Abstract is missing.
- Nanonetworks - A New Frontier in CommunicationsIan F. Akyildiz. 5
- Risk based Access Control with Uncertain and Time-dependent SensitivityJohn A. Clark, Juan E. Tapiador, John A. McDermid, Pau-Chen Cheng, Dakshi Agrawal, Natalie Ivanic, Dave Slogget. 5-13
- From Nature to Methods and Back to NaturePetar M. Djuric. 7
- Chaotic Quantum Cryptography - The Ultimate for Network SecurityStamatios V. Kartalopoulos. 9
- Information Security: The SCAN - Secure Processor with Crypto-Biometrics CapabilitiesNikolaos Bourbakis. 11
- Handling IDS Reliability in Alert Correlation - A Bayesian Network-based Model for Handling IDS s Reliability and Controlling Prediction/False Alarm Rate TradeoffsKarim Tabia, Philippe Leray. 14-24
- A Novel Intrusion Detection System for MANETsChristoforos Panos, Christos Xenakis, Ioannis Stavrakakis. 25-34
- The Threat-Victim Table - A Security Prioritisation Framework For Diverse WLAN Network TopographiesJonny Milliken, Alan Marshall. 37-42
- Trust Degree based Access Control for Social NetworksBo Lang. 43-48
- Efficient Algorithmic Safety Analysis of HRU Security ModelsAnja Fischer, Winfried E. Kühnhauser. 49-58
- Side-channel Attack on the HumanAuth CAPTCHACarlos Javier Hernandez-Castro, Arturo Ribagorda, Yago Sáez. 59-65
- Rewriting-based Security Enforcement of Concurrent Systems - A Formal ApproachMahjoub Langar, Mohamed Mejri, Kamel Adi. 66-74
- Techniques for Validation and Controlled Execution of Processes, Codes and Data - A SurveyDipankar Dasgupta, Sudip Saha, Aregahegn Negatu. 77-85
- Graphical Authentication based on user BehaviourAhmed Al-Khazzar, Nick Savage. 86-89
- Privacy Protection for user AuthenticationJan Hajny, Tomas Pelka, Vaclav Zeman. 90-93
- Infinite Alphabet Passwords - A Unified Model for a Class of Authentication SystemsMarcia Gibson, Marc Conrad, Carsten Maple. 94-99
- Piecewise Classification of Attack Patterns for Efficient Network Intrusion DetectionAbdelhalim Zaidi, Nazim Agoulmine, Tayeb Kenaza. 100-104
- An Effective Clustering Approach to Web Query Log AnonymizationAmin Milani Fard, Ke Wang. 109-119
- Anonymous Subscription Schemes - A Flexible Construction for On-line Services AccessMaria Isabel Gonzalez Vasco, Somayeh Heidarvand, Jorge L. Villar. 120-131
- Anonymous but Authorized Transactions Supporting Selective TraceabilityDaniel Slamanig, Stefan Rass. 132-141
- Don t Follow Me - Spam Detection in TwitterAlex Hai Wang. 142-151
- My Smartphone is a Safe! - The User s Point of View Regarding Novel Authentication Methods and Gradual Security Levels on SmartphonesTim Dörflinger, Anna Voth, Juliane Krämer, Ronald Fromm. 155-164
- Safe RPC - Auditing Mixnets Safely using Randomized Partial CheckingStefan Popoveniuc, Eugen Leontie. 165-170
- EnCoRe: Towards a Holistic Approach to PrivacyNick Papanikolaou, Sadie Creese, Michael Goldsmith, Marco Casassa Mont, Siani Pearson. 171-176
- Preventing Malicious Portlets from Communicating and Intercepting in Collaboration PortalsOliver Gmelch, Günther Pernul. 177-182
- Anonymous Social Stamps - Authenticating Anonymous Statements to Friends with PrivacySandeep S. Kumar. 183-188
- Implications of Misbehaving Attacks on Probabilistic Quorum System for MANETsElisa Mannes, Eduardo da Silva, Michele Nogueira Lima, Aldri Luiz dos Santos. 189-195
- HTEE: An HMAC based Tamper Evident EncryptionBradley Baker, C. Edward Chow. 196-205
- Improving N-Gram Linguistic Steganography based on TemplatesAlfonso Muñoz Muñoz, Justo Carracedo Gallardo, Irina Arguelles Álvarez. 209-212
- Towards Data Protection ComplianceNicola Zannone, Milan Petkovic, Sandro Etalle. 213-216
- Towards Risk based Prevention of Grooming AttacksDimitrios Michalopoulos, Ioannis Mavridis. 217-220
- Anonymous Services - Enhancing End-user Privacy Exploiting Anonymous NetworksGiovanni Cabiddu, Emanuele Cesena, Davide Vernizzi. 221-225
- Confidentiality and Integrity for SUM Aggregation in Sensor NetworksKeith B. Frikken, Yihua Zhang. 231-240
- QoS and Security in Energy-harvesting Wireless Sensor NetworksAntonio Vincenzo Taddeo, Marcello Mura, Alberto Ferrante. 241-250
- Secure Bridging in Large Scale Deployment of EthernetKhan Ferdous Wahid, Javier Rubio-Loyola. 251-260
- Throttling DDoS Attacks using Discrete Logarithm ProblemAvinash Darapureddi, Radhesh Mohandas, Alwyn Roshan Pais. 263-269
- Realizing Secure Multiparty Computation on Incomplete NetworksShailesh Vaya. 270-277
- Security in Future Mobile Sensor Networks - Issues and ChallengesEliana Stavrou, Andreas Pitsillides, George C. Hadjichristofi, Christoforos N. Hadjicostis. 278-286
- Providing Confidentiality in Content-based Publish/subscribe SystemsMihaela Ion, Giovanni Russello, Bruno Crispo. 287-292
- What can RFID do for Vanets? - A Cryptographic Point of ViewJorge Munilla, Andrés Ortiz, Alberto Peinado. 295-298
- Formal Verification of G-PAKE Using Casper/FDR2 - Securing a Group PAKE Protocol Using Casper/FDR2Mihai-Lica Pura, Victor Valeriu Patriciu, Ion Bica. 299-303
- Short ECC - A Lightweight Security Approach for Wireless Sensor NetworksAnna Sojka, Krzysztof Piotrowski, Peter Langendörfer. 304-308
- Ultra High Speed SHA-256 Hashing Cryptographic Module for IPSec Hardware/Software CodesignHarris E. Michail, George Athanasiou, Angeliki Kritikakou, Costas E. Goutis, Andreas Gregoriades, Vicky G. Papadopoulou. 309-313
- Efficient Asymmetric IPSec for Secure iSCSIMurthy S. Andukuri, C. Edward Chow. 314-317
- Security Models for Heterogeneous NetworkingGlenford E. Mapp, Mahdi Aiash, Aboubaker Lasebae, Raphael Chung-Wei Phan. 318-321
- Analysis of SNOW 3G⊕ Resynchronization MechanismAlex Biryukov, Deike Priemuth-Schmid, Bin Zhang. 327-333
- On a Construction of Stream-cipher-based Hash FunctionsYuto Nakano, Jun Kurihara, Shinsaku Kiyomoto, Toshiaki Tanaka. 334-343
- Proxiable Designated Verifier SignatureMebae Ushida, Kazuo Ohta, Yutaka Kawai, Kazuki Yoneyama. 344-353
- Adaptive and Composable Non-interactive String-commitment ProtocolsHuafei Zhu, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai. 354-361
- An Identity based Ring Signcryption Scheme with Public VerifiabilityS. Sharmila Deva Selvi, S. Sree Vivek, Sakhi S. Anand, C. Pandu Rangan. 362-371
- Server-assisted Long-term Secure 3-party Key EstablishmentKashi Neupane, Rainer Steinwandt. 372-378
- Forcing Out a Confession - Threshold Discernible Ring SignaturesSwarun Kumar, Shivank Agrawal, Ramarathnam Venkatesan, Satyanarayana V. Lokam, C. Pandu Rangan. 379-388
- Universally Composable Non-committing Encryptions in the Presence of Adaptive AdversariesHuafei Zhu, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai. 389-398
- An Encryption Scheme for a Secure Policy UpdatingLuan Ibraimi, Muhammad Asim, Milan Petkovic. 399-408
- Conjugation as Public Key Agreement Protocol in Mobile CryptographyVittorio Ottaviani, Alberto Zanoni, Massimo Regoli. 411-416
- Vulnerability of a Non-membership Proof SchemeKun Peng, Feng Bao. 419-422
- Extended Visual Cryptography Scheme for Color Images with no Pixel ExpansionXiaoyu Wu, Duncan S. Wong, Qing Li. 423-426
- New Pseudo Near Collision Attack on TigerDibyendu Mallik, Debdeep Mukhopadhyay. 427-430
- BMQE System - A MQ Equations System based on Ergodic MatrixXiaoyi Zhou, Jixin Ma, Wencai Du, Bo Zhao, Miltos Petridis, Yongzhe Zhao. 431-435
- On the Importance of One-time Key Pairs in Buyer-seller Watermarking ProtocolsDavid M. Williams, Helen Treharne, Anthony T. S. Ho. 441-446
- HUBFIRE - A Multi-class SVM based JPEG Steganalysis using HBCL Statistics and FR IndexVeena H. Bhat, Krishna S., P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik. 447-452
- A New Chaos-based Watermarking AlgorithmChristophe Guyeux, Jacques M. Bahi. 455-458
- An ICT Security Management FrameworkAristeidis Chatzipoulidis, Ioannis Mavridis. 459-462
- Management of Security Policies in Virtual OrganisationsBenjamin Aziz, Alvaro Arenas, Ian Johnson, Matej Artac, Ales Cernivec, Philip Robinson. 467-477
- Evaluating Survivability and Costs of Three Virtual Machine based Server ArchitecturesMeng Yu, Alex Hai Wang, Wanyu Zang, Peng Liu. 478-485
- Access Control Models for Business ProcessesVahid R. Karimi, Donald D. Cowan. 489-498
- Attacks on Web Services and Mitigation SchemesVipul Patel, Radhesh Mohandas, Alwyn R. Pais. 499-504
- Auditing the Defense Against Cross Site Scripting in Web ApplicationsLwin Khin Shar, Hee Beng Kuan Tan. 505-511
- A C++ Class for Analysing Vector Boolean Functions from a Cryptographic PerspectiveJosé Antonio Álvarez-Cubero, Pedro J. Zufiria. 512-520
- Automated Threat Identification for UMLGeorge Yee, Xingli Xie, Shikharesh Majumdar. 521-527