Abstract is missing.
- Anomaly-based Spam FilteringIgor Santos, Carlos Laorden, Xabier Ugarte-Pedrero, Borja Sanz, Pablo Garcia Bringas. 5-14
- WiMAX? - A Case Study on Minimizing Construction Cost for IEEE 802.16j Multi-hop Relay NetworksHan-Chieh Chao. 5
- Biometrics Privacy - Technologies and ApplicationsVincenzo Piuri, Fabio Scotti. 7
- Face Biometrics without Intrusion in AirportEnrique Cabello. 9
- Paradigms of Distributed Software Systems - Services, Processes, and Self-organizationWinfried Lamersdorf. 11
- Three-party Password-authenticated Key Exchange without Random OraclesXun Yi, Raylin Tso, Eiji Okamoto. 15-24
- Smartphone Security Evaluation - The Malware Attack Case Alexios Mylonas, Stelios Dritsas, Bill Tsoumas, Dimitris Gritzalis. 25-36
- Towards Optimal Revocation and Tracing Schemes - The Power of the Ternary TreeKazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake, Kouichi Sakurai. 37-49
- A Method for Flexible Reduction over Binary Fields using a Field MultiplierSaptarsi Das, Keshavan Varadarajan, Ganesh Garga, Rajdeep Mondal, Ranjani Narayan, S. K. Nandy. 50-58
- Related-key Attack against Triple Encryption based on Fixed PointsSerge Vaudenay. 59-67
- On the (Non-)reusability of Fuzzy Sketches and Extractors and Security in the Computational SettingMarina Blanton, Mehrdad Aliasgari. 68-77
- Study of the Phenomenology of DDOS Network Attacks in Phase SpaceMichael E. Farmer, William Arthur. 78-89
- Driver Authentication using Brain Waves While Route Tracing as a Mental TaskIsao Nakanishi, Sadao Baba, Masahiro Inoue. 90-96
- Embedding Ratio Estimation based on Weighted Stego Image for Embedding in 2LSBChunfang Yang, Tao Zhao, Hanning Li, Fenlin Liu. 97-104
- A Tiny RSA Coprocessor based on Optimized Systolic Montgomery ArchitectureZongbin Liu, Luning Xia, Jiwu Jing, Peng Liu 0005. 105-113
- Privacy-preserving Smart Metering without a Trusted-third-partyTobias Jeske. 114-123
- Byte Slicing Grøstl - Optimized Intel AES-NI and 8-bit Implementations of the SHA-3 Finalist GrøstlKazumaro Aoki, Günther Roland, Yu Sasaki, Martin Schläffer. 124-133
- Information-leakage in Hybrid Randomized ProtocolsStefan Rass, Peter Schartner. 134-143
- Attack Interference in Non-collaborative Scenarios for Security Protocol AnalysisMaria-Camilla Fiazza, Michele Peroli, Luca Viganò. 144-156
- On the Strength of Egglue and Other Logic CAPTCHAsCarlos Javier Hernández Castro, Arturo Ribagorda, Julio César Hernández Castro. 157-167
- A Fresh Look into the Biometric Authentication - Perspective from Shannon's Secrecy System and a Special Wiretap ChannelYanling Chen, A. J. Han Vinck. 168-177
- A Framework for Security and Workload Gradual AdaptationAntonio Vincenzo Taddeo, Luis Germán García Morales, Alberto Ferrante. 178-187
- Higher Layer Authentication for Broadcast in Controller Area NetworksBogdan Groza, Pal-Stefan Murvay. 188-197
- A Snort-based Mobile Agent for a Distributed Intrusion Detection SystemImen Brahmi, Sadok Ben Yahia, Pascal Poncelet. 198-207
- CCA Secure Certificateless Encryption Schemes based on RSAS. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan. 208-217
- Chaotic Iterations for Steganography - Stego-security and Chaos-securityNicolas Friot, Christophe Guyeux, Jacques M. Bahi. 218-227
- A Static Software Birthmark based on Use-define Chains for Detecting the Theft of Java ProgramsXin Xie, Fenlin Liu, Bin Lu, Tao Zhao, Hanning Li. 231-237
- A Smart-gentry based Software System for Secret Program ExecutionMichael Brenner, Jan Wiebelitz, Gabriele von Voigt, Matthew Smith. 238-244
- A Security Metrics Framework for the CloudJesus Luna Garcia, Hamza Ghani, Daniel Germanus, Neeraj Suri. 245-250
- Collective Classification for Unknown Malware DetectionIgor Santos, Carlos Laorden, Pablo Garcia Bringas. 251-256
- Analysis of Botnets through Life-cycleRafael Rodríguez-Gómez, Gabriel Maciá-Fernández, Pedro Garcia-Teodoro. 257-262
- On the Security of Location Determination and Verification Methods for Wireless NetworksGünther Lackner. 263-268
- A Smart Card based Generic Construction for Anonymous Authentication in Mobile NetworksJing Xu, Wen Tao Zhu, Dengguo Feng. 269-274
- IS IP Multimedia Subsystem Affected by ‘Malformed Message' Attacks? - An Evaluation of OpenIMSNikos Vrakas, Dimitris Geneiatakis, Costas Lambrinoudakis. 275-280
- On the Privacy Threats of Electronic Poll BooksStefan Popoveniuc, John Kelsey, Eugen Leontie. 281-286
- A Forward Private Protocol based on PRNG and LPN for Low-cost RFID Xiaolin Cao, Máire O'Neill. 287-292
- Colluding Tags Attack on the ECC-based Grouping Proofs for RfidsMohammad Reza Sohizadeh Abyaneh. 293-299
- Unobservable Intrusion Detection based on Call Traces in Paravirtualized SystemsCarlo Maiero, Marino Miculan. 300-306
- Botnet Detection based on DNS Records and Active ProbingIria Prieto, Eduardo Magaña, Daniel Morató, Mikel Izal. 307-316
- E-Commerce and Fair Exchange - The Problem of Item ValidationFabio Piva, Ricardo Dahab. 317-324
- Black-box Collision Attacks on the Compression Function of the GOST Hash FunctionNicolas Courtois, Theodosis Mourouzis. 325-332
- Towards an Authorization System for Cloud Infrastructure ProvidersJorge Bernal Bernabé, Juan Manuel Marín Pérez, Jose M. Alcaraz Calero, Félix J. García Clemente, Gregorio Martínez Pérez, Antonio F. Gómez-Skarmeta. 333-338
- Private Searching for Sensitive File SignaturesJohn Solis. 341-344
- The Image Protector - A Flexible Security Rule Specification Toolkit Bechara al Bouna, Richard Chbeir, Alban Gabillon. 345-350
- A New Steganographic Scheme based on First Order Reed Muller Codes - A New Steganographic SchemeHouda Jouhari, El Mamoun Souidi. 351-356
- Differential Fault Analysis of HummingbirdYaser Esmaeili Salehani, Amr M. Youssef. 357-361
- A New Tree-structure-specified Multisignature Scheme for a Document Circulation SystemMasaki Inamura, Keiichi Iwamura, Ryu Watanabe, Makoto Nishikawa, Toshiaki Tanaka. 362-369
- OPBUS: Risk-aware Framework for the Conformance of Security-quality Requirements in Business ProcessesAngel Jesus Varela-Vaca, Rafael M. Gasca, Sergio Pozo. 370-374
- SYNEMA: Visual Monitoring of Network and System Security SensorsAline Bousquet, Patrice Clemente, Jean-François Lalande. 375-378
- Privacy-enhancing Cryptography-based MaterialsAlmudena Alcaide, Esther Palomar, Israel Barroso-Perez, Ali E. Abdallah. 379-382
- Towards a Calculus for Non Repudiation ProtocolsAbdesselam Redouane. 383-386
- How to Transmit Messages via WSN in a Hostile EnvironmentMarek Klonowski, Michal Koza, Miroslaw Kutylowski. 387-390
- Apollon: Towards a Semantically Extensible Policy FrameworkJulian Schütte. 391-395
- Byzantine Decisions for Inferring Trust in Sensor NetworksBjörn Stelte. 396-399
- Distributed Threshold Cryptography Certification with No Trusted DealerApostolos P. Fournaris. 400-404
- Practical Anonymous Authentication - Designing Anonymous Authentication for Everyday UseJan Hajny, Lukas Malina, Vaclav Zeman. 405-408
- Towards an Information Control Policy Model - Achieving More Transparency in Internet Filtering ApproachesAndreas Kasten. 409-413
- Fast Selective Encryption Scheme for MP3 Files - Using GRAIN Stream CipherPraloy Kr. Biswas, Dipanwita Roy Chowdhury, K. S. Dasgupta. 414-417
- No Security by Obscurity - Why Two Factor Authentication Should Be based on an Open DesignJinying Yu, Philipp Brune. 418-421
- Artificial Immunity-based Correlation SystemGuillermo Suarez-Tangil, Esther Palomar, Sergio Pastrana, Arturo Ribagorda. 422-425
- Internationally Standardized Efficient Cryptographic Hash FunctionDanilo Gligoroski, Svein Johan Knapskog, Jørn Amundsen, Rune Erlend Jensen. 426-433
- A Public Randomness ServiceMichael J. Fischer, Michaela Iorga, René Peralta. 434-438
- Semantic Annotations for Security Policy Matching in WS-policyGiuseppe Di Modica, Orazio Tomarchio. 443-449
- Policy-based Security Channels for Protecting Network Communication in Mobile Cloud ComputingWassim Itani, Ayman I. Kayssi, Ali Chehab. 450-456
- Data and Access Management using Access Tokens for Delegating Authority to Persons and SoftwareHidehito Gomi. 457-463
- A Four-concern-oriented Secure IS Development ApproachMichel Embe Jiague, Marc Frappier, Frédéric Gervais, Pierre Konopacki, Régine Laleau, Jérémy Milhau, Richard St.-Denis. 464-471
- A Logical View of Nonmonotonicity in Access ControlAli Noorollahi Ravari, Mehran S. Fallah. 472-481