Abstract is missing.
- Adaptive Antennas in Wireless Communication NetworksBlagovest Shishkov. 5-17
- One-touch Financial Transaction AuthenticationDaniel V. Bailey, John G. Brainard, Sebastian Rohde, Christof Paar. 5-12
- Service and Timeframe Dependent Unlinkable One-time PseudonymsKristof Verslype, Bart De Decker. 13-20
- Protecting Information Privacy in the Electronic SocietyPierangela Samarati. 19-19
- e-Business Design - A Shift to AdaptabilityDavid A. Marca. 21-29
- An Anomaly-based Web Application FirewallCarmen Torrano-Gimenez, Alejandro Perez-Villegas, Gonzalo Ãlvarez. 23-28
- Visual Programming Language for Security Requirements in Business Processes as Model-driven Software DevelopmentMirad Zadic, Andrea Nowak. 29-36
- Cloud Computing - Fundamental Architecture & Future ApplicationsFrank Leymann. 31-31
- Web 2.0: A Buzzword, a Serious Development, just Fun, or What?Gottfried Vossen. 33-40
- Finger Vein Verification Technology for Mobile ApparatusHideo Sato. 37-41
- Efficient Algorithms and Abstract Data Types for Local Inconsistency Isolation in Firewall ACLsSergio Pozo, A. J. Varela-Vaca, Rafael M. Gasca, Rafael Ceballos. 42-53
- Universal Authentication Framework - Requirements and Phase DesignJan Hajny, Tomas Pelka, Petra Lambertova. 57-60
- Adding Expert Knowledge to TAN-based Intrusion Detection SystemsSalem Benferhat, A. Boudjelida, Habiba Drias. 61-64
- Preventing Wormhole Attack in Wireless Ad Hoc Networks using Cost-based SchemesMarianne Azer, Sherif El-Kassas, Magdy M. S. El-Soudani. 69-74
- An Offline Peer-to-peer Broadcasting Scheme with AnonymityShinsaku Kiyomoto, Kazuhide Fukushima, Keith M. Martin. 75-82
- Network Stack Optimization for Improved IPsec Performance on LinuxMichael G. Iatrou, Artemios G. Voyiatzis, Dimitrios N. Serpanos. 83-91
- Attack Graph Generation with Infused Fuzzy ClusteringSudip Misra, Mohammad S. Obaidat, Atig Bagchi, Ravindara Bhatt, Soumalya Ghosh. 92-98
- RFID Authentication Protocols based on Elliptic Curves - A Top-Down Evaluation SurveyMichael Hutter. 101-110
- Fast Re-estabilishment of IKEv2 Security Associations for Recovery of IPsec Gateways in Mobile NetworkPeng Yang, Yuanchen Ma, Satoshi Yoshizawa. 111-116
- Monitoring Node Selection Algorithm for Intrusion Detection in Congested Sensor NetworkJaeun Choi, Myungjong Lee, Gisung Kim, Sehun Kim. 117-120
- Throttling DDoS AttacksSaraiah Gujjunoori, Taqi Ali Syed, Madhu Babu J., Avinash D., Radhesh Mohandas, Alwyn R. Pais. 121-126
- Assessment of Mobile Security PlatformsGermán Retamosa, Jorge E. López de Vergara. 127-132
- Simulation of an Identity-based Cryptography Scheme for Ad Hoc NetworksPura Mihai-Lica, Victor Valeriu Patriciu, Ion Bica. 135-139
- Behavior-based Clustering for Discrimination between Flash Crowds and DDoS AttacksYoung-Jun Heo, Jintae Oh, Jongsoo Jang. 140-143
- Evaluation of Quality and Security of a VoIP Network based on Asterisk and OpenVPNDherik Barison, Rodrigo Sanches Miani, Leonardo de Souza Mendes. 144-147
- A Traffic Coherence Analysis Model for DDoS Attack DetectionHamza Rahmani, Nabil Sahli, Farouk Kammoun. 148-154
- Resisting Impersonation Attacks in Chaining-based Public-Key Management on Manets - The Virtual Public-key ManagementRenan Fischer e Silva, Eduardo da Silva, Luiz Carlos Pessoa Albini. 155-158
- Resynchronization Attack on Stream Ciphers Filtered by Maiorana-McFarland FunctionsGuanhan Chew, Aileen Zhang, Khoongming Khoo. 159-162
- Implementing True Random Number Generators in FPGAs by Chip FillingOctavian Cret, Radu Tudoran, Alin Suciu, Tamas Györfi. 167-174
- Quantum Secure Direct Communication using Entanglement and Super Dense CodingOla M. Hegazy, Ayman M. Bahaa Eldin, Yasser H. Dakroury. 175-181
- An Efficient Group Key Agreement Protocol for Heterogeneous EnvironmentMounita Saha, Dipanwita Roy Chowdhury. 182-189
- Certified Pseudonyms Colligated with Master Secret KeyVijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang. 190-197
- The Chameleon Cipher-192 (CC-192) - A Polymorphic CipherMagdy Saeb. 198-209
- A New Analysis of RC4 - A Data Mining Approach (J48)Mohsen Hajsalehi Sichani, Ali Movaghar. 213-218
- On the Security of Two Ring Signcryption SchemesS. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan. 219-224
- Practical Traceable Anonymous IdentificationDaniel Slamanig, Peter Schartner, Christian Stingl. 225-232
- Information-theoretically Secure Strong Verifiable Secret SharingChanglu Lin, Lein Harn, Dingfeng Ye. 233-238
- Safe Reverse Auctions Protocol - Adding Treatment Against Collusive Shill Bidding and Sniping AttacksLeonardo Ribeiro, Guerra Ruy. 239-244
- A Second Preimage Attack on the Merkle-Damgard Scheme with a Permutation for Hash FunctionsShiwei Chen, Chenhui Jin. 245-248
- On the Security of Adding Confirmers into Designated Confirmer SignaturesWataru Senga, Hiroshi Doi. 249-256
- A Chaos based Encryption Method using Dynamical Systems with Strange AttractorsS. Arash Sheikholeslam. 259-265
- Interactive Secret Share ManagementConstantin Catalin Dragan. 266-269
- Efficient Traitor Tracing for Content ProtectionHongxia Jin. 270-273
- Ad-hoc on Demand Authentication Chain Protocol - An Authentication Protocol for Ad-Hoc NetworksA. M. Hamad, W. I. Khedr. 274-284
- Nmix: An Ideal Candidate for Key MixingJaydeb Bhaumik, Dipanwita Roy Chowdhury. 285-288
- A New Image Encryption Algorithm using Cellular AutomataMayank Varshney, Dipanwita Roy Chowdhury. 289-292
- Tool Support for Achieving Qualitative Security Assessments of Critical Infrastructures - The ESSAF Framework for Structured Qualitative AnalysisHanh Quyen Nguyen, Friedrich Köster, Michael Klaas, Walter Brenner, Sebastian Obermeier, Markus Brändle. 297-304
- Collaborative Security Assessments in Embedded Systems Development - The ESSAF Framework for Structured Qualitative AnalysisFriedrich Köster, Michael Klaas, Hanh Quyen Nguyen, Walter Brenner, Markus Brändle, Sebastian Obermeier. 305-312
- An Approach for Designing of Enterprise IT Landscapes to Perform Quantitave Information Security Risk AssessmentAnton Romanov, Eiji Okamoto. 313-318
- Identifying Security Elements for Cooperative Information SystemsNathalie Dagorn. 319-324
- Multiparty Comparison - An Improved Multiparty Protocol for Comparison of Secret-shared ValuesTord Ingolf Reistad. 325-330
- The Dark Side of Security by Obscurity - and Cloning MiFare Classic Rail and Building Passes, Anywhere, AnytimeNicolas Courtois. 331-338
- Free Security Suite 2 - Easy, Intuitive and Complete Free Security Suite with Web Browser IntegrationJavier Corral-GarcÃa, Carlos-Jorge del Arco González, José Luis González Sánchez, José Luis Redondo GarcÃa. 341-344
- Security Patterns, Towards a Further LevelBeatriz Gallego-Nicasio, Antonio Muñoz, Antonio Maña, Daniel Serrano. 349-356
- Iterated Transformations and Quantitative Metrics for Software ProtectionMariusz H. Jakubowski, Chit Wei Saw, Ramarathnam Venkatesan. 359-368
- Phishpin: An Integrated, Identity-based Anti-phishing ApproachHicham Tout. 369-374
- On the Need to Divide the Signature Creation EnvironmentJorge L. Hernandez-Ardieta, Ana Isabel González-Tablas Ferreres, BenjamÃn Ramos, Arturo Ribagorda. 375-380
- An Alternative Approach for Formula Modelling in Security MetricsRodrigo Sanches Miani, Felipe Marques Pires, Leonardo de Souza Mendes. 381-386
- A Security Design Pattern Taxonomy based on Attack Patterns - Findings of a Systematic Literature ReviewAndreas Wiesauer, Johannes Sametinger. 387-394
- ISEE: An Information Security Engineering EnvironmentJingde Cheng, Yuichi Goto, Daisuke Horie. 395-400
- Managing Security of Grid Architecture with a Grid Security Operation CenterJulien Bourgeois, Raheel Hassan. 403-408