|
Page
no. |
|
|
|
|
A Compiler-Hardware Technique for Protecting Against
Buffer Overflow Attacks |
1 |
Eugen Leontie, Gedare Bloom, Olga Gelbart, Bhagirath Narahari and Rahul Simha |
|
|
|
Code Based Hashing Technique for Message Authentication Algorithms |
9 |
Khaled Alghathbar |
|
|
|
Formalizing Delegation and Integrating it into Role-Based Access
Control Models |
21 |
Ali E. Abdallah and Hassan Takabi |
|
|
|
Security Vulnerabilities
In Wireless Sensor Networks: A Survey |
31 |
T.Kavitha and D.Sridharan |
|
|
|
The Masked Code Book (MCB) |
45 |
Mohamed Abo El-Fotouh and Klaus Diepold |
|
|
|
A New Group Signature Scheme Based on the Discrete Logarithm (short paper) |
54 |
Cheng-Chi Lee , Ting-Yi Chang and Min-Shiang Hwang |
|
|
|
Combined Shape and Texture Information for Palmprint Biometrics |
58 |
Rafal Kozik and Michal Choras |
|
|
|
Covert File Transfer Protocol
Based on the IP Record Route Option |
64 |
Zouheir Trabelsi and Imad Jawhar |
|
|
|
Identifying the Cost of Security |
74 |
Wouter de Bruijn, Marco R. Spruit and Maurits van den Heuvel |
|
|
|
Identity Based Proxy Blind Distributed Signature
and Its Applications to Health Care Insurance
Service Management |
84 |
R. Anitha and R.S.Sankarasubramanian |
|
|
|
Impact of Wormhole Attacks and Performance
Study of Different Routing Protocols in
Mobile Ad Hoc Networks |
94 |
G.Padmavathi, P.Subashini and D.Devi Aruna |
|
|
|
A Novel Approach for Genetic Audio Watermarking |
102 |
Mazdak Zamani, Azizah Bt Abdul Manaf, Rabiah Bt Ahmad, Farhang Jaryani, Hamed Taherdoost,
Saman Shojae Chaeikar and Hossein Rouhani Zeidanloo |
|
|
|
Organizational Barriers to the Implementation of
Security Engineering |
112 |
Bryan Cline |
|
|
|
Webpage Source Encryption on Polymorphic
Javascript Algorithm |
121 |
Bai Zhongying and Qin Jiancheng |
|
|
|
Secure Key-Escrowless Explicit Authenticated Key
Agreement Protocol in ID-based Public Key
Cryptography |
130 |
Mengbo Hou, Qiuliang Xu and Shanqing Guo |
|
|
|
Octagonal Search Algorithm with Early
Termination for Fast Motion Estimation
on H.264 |
138 |
Dujuan Wang, Zhaopeng Cui, Guang Jiang, Chengke Wu |
|
|
|
Threats to Health Information Security |
146 |
Ganthan Narayana Samy, Rabiah Ahmad and Zuraini Ismai |
|
|
|
Threats Identification in Healthcare Information
Systems using Genetic Algorithm and Cox
Regression |
154 |
Rabiah Ahmad, Ganthan Narayana Samy, Nuzulha Khilwani Ibrahim, Peter A. Bath and Zuraini Ismail |
|
|
|
Action-Based Access Control for Web Services |
162 |
Fenghua Li, Wei Wang , Jianfeng Ma and Haoxin Su |
|
|
|
One-way Hash Function Construction Based on
Conservative Chaotic Systems |
171 |
Qinghua Zhang, Han Zhang and Zhaohui Li |
|
|
|
A Low-cost RFID Authentication Protocol with
Location Privacy Protection |
179 |
Jun-Chao Lu, Yu-Yi Chen, Shin-I Chen and Jinn-Ke Jan |
|
|
|
A Block Feature Correlation Based Image
Watermarking for Tamper Detection Using Linear
Equation |
187 |
Chin-Feng Lee, Kuo-Nan Chen, Chin-Chen Chang and Meng-Cheng Tsai |
|
|
|
Analysis of One-way Alterable Length Hash
Function Based on Cell Neural Network |
196 |
Qun-ting Yang, Tie-gang Gao, Li Fan and Qiao-lun Gu |
|
|
|
A Two-Factor User Authentication Scheme
Providing Mutual Authentication and Key
Agreement over Insecure Channels |
201 |
Chun-Ta Li, Cheng-Chi Lee and Lian-Jun Wang |
|
|
|
Proactive Verifiable Secret Sharing Scheme
Using ECC Based Signcryption |
209 |
Atanu Basu, Indranil Sengupta and Jamuna Kanta Sing |
|
|
|
The Design and Implementation of Security Defense
Technology Based on Mandatory Running Control |
218 |
Ke-He Wu, Tong Zhang and Fei Chen |
|
|
|
Fuzzy Intrusion Detection System via Data Mining
Technique With Sequences of System Calls |
224 |
Mohammad Akbarpour Sekeh, Mohd. Aizaini bin Maarof, Mohd.Yazid Idris and Malihe Motiei |
|
|
|
Using Improved GHSOM for Intrusion Detection |
232 |
Yahui Yang, Dianbo Jiang and Min Xia |
|
|
|
Secure Access Control Scheme of RFID System
Application |
240 |
Yu-Chih Huang and Wen-Chung Kuo |
|
|
|
An Advanced IDS Management Architecture |
246 |
Sebastian Roschke, Feng Cheng and Christoph Meinel |
|
|
|
Shouting Speech Detection and Understanding
for Acoustic-Based Security System |
256 |
Hiroaki Nanjo, Hiroshi Kawano, Hiroki MikamiI, Eri Ohmura and Takanobu Nishiura |
|
|
|
Performance Evaluation of DCA and SRC on a
Single Bot Detection |
265 |
Yousof Al-Hammadi, Uwe Aickelin and Julie Greensmith |
|
|
|
A Consideration on the Numbers of Relay Nodes and Encryption Required for Anonymous Communicaion System 3-Model Net |
276 |
Kazuhiro Kono, Shinnosuke Nakano, Yoshimichi Ito, and Noboru Babaguchi |
|
|
|
Privacy Protection for Speech Information |
284 |
Kazumasa Yamamoto and Seiichi Nakagawa |
|
|
|
SARoNGS: Shibboleth Access for Resources on the
National Grid Service |
293 |
Xiao Dong Wang, Mike Jones, Jens Jensen, Andrew Richards, David Wallom, Tiejun Ma, Robert Frank,
David Spence, Steven Young, Claire Devereux and Neil Geddes |
|
|
|
Multi-tier Evaluation of Network Intrusion
Detection Systems |
301 |
Faeiz Alserhani, Monis Akhlaq, Irfan U Awan, John Mellor, Andrea J Cullen and Pravin Mirchandani |
|
|
|
Network Security Situation Awareness using
Exponential and Logarithmic Analysis |
311 |
Xiao-bin Tan, Gui-hong Qin, Yong Zhang and Ping Liang |
|
|
|
Secure Threshold Proxy Signature Scheme Based on
RSA for Known Signers |
319 |
Raman Kumar and Harsh Kumar Verma |
|
|
|
Information Security Audit: When is it Worth it? |
327 |
Mathew A Thomas and Rahul R Marathe |
|
|
|
An Access Control Model Based Testing Approach
for Smart Card Applications:
Results of the POS´E Project |
335 |
P.-A. Masson and M.-L. Potet and J. Julliand and R. Tissot and G. Debois and
B. Legeard4 and B. Chetali and F. Bouquet and E. Jaffuel and
L. Van Aertrick and J. Andronick and A. Haddad |
|
|
|
Modeling the Co-evololution DNS Worms and Anti-worms
in IPv6 Networks |
352 |
P. Kammas, T. Komninos, Y.C. Stamatiou |
|
|
|
Enhance ECDSA to Identity-based Proxy Signature
Scheme |
360 |
Ming-Hsin Chang , I-Te Chen and Ming-Te Chen |
|
|
|
Systematic Website Verification in Distributed
Computing Environment |
367 |
Seng-phil Hong, Ji-hee Jeoung |
|
|
|
Towards Ontology-Based Intelligent Model for
Intrusion Detection and Prevention |
376 |
Gustavo Isaza, Andrés Castillo, Manuel López and Luis Castillo |
|
|
|
Text Clustering for Digital Forensics Analysis |
384 |
Sergio Decherchi, Simone Tacconi, Judith Redi, Fabio Sangiacomo, Alessio Leoncini and Rodolfo Zunino |
|
|
|
Measuring Impact of DDOS Attacks on Web Services |
392 |
Monika Sachdeva, Gurvinder Singh, Krishan Kumar and Kuldip Singh |
|
|
|
Linear SVM for Underwater Magnetic Signals
Based Port Protection |
401 |
Davide Leoncini, Sergio Decherchi, Osvaldo Faggioni, Paolo Gastaldo, Maurizio Soldani and Rodolfo
Zunino |
|
|
|
Score Normalization for Multimodal Recognition
Systems |
409 |
Luis Puente, María-Jesús Poza, Belén Ruiz and Ángel García-Crespo |
|
|
|
Behavior Analysis of Domain Servers Through
Windows Security Event Log Mining |
418 |
Urko Zurutuza, Rosa Basagoiti and Asier Aztiria |
|
|
|
A Location-Based Key Establishment Scheme for
Static Wireless Sensor Networks with Multiple
Base Stations |
426 |
Ashok Kumar Das and Indranil Sengupta |
|
|
|
Ontology-based Security Policy Translation |
437 |
Cataldo Basile, Antonio Lioy, Salvatore Scozzi, and Marco Vallini |
|
|
|
An Anomaly-Based Approach for Intrusion
Detection in Web Traffic |
446 |
Carmen Torrano-Gimenez, Alejandro Perez-Villegas, and Gonzalo Alvarez |
|
|
|
A Multi-Agent Based Solution to Detect and Block
DoS Threats on Web Services |
455 |
CristianI. Pinzón, Juan F. De Paz, Ana De Luis, Ana Gil, Javier Bajo |
|
|
|
A Comparison of Unsupervised Learning
Techniques for Encrypted Traffic Identification |
464 |
Carlos Bacquet , Kubra Gumus , Dogukan Tizer , A. Nur Zincir-Heywood , and Malcolm I. Heywood |
|
|
|
A Secure Two-Party Identity-Based Key Exchange Protocol
Based on Elliptic Curve Discrete Logarithm Problem |
473 |
Jayaprakash Kar and Banshidhar Majhi |
|
|
|
Arabic Domain Names: Analysis & Solution |
483 |
Khaled Alghathbar |
|
|
|
An Eco-Defending Architecture for network security
based on Immunity and Mobile Agents |
492 |
Tongrang Fan, Yan Sun and Yongbin Zhao |
|
|
|
Detecting Stepping-Stone Intruders with Long
Connection Chains |
500 |
Shou-Hsuan Stephen Huang, Wei Ding, Matthew J. Hausknecht, Zach Riggle |
|
|
|
A Reputation Based Service Provider Selection
System for Farmers |
515 |
Bhavna Gupta, Harmeet Kaur and Punam Bedi |
|
|
|
Activity Governance for Managing Risks in Role
Design for SSO Systems |
516 |
Manish Gupta and Raj Sharman |
|
|
|
A Survey on Analytic Studies of Key Distribution
Mechanisms in Wireless Sensor Networks |
526 |
Ashok Kumar Das |
|
|
|
Using Intelligent Techniques to Extend the Applicability of
Operating System Fingerprint Databases |
554 |
Jo˜ao Paulo S. Medeiros, Agostinho M. Brito Jr., Paulo S. Motta Pires |
|
|
|
Automatic Validation of Firewall Configurations using SMT
Solvers |
561 |
Nihel Ben Youssef Ben Souayeh,Adel Bouhoula,Florent Jacquemard |
|
|
|
HRBAC: Historical Role-Based Access Control |
569 |
Ali Hosseini and Mohammad Abdollahi Azgomi |
|
|
|
A Scheme for Execution of a Complex service in
an Environment where Services are Vulnerable to
Intrusion Attacks |
579 |
Urjita Thakar, Nirmal Dagdee |
|
|
|
Parallel Hardware Algorithms & Designs for Elliptic
Curves Cryptography to Improve Point Operations
Computationsl |
588 |
Qasem Abu Al-Haija' and Moahammad Al-Khatib |
|
|
|
|
|