Abstract is missing.
- Update on SEED: SEED-192/256Kitae Jeong, Joongeun Choi, Yuseop Lee, Changhoon Lee, Jaechul Sung, Haeryong Park, Yeonjung Kang. 1-10 [doi]
- A New Double-Block-Length Hash Function Using Feistel StructureJesang Lee, Seokhie Hong, Jaechul Sung, Haeryong Park. 11-20 [doi]
- The Dark Side of Timed OpacityFranck Cassez. 21-30 [doi]
- Certificateless Signature Scheme without Random OraclesYumin Yuan, Da Li, Liwen Tian, Haishan Zhu. 31-40 [doi]
- Fine-Grain Access Control Using Shibboleth for the Storage Resource BrokerVineela Muppavarapu, Soon Myoung Chung. 41-50 [doi]
- Grouping Provenance Information to Improve Efficiency of Access ControlAmril Syalim, Yoshiaki Hori, Kouichi Sakurai. 51-59 [doi]
- Tagging the Turtle: Local Attestation for Kiosk ComputingRonald Toegl. 60-69 [doi]
- Selective Regression Test for Access Control System Employing RBACChao Huang, Jianling Sun, Xinyu Wang, Yuanjie Si. 70-79 [doi]
- Formal Verification for Access Control in Web Information Sharing SystemAkihiro Sakai, Yoshiaki Hori, Kouichi Sakurai. 80-89 [doi]
- Adaptive Iris SegmentationRahib Abiyev, Kemal Kilic. 90-99 [doi]
- Recognizing Partially Occluded Faces from a Single Exemplar Image Per PersonHamidreza Rashidy Kanan, M. Shahram Moin. 100-109 [doi]
- Methodology and Tools of IS Audit and Computer Forensics - The Common DenominatorMagdalena Szezynska, Ewa Huebner, Derek Bem, Chun Ruan. 110-121 [doi]
- What about Vulnerability to a Fault Attack of the Miller s Algorithm During an Identity Based Protocol?Nadia El Mrabet. 122-134 [doi]
- A New Strongly Secure Authenticated Key Exchange ProtocolQingfeng Cheng, Chuangui Ma, Xuexian Hu. 135-144 [doi]
- Improved Implementations of Cryptosystems Based on Tate PairingChangan Zhao, Dongqing Xie, Fangguo Zhang, Chong-zhi Gao, Jingwei Zhang. 145-151 [doi]
- Efficient Secure Multiparty Computation Protocol in Asynchronous NetworkZheng Huang, Weidong Qiu, Qiang Li, Kefei Chen. 152-158 [doi]
- Clustering-Based Frequency l-Diversity AnonymizationMohammad-Reza Zare-Mirakabad, Aman Jantan, Stéphane Bressan. 159-168 [doi]
- Protect Disk Integrity: Solid Security, Fine Performance and Fast RecoveryFangyong Hou, Nong Xiao, Yuhua Tang, Hongjun He, Fang Liu. 169-178 [doi]
- A Kademlia-Based Node Lookup System for Anonymization NetworksBenedikt Westermann, Andriy Panchenko, Lexi Pimenidis. 179-189 [doi]
- A Computationally-Efficient Construction for the Matrix-Based Key Distribution in Sensor NetworkAbedelaziz Mohaisen, Nam-Su Jho, Dowon Hong. 190-199 [doi]
- Key-Insulated Encryption Based Key Pre-distribution Scheme for WSNWeidong Qiu, Yaowei Zhou, Bo Zhu, Yanfei Zheng, Mi Wen, Zheng Gong. 200-209 [doi]
- Securing Mobile Phone Calls with Identity-Based CryptographyMatthew Smith, Christian Schridde, Björn Agel, Bernd Freisleben. 210-222 [doi]
- On the Security Properties and Attacks against Mobile Agent Graph Head Sealing (MAGHS)Abid Khan, Qasim Arshad, Xiamu Niu, Zhang Yong, Muhammad Waqas Anwar. 223-228 [doi]
- A New Approach to Malware DetectionHongying Tang, Bo Zhu, Kui Ren. 229-238 [doi]
- ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTIONYongjin Kim. 239-249 [doi]
- A Deployment Value Model for Intrusion Detection SensorsSiraj A. Shaikh, Howard Chivers, Philip Nobles, John A. Clark, Hao Chen. 250-259 [doi]
- Security Evaluation of an Intrusion Tolerant Web Service Architecture Using Stochastic Activity NetworksZahra Aghajani, Mohammad Abdollahi Azgomi. 260-269 [doi]
- Counteracting Phishing Page Polymorphism: An Image Layout Analysis ApproachIeng-Fat Lam, Wei-Cheng Xiao, Szu-Chi Wang, Kuan-Ta Chen. 270-279 [doi]
- Signaling-Oriented DoS Attacks in UMTS NetworksGeorgios Kambourakis, Constantinos Kolias, Stefanos Gritzalis, Jong Hyuk Park. 280-289 [doi]
- Detecting DDoS Attacks Using Dispersible Traffic Matrix and Weighted Moving AverageTae-Hwan Kim, Dong Seong Kim, Sang Min Lee, Jong Sou Park. 290-300 [doi]
- Attack Patterns Discovery by Frequent Episodes Mining from Honeypot SystemsMing-Yang Su, Kai-Chi Chang, Chun-Yuen Lin. 301-306 [doi]
- Efficient and Automatic Instrumentation for Packed BinariesYanjun Wu, Tzi-cker Chiueh, Chen Zhao. 307-316 [doi]
- Secure Cover Selection SteganographyHedieh Sajedi, Mansour Jamzad. 317-326 [doi]
- Side-Channel Leakage in Masked Circuits Caused by Higher-Order Circuit EffectsZhimin Chen, Syed Haider, Patrick Schaumont. 327-336 [doi]
- Performance Analysis of Digital Secure Voice Transmission over HF Radio ChannelKihong Kim, Jinkeun Hong. 337-346 [doi]
- Energy Analysis of Multimedia Video Streaming on Mobile DevicesChu-Hsing Lin, Jung-Chun Liu, Mao-Hua Cheng, Tsung-Che Yang, Mei-Chun Chou. 347-357 [doi]
- Combating Index Poisoning in P2P File SharingLingli Deng, Yeping He, Ziyao Xu. 358-367 [doi]
- A Cryptanalytic View of the NSA s Skipjack Block Cipher DesignJongsung Kim, Raphael C.-W. Phan. 368-381 [doi]
- MinuCode: A Fixed-Value Representation of Fingerprint Minutiae for Biometric CryptosystemJinyang Shi, Kwok-Yan Lam. 382-391 [doi]
- Self-initialized Distributed Certificate Authority for Mobile Ad Hoc NetworkMeng Ge, Kwok-Yan Lam. 392-401 [doi]
- Design and Delivery of Undergraduate IT Security Management CourseJemal H. Abawajy. 402-411 [doi]
- Secure Multi-party Computation Using Virtual Parties for Computation on Encrypted DataRohit Pathak, Satyadhar Joshi. 412-421 [doi]
- Using a Link Metric to Improve Communication Mechanisms and Real-Time Properties in an Adaptive Middleware for Heterogeneous Sensor NetworksEdison Pignaton de Freitas, Tales Heimfarth, Marco A. Wehrmeister, Flávio Rech Wagner, Armando Morado Ferreia, Carlos Eduardo Pereira, Tony Larsson. 422-431 [doi]
- Performance Evaluation of DSR in Multi-services Ad Hoc NetworksRonald Beaubrun, Badji Molo. 432-437 [doi]
- Implementation and Evaluation of WiMedia MAC LSIKazuyuki Sakoda, Yuichi Morioka, Chihiro Fujita, Erica Tanimoto, Kenzoh Nishikawa, Mitsuhiro Suzuki. 438-449 [doi]
- A Reliable and Efficient Pedal Back Data Disseminating Scheme for Ad-Hoc WSNsNomica Imran, A. I. Khan. 450-460 [doi]
- Improved Location Acquisition Algorithms for the Location-Based Alert ServiceSo-Young Kang, Jin-Woo Song, Kwang-Jo Lee, Ju-Hee Lee, Ji-Hoon Kim, Sung-Bong Yang. 461-470 [doi]
- An Enhanced Trust Center Based Authentication in ZigBee NetworksKyunghwa Lee, Joohyun Lee, Bongduk Zhang, Jaeho Kim, Yongtae Shin. 471-484 [doi]
- Sensor Disposition Problem in Wireless Ad-Hoc Sensor NetworksTakahide Yanaka, Toshihiko Sasama, Hiroshi Masuyama. 485-493 [doi]
- Performance Evaluation of Cost Effective Routing for Packet Transmissions in Mobile Ad Hoc NetworksKentaro Kishida, Toshihiko Sasama, Hiroshi Masuyama. 494-501 [doi]
- Energy Lesser Broadcasting Algorithms Using Adjustable Transmission Ranges in Mobile Ad Hoc NetworksToshihiko Sasama, Yasuhiro Abe, Hiroshi Masuyama. 502-511 [doi]
- A Multi-Path Routing Supported Scheduling Algorithm for Multi-Channel Single-Transceiver Wireless Mesh NetworksMei-Jhen Chen, Gwo-Jong Yu. 512-521 [doi]
- Predictive Scheme for Location Service in Mobile Ad-Hoc NetworksEbtisam Amar, Selma Boumerdassi, Éric Renault. 522-531 [doi]
- An Efficient Hybrid Routing Approach for Hybrid Wireless Mesh NetworksAnh-Ngoc Le, Dong-Won Kum, You Ze Cho. 532-542 [doi]
- Relationship between Motivation and Satisfaction of Online Computer Games: Evidence from Adolescent Players Using Wireless Service in TaiwanLily Shui-Lien Chen, Michael Chih-Hung Wang, Yung-Hsin Lee. 543-552 [doi]
- DISHES: A Distributed Shell System for Ubiquitous ComputingChih-Chung Lai, Ren-Song Ko. 553-562 [doi]
- Error Control Scheme of Hybrid ARQ Based on Majority Voting Bit by BitHsin-Kun Lai, Chia-Chin Ma, Erl-Huei Lu. 563-569 [doi]
- Secure Error-Correction Network Coding in a Randomized SettingYejun Zhou, Hui Li, Jianfeng Ma. 570-577 [doi]
- Bayesian Approach Based Comment Spam Defending ToolBeatrice Cynthia Dhinakaran, Dhinaharan Nagamalai, Jae Kwang Lee. 578-587 [doi]
- An Improved Secure Identity-Based On-Line/Off-Line Signature SchemeJianhong Zhang, Yixian Yang, Xinxin Niu, Shengnan Gao, Hua Chen, Qin Geng. 588-597 [doi]
- Honeybee-Based Model to Detect IntrusionGhassan Ahmed Ali, Aman Jantan, Abdulghani Ali. 598-607 [doi]
- A Data Mining Framework for Building Intrusion Detection Models Based on IPv6Zenghui Liu, Yingxu Lai. 608-618 [doi]
- FPGA Implementation of Elliptic Curve Point Multiplication over GF(2191)Sameh M. Shohdy, Ashraf El-Sisi, Nabil A. Ismail. 619-634 [doi]
- A Forward-Secrecy WTLS Handshake Protocol Based on XTRBin Li. 635-643 [doi]
- Application of 2D Barcode in Hardcopy Document Verification SystemMazleena Salleh, Teoh Chin Yew. 644-651 [doi]
- Protecting Global SOA from DoS and Other Security ThreatsDeven Shah, Ashish Mangal, Mayank Agarwal, Mahendra Mehra, Tushar Dave, Dhiren Patel. 652-661 [doi]
- CRYPTEX Model for E-Commercial Contract of Software Source Code Using Secrete Sharing SchemeByungRae Cha, Youngil Kim. 662-671 [doi]
- HOTP-Based User Authentication Scheme in Home NetworksBinod Vaidya, Jong Hyuk Park, Joel J. P. C. Rodrigues. 672-681 [doi]
- A Comparative Analysis of HC-128 and Rabbit Encryption Schemes for Pervasive Computing in WSN EnvironmentFirdous Kausar, Ayesha Naureen. 682-691 [doi]
- A Comparative Analysis of PKC and Semi-PKC Based Key Management Schemes for Hierarchical Sensor NetworksAyesha Naureen, Attiya Akram, Rabia Riaz, Ki-Hyung Kim, H. Farooq Ahmed. 692-701 [doi]
- A Mathematical Approach towards Trust Based Security in Pervasive Computing EnvironmentNaima Iltaf, Mukhtar Hussain, Farrukh Kamran. 702-711 [doi]
- A Secure Group Rekeying Scheme with Compromised Node Revocation in Wireless Sensor NetworksAsma Khalid, Mukhtar Hussain. 712-721 [doi]
- Fault Tolerant Secure Routing in Cluster Based Mobile Sensor NetworksUsama Ahmed, Muhammad Arif Wahla, Firdous Kausar. 722-731 [doi]
- Hardware-Based Random Number Generation in Wireless Sensor Networks(WSNs)Rabia Latif, Mukhtar Hussain. 732-740 [doi]
- Authenticated Encryption in WSN Using eSTREAM CiphersShakil Ahmad, Arif Wahla, Firdous Kausar. 741-749 [doi]
- Aggregate and Verifiably Encrypted Signatures from Multilinear Maps without Random OraclesMarkus Rückert, Dominique Schröder. 750-759 [doi]
- Device Authentication/Authorization Protocol for Home Network in Next Generation SecurityJong Sik Moon, Deok-Gyu Lee, Im-Yeong Lee. 760-768 [doi]
- A Study on Feasibility and Establishment of a Security Grade Certification Scheme for the New IT ServicesHangbae Chang, Jonggu Kang, Hyuk-jun Kwon. 769-777 [doi]
- Domain Specific Intended Use Evaluation Method: Intrusion Detection Specific Intended Use Evaluation MethodAlbert Park. 778-787 [doi]
- A Study of International Trend Analysis on Web Service Vulnerabilities in OWASP and WASCSoonseok Kim, Haeyoung Han, Donghwi Shin, Inkyung Jeun, HyunCheol Jeong. 788-796 [doi]
- Cryptanalysis of Secure Key Exchange Protocol between STB and Smart Card in IPTV BroadcastingSong-Hee Lee, Nam-Sup Park, Soo-Kyun Kim, Jin-Young Choi. 797-803 [doi]
- Free-Form Deformation Axis Aligned Bounding BoxSunhwa Jung, Min Hong, Min-Hyung Choi. 804-813 [doi]
- A Study on Mosaic Based CCTV System Using LocalizationJong-Min Kim, Myung A. Kang. 814-822 [doi]
- Selecting the Wireless Communication Methods for Establishing Ubiquitous City-Gas Facilities in KoreaJeong Seok Oh, Jang Sik Park, Jeong Rock Kwon. 823-828 [doi]
- Safety High Accuracy Context-Aware Matrix (CAM) Making Based on X.509 Proxy CertificateHoon Ko, Ning Chen, Goreti Marreiros, Carlos Ramos. 829-837 [doi]