End-to-End Context-Aware Trust Relationships in Collaborative ActivitiesIoanna Dionysiou, David E. Bakken, Carl H. Hauser, Deborah A. Frincke. 546-553