Abstract is missing.
- Embedding High Capacity Covert Channels in Short Message Service (SMS)M. Zubair Rafique, Muhammad Khurram Khan, Khaled Alghathbar, Muddassar Farooq. 1-10 [doi]
- A Framework for Detecting Malformed SMS AttackM. Zubair Rafique, Muhammad Khurram Khan, Khaled Alghathbar, Muddassar Farooq. 11-20 [doi]
- A Metadata Model for Data Centric SecurityBenjamin Aziz, Shirley Y. Crompton, Michael D. Wilson. 21-28 [doi]
- SecPAL4DSA: A Policy Language for Specifying Data Sharing AgreementsBenjamin Aziz, Alvaro Arenas, Michael D. Wilson. 29-36 [doi]
- Self-keying Identification Mechanism for Small DevicesKrzysztof Barczynski, Przemyslaw Blaskiewicz, Marek Klonowski, Miroslaw Kutylowski. 37-44 [doi]
- A Software Architecture for Introducing Trust in Java-Based CloudsSiegfried Podesser, Ronald Toegl. 45-53 [doi]
- A Network Data Abstraction Method for Data Set VerificationJaeik Cho, Kyuwon Choi, Taeshik Shon, Jongsub Moon. 54-62 [doi]
- IMS Session Management Based on Usage ControlGiorgos Karopoulos, Fabio Martinelli. 71-78 [doi]
- Using Counter Cache Coherence to Improve Memory Encryptions Performance in Multiprocessor SystemsYuanyuan Zhang, Junzhong Gu. 79-87 [doi]
- Dynamic Combinatorial Key Pre-distribution Scheme for Heterogeneous Sensor NetworksBidi Ying, Dimitrios Makrakis, Hussein T. Mouftah, Wenjun Lu. 88-95 [doi]
- Exclusion Based VANETs (EBV)Ahmad A. Al-Daraiseh, Mohammed A. Moharrum. 96-104 [doi]
- Embedding Edit Distance to Allow Private Keyword Search in Cloud ComputingJulien Bringer, Hervé Chabanne. 105-113 [doi]
- Efficient Secret Sharing SchemesChunli Lv, Xiaoqi Jia, Jingqiang Lin, Jiwu Jing, Lijun Tian, Mingli Sun. 114-121 [doi]
- Two Dimensional PalmPhasor Enhanced by Multi-orientation Score Level FusionLu Leng, Jiashu Zhang, Gao Chen, Muhammad Khurram Khan, Ping Bai. 122-129 [doi]
- Improved Steganographic Embedding Exploiting Modification Direction in Multimedia CommunicationsCheonshik Kim, Dongkyoo Shin, Dongil Shin, Xinpeng Zhang. 130-138 [doi]
- An Ontology Based Information Security Requirements Engineering FrameworkAzeddine Chikh, Muhammad Abulaish, Syed Irfan Nabi, Khaled Alghathbar. 139-146 [doi]
- Simulating Malicious Users in a Software Reputation SystemAnton Borg, Martin Boldt, Bengt Carlsson. 147-156 [doi]
- Weak Keys of the Block Cipher SEED-192 for Related-Key Differential AttacksJongsung Kim, Jong Hyuk Park, Young-gon Kim. 157-163 [doi]
- The Method of Database Server Detection and Investigation in the Enterprise EnvironmentNamheun Son, Keun-Gi Lee, Sangjun Jeon, Hyunji Chung, Sangjin Lee, Changhoon Lee. 164-171 [doi]
- An Efficient Processing Scheme for Continuous Queries Involving RFID and Sensor Data StreamsJeongwoo Park, Kwangjae Lee, Wooseok Ryu, Joonho Kwon, Bonghee Hong. 187-192 [doi]
- Smart Warehouse Modeling Using Re-recording Methodology with Sensor TagGwangsoo Lee, Wooseok Ryu, Bonghee Hong, Joonho Kwon. 193-200 [doi]
- SIMOnt: A Security Information Management Ontology FrameworkMuhammad Abulaish, Syed Irfan Nabi, Khaled Alghathbar, Azeddine Chikh. 201-208 [doi]
- Using Bloom Filters for Mining Top-k Frequent Itemsets in Data StreamsYounghee Kim, Kyung Soo Cho, Jae Yeol Yoon, Iee Joon Kim, Ungmo Kim. 209-216 [doi]
- An RSN Tool : A Test Dataset Generator for Evaluating RFID MiddlewareWooseok Ryu, Joonho Kwon, Bonghee Hong. 217-224 [doi]
- Adaptive Optimal Global Resource Scheduling for a Cloud-Based Virtualized Resource PoolLingli Deng, Qing Yu, Jin Peng. 231-240 [doi]
- Maximal Cliques Generating Algorithm for Spatial Co-location Pattern MiningSeung Kwan Kim, Younghee Kim, Ungmo Kim. 241-250 [doi]