Third International Symposium on Information … International Symposium on Information Assurance...
-
Upload
trinhthuan -
Category
Documents
-
view
223 -
download
2
Transcript of Third International Symposium on Information … International Symposium on Information Assurance...
IAS 2007 Third International Symposium
on Information Assurance and Security
29-31 August 2007 Manchester, United Kingdom
Edited by
Ning Zhang, University of Manchester,
UK
Ajith Abraham, Norwegian University of Science and Technology,
Norway
Qi Shi, Liverpool John Moores
University, UK
Johnson Thomas, Oklahoma State University, USA
IAS 2007 IAS 2007 InformationInformation
SessionsSessions
Paper by AuthorPaper by Author
SearchSearch
Getting StartedGetting Started
Sponsored by ICST (International Communication
Sciences and Technology Association)
Create-Net (Center of REsearch and Telecommunication Experimentations
for NETworked Communities)
Published by
Conference Publishing Services
(CPS)
Conference Information
Third International Symposium on InformationAssurance and Security
q Chairs’ Welcome Message
q IAS 2007 Organisation
q Keynote Speech
q Tutorial 1 - Abstract
q Tutorial 2 - Abstract
q Title Page (Book version)
q Copyright Page (Book version)
q Table of Contents (Book version)
q Author Index (Book version)
q Roster Page (Book version)
Sessions
q E-Commerce Security
q Network Security
q Cryptographic Schemes and Applications
q Authentication and Access Control
q Intrusion Prevention
q Intrusion Detection
q Security Analysis
q Data Security and Privacy
q Risk and Trust Management
q Security Requirements and Policies
q Agent and System Security
q Workshop on Computational Forensics
q Workshop on Data Hiding for Information and Multimedia Security
Papers by Session
E-Commerce Security
q Secure M-Commerce Transactions: A Third Party Based Signature ProtocolLisha He, Ning Zhang, Lirong He, and Ian Rogers
q Secure E-Commerce Protocol for Purchase of e-Goods - Using Smart CardSatish Devane, Madhumita Chatterjee, and Deepak Phatak
q Certified Email Delivery with Offline TTPHao Wang, Yuyi Ou, Jie Ling, Lu Liang, and Xiang Xu
q An Effective and Secure Buyer-Seller Watermarking ProtocolIbrahim M. Ibrahim, Sherif Hazem Nour El-Din, and Abdel Fatah A. Hegazy
Papers by Session
Network Security
q Towards an Autonomic Security System for Mobile Ad Hoc NetworksMohamad Aljnidi and Jean Leneutre
q A Secure Authenticated Key Agreement Protocol for Wireless SecurityPierre E. Abi-Char, Abdallah Mhamed, and Bachar El-Hassan
q Hierarchical Multi-party Key Agreement for Wireless NetworksSigurd Eskeland and Vladimir Oleshchuk
q Applying Secure Data Aggregation Techniques for a Structure and DensityIndependent Group Based Key Management Protocol
Kashif Kifayat, Madjid Merabti, Qi Shi, and David Llewellyn-Jones
q A Performance Comparison of Wireless Ad Hoc Network Routing Protocols under Security Attack
Su Mon Bo, Hannan Xiao, Aderemi Adereti, James A. Malcolm, and Bruce Christianson
q On Detecting Packets Droppers in MANET: A Novel Low Cost ApproachTarag Fahad, Djamel Djenouri, and Robert Askwith
Papers by Session
Cryptographic Schemes and Applications
q Threshold SKI Protocol for ID-Based CryptosystemsAshutosh Saxena
q Fuzzy Key Extraction from Fingerprint Biometrics Based on Dynamic QuantizationMechanism
Thian Song Ong and Andrew Beng Jin Teoh
q Low-Cost Anonymous Timed-Release EncryptionD. Hristu-Varsakelis, K. Chalkias, and G. Stephanides
q Integrating Multi-modal Circuit Features within an Efficient Encryption SystemEvangelos Papoutsis, Gareth Howells, Andrew Hopkins, and Klaus McDonald-Maier
q A Secure Authenticated Key Agreement Protocol Based on Elliptic CurveCryptography
Pierre E. Abi-Char, Abdallah Mhamed, and Bachar El-Hassan
q Inclusion of a Montgomery Multiplier Unit into an Embedded Processor’s Datapathto Speed-Up Elliptic Curve Cryptography
S. Bartolini, G. Castagnini, and E. Martinelli
q An LSB Data Hiding Technique Using Prime NumbersSandipan Dey, Ajith Abraham, and Sugata Sanyal
Papers by Session
Authentication and Access Control
q Binding Update Authentication Scheme for Mobile IPv6Irfan Ahmed, Usman Tariq, Shoaib Mukhtar, Kyung-suk Lhee , S.W. Yoo, Piao Yanji,and ManPyo Hong
q An Authentication Scheme Using Non-commutative SemigroupsM. M. Chowdhury
q Function-Based Authorization Constraints Specification and EnforcementWei Zhou and Christoph Meinel
q Separation of Duty in Role-Based Access Control Model through Fuzzy RelationsHassan Takabi, Morteza Amini, and Rasool Jalili
q Enhancing Role-Based Access Control Model through Fuzzy RelationsHassan Takabi, Morteza Amini, and Rasool Jalili
q A Theoretical Security Model for Access Control and Security AssuranceBo-Chao Cheng, Huan Chen, and Ryh-Yuh Tseng
q A Purpose-Based Access Control ModelNaikuo Yang, Howard Barringer, and Ning Zhang
q SARBAC07: A Scoped Administration Model for RBAC with Hybrid HierarchyYue Zhang and James B.D. Joshi
Papers by Session
q Levels of Authentication Assurance: An InvestigationAleksandra Nenadic, Ning Zhang, Li Yao, and Terry Morrow
Papers by Session
Intrusion Prevention
q Vulnerability Assessment by Learning Attack Specifications in GraphsVirginia N. L. Franqueira, and Raul H. C. Lopes
q Automatic Patch Generation for Buffer Overflow AttacksAlexey Smirnov and Tzi-cker Chiueh
q Protecting IP Multimedia Subsystem (IMS) Service Delivery Platform from TimeIndependent Attacks
Muhammad Sher and Thomas Magedanz
q Cyber Threat Trend Analysis Model Using HMMDo Hoon Kim, Taek Lee, Sung-Oh David Jung, Hoh Peter In, and Hee Jo Lee
q DIPS: A Framework for Distributed Intrusion Prediction and Prevention UsingHidden Markov Models and Online Fuzzy Risk Assessment
Kjetil Haslum, Ajith Abraham, and Svein Knapskog
Papers by Session
Intrusion Detection
q Detection and Honeypot Based Redirection to Counter DDoS Attacks in ISPDomain
Anjali Sardana, Krishan Kumar, and R. C. Joshi
q IP Protection: Detecting Email Based Breaches of ConfidenceNeil Cooke, Lee Gillam, and Ahmet Kondoz
q Non-stationary Markov Models and Anomaly Propagation Analysis in IDSArnur G. Tokhtabayev and Victor A. Skormin
q Building Trustworthy Intrusion Detection through VM IntrospectionFabrizio Baiardi and Daniele Sgandurra
q Early DoS Attack Detection Using Smoothened Time-Series and Wavelet AnalysisPravin Shinde and Srinivas Guntupalli
q A Security Model for Detecting Suspicious Patterns in Physical EnvironmentSimon Fong and Zhuang Yan
q Detection of Web Defacements by Means of Genetic ProgrammingEric Medvet, Cyril Fillon, and Alberto Bartoli
Papers by Session
Security Analysis
q Team Edit Automata for Testing Security PropertyZhenrong Yang, Aiman Hanna, and Mourad Debbabi
q Analysing the Security Threats against Network Convergence ArchitecturesPatroklos Argyroudis, Robert McAdoo, Stephen Toner, Linda Doyle, and Donal O’Mahony
q Modelling Quality of Protection in Outsourced Business ProcessesFabio Massacci and Artsiom Yautsiukhin
q Modeling Security Protocols as GamesMohamed Saleh and Mourad Debbabi
Papers by Session
Data Security and Privacy
q A Secure Storage Service for the gLite MiddlewareDiego Scardaci and Giordano Scuderi
q FPGA/ASIC Based Cryptographic Object Store SystemDan Feng, Lanxiang Chen, Lingfang Zeng, and Zhongying Niu
q An Architecture for Privacy Preserving Collaborative Filtering on Web PortalsWaseem Ahmad and Ashfaq Khokhar
q Enforcing Privacy by Means of an Ontology Driven XACML FrameworkDhiah el Diehn I. Abou-Tair, Stefan Berlik, and Udo Kelter
q Addressing Privacy Issues in CardSpaceWaleed A. Alrodhan and Chris J. Mitchell
q Second-LSB-Dependent Robust Watermarking for Relational DatabaseXiangrong Xiao, Xingming Sun, and Minggang Chen
Papers by Session
Risk and Trust Management
q Operational Risk: Acceptability CriteriaDaniel Gideon Dresner and J. Robert (Bob) G. Wood
q HPRS: A Hybrid P2P Reputation System Using File and Peer RatingSrinivasan T., Varun Ramachandran, Arun Vedachalam, and S. K. Ghosh
q Resource Classification Based Negotiation in Web ServicesDiala Abi Haidar, Nora Cuppens, Frédéric Cuppens, and Hervé Debar
q Managing Behaviour Trust in Grids Using Statistical Methods of Quality AssuranceElvis Papalilo and Bernd Freisleben
q Dynamic Risk Mitigation in Computing InfrastructuresR. Ann Miura-Ko and Nicholas Bambos
q Risk Management in Coalition NetworksWim Mees
Papers by Session
Security Requirements and Policies
q On the Definition and Policies of ConfidentialityJohs Hansen Hammer and Gerardo Schneider
q Enhanced Availability and Security by Rate Control Using Extended PolicyFramework in SELinux
Pravin Shinde, Priyanka Sharma, and Srinivas Guntupalli
q CCARCH: Architecting Common Criteria Security RequirementsJose Romero-Mariona, Hadar Ziv, and Debra J. Richardson
Papers by Session
Agent and System Security
q Organized Anonymous AgentsMartijn Warnier and Frances Brazier
q Comparing the Trust and Security Models of Mobile AgentsMichail Fragkakis and Nikolaos Alexandris
q Program Fragmentation as a Metamorphic Software ProtectionBobby D. Birrer, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, and Robert W. Bennington
q Accurate Application-Specific Sandboxing for Win32/Intel BinariesWei Li, Lap-chung Lam, and Tzi-cker Chiueh
Papers by Session
Workshop on Computational Forensics
q Computational Forensics: Towards Hybrid-Intelligent Crime InvestigationKatrin Franke and Sargur N. Srihari
q Shoeprint Image Retrieval Based on Local Image FeaturesH. Su, D. Crookes, A. Bouridane, and M. Gueham
q Statistical Disk Cluster Classification for File CarvingCor J. Veenman
q Application of Language Models to Suspect Prioritisation and Suspect Likelihoodin Serial Crimes
Richard Bache, Fabio Crestani, David Canter, and Donna Youngs
q Improving the Efficiency of Digital Forensic Search by Means of the ConstrainedEdit Distance
Slobodan Petrovi and Katrin Franke
q Information-Theoretical Comparison of Likelihood Ratio Methods of ForensicEvidence Evaluation
Daniel Ramos, Joaquin Gonzalez-Rodriguez, Grzegorz Zadora, Janina Zieba-Palus,and Colin Aitken
Papers by Session
q Study of Structural Features of Handwritten Grapheme 'th' for Writer IdentificationVladimir Pervouchine and Graham Leedham
q Generative Models for Fingerprint Individuality Using Ridge TypesGang Fang, Sargur N. Srihari, and Harish Srinivasan
q Craniofacial Superimposition in Forensic Identification Using Genetic AlgorithmsLucia Ballerini, Oscar Cordon, Sergio Damas, Jose Santamaría, Inmaculada Aleman,and Miguel Botella
q The Influence of Frame Length on Speaker Identification PerformanceDonato Impedovo and Mario Refice
q On Periodic Properties of Interpolation and Their Application to ImageAuthentication
Babak Mahdian and Stanislav Saic
Papers by Session
Workshop on Data Hiding for Information and Multimedia Security
q Detection of Hidden Information in Webpages Based on RandomnessJunwei Huang, Xingming Sun, Huajun Huang, and Gang Luo
q A Weighted Stego Image Detector for Sequential LSB ReplacementAndrew D. Ker
q A Framework for Design and Analysis of Asymmetric Fingerprinting ProtocolsGeong Sen Poh and Keith M. Martin
q An Analysis of Database Watermarking SecurityJulien Lafaye
q A New Data Hiding Scheme with Quality Control for Binary Images Using BlockParity
M. Venkatesan, P. Meenakshi Devi, K. Duraiswamy, and K. Thiagarajah
q Metrics-Based Evaluation of Slicing ObfuscationsAnirban Majumdar, Stephen Drape, and Clark Thomborson
q Structural Digital Signature and Semi-fragile Fingerprinting for ImageAuthentication in Wavelet Domain
Yan Zhu, Chang-Tsun Li, and Hong-Jia Zhao
Papers by Session
q A Novel Anti-collusion Coding Scheme Tailored to Track Linear CollusionsKannan Karthik and Dimitrios Hatzinakos
q Research on Steganalysis for Text Steganography Based on Font FormatLingyun Xiang, Xingming Sun, Gang Luo, and Can Gan
q Protection of Mammograms Using Blind Steganography and WatermarkingYue Li, Chang-Tsun Li, and Chia-Hung Wei
Papers by Author
Aq Abi-Char, Pierre E.
q Abou-Tair, Dhiah el Diehn I.
q Abraham, Ajith
q Adereti, Aderemi
q Ahmad, Waseem
q Ahmed, Irfan
q Aitken, Colin
q Aleman, Inmaculada
q Alexandris, Nikolaos
q Aljnidi, Mohamad
q Alrodhan, Waleed A.
q Amini, Morteza
q Argyroudis, Patroklos
q Askwith, Robert
Bq Bache, Richard
q Baiardi, Fabrizio
q Baldwin, Rusty O.
q Ballerini, Lucia
q Bambos, Nicholas
q Barringer, Howard
q Bartoli, Alberto
q Bartolini, S.
q Bennington, Robert W.
q Berlik, Stefan
q Birrer, Bobby D.
q Bo, Su Mon
q Botella, Miguel
q Bouridane, A.
q Brazier, Frances
Papers by Author
Cq Canter, David
q Castagnini, G.
q Chalkias, K.
q Chatterjee, Madhumita
q Chen, Huan
q Chen, Lanxiang
q Chen, Minggang
q Cheng, Bo-Chao
q Chiueh, Tzi-cker
q Chowdhury, M. M.
q Christianson, Bruce
q Cooke, Neil
q Cordon, Oscar
q Crestani, Fabio
q Crookes, D.
q Cuppens, Frédéric
q Cuppens, Nora
Dq Damas, Sergio
q Debar, Hervé
q Debbabi, Mourad
q Devane, Satish
q Devi, P. Meenakshi
q Dey, Sandipan
q Djenouri, Djamel
q Doyle, Linda
q Drape, Stephen
q Dresner, Daniel Gideon
q Duraiswamy, K.
Papers by Author
Eq El-Din, Sherif Hazem Nour
q El-Hassan, Bachar
q Eskeland, Sigurd
Fq Fahad, Tarag
q Fang, Gang
q Feng, Dan
q Fillon, Cyril
q Fong, Simon
q Fragkakis, Michail
q Franke, Katrin
q Franqueira, Virginia N. L.
q Freisleben, Bernd
Gq Gan, Can
q Ghosh, S. K.
q Gillam, Lee
q Gonzalez-Rodriguez, Joaquin
q Gueham, M.
q Guntupalli, Srinivas
Hq Haidar, Diala Abi
q Hammer, Johs Hansen
q Hanna, Aiman
q Haslum, Kjetil
q Hatzinakos, Dimitrios
q He, Lirong
q He, Lisha
Papers by Author
q Hegazy, Abdel Fatah A.
q Hong, ManPyo
q Hopkins, Andrew
q Howells, Gareth
q Hristu-Varsakelis, D.
q Huang, Huajun
q Huang, Junwei
Iq Ibrahim, Ibrahim M.
q Impedovo, Donato
q In, Hoh Peter
Jq Jalili, Rasool
q Joshi, James B.D.
q Joshi, R. C.
q Jung, Sung-Oh David
Kq Karthik, Kannan
q Kelter, Udo
q Ker, Andrew D.
q Khokhar, Ashfaq
q Kifayat, Kashif
q Kim, Do Hoon
q Knapskog, Svein
q Kondoz, Ahmet
q Kumar, Krishan
Lq Lafaye, Julien
q Lam, Lap-chung
q Lee, Hee Jo
Papers by Author
q Lee, Taek
q Leedham, Graham
q Leneutre, Jean
q Lhee, Kyung-suk
q Li, Chang-Tsun
q Li, Wei
q Li, Yue
q Liang, Lu
q Ling, Jie
q Llewellyn-Jones, David
q Lopes, Raul H. C.
q Luo, Gang
Mq Magedanz, Thomas
q Mahdian, Babak
q Majumdar, Anirban
q Malcolm, James A.
q Martin, Keith M.
q Martinelli, E.
q Massacci, Fabio
q McAdoo, Robert
q McDonald-Maier, Klaus
q Medvet, Eric
q Mees, Wim
q Meinel, Christoph
q Merabti, Madjid
q Mhamed, Abdallah
q Mitchell, Chris J.
q Miura-Ko, R. Ann
q Morrow, Terry
q Mukhtar, Shoaib
q Mullins, Barry E.
Papers by Author
Nq Nenadic, Aleksandra
q Niu, Zhongying
Oq O’Mahony, Donal
q Oleshchuk, Vladimir
q Ong, Thian Song
q Ou, Yuyi
Pq Papalilo, Elvis
q Papoutsis, Evangelos
q Pervouchine, Vladimir
q Petrovi, Slobodan
q Phatak, Deepak
q Poh, Geong Sen
Rq Raines, Richard A.
q Ramachandran, Varun
q Ramos, Daniel
q Refice, Mario
q Richardson, Debra J.
q Rogers, Ian
q Romero-Mariona, Jose
Sq Saic, Stanislav
q Saleh, Mohamed
q Santamaría, Jose
q Sanyal, Sugata
q Sardana, Anjali
Papers by Author
q Saxena, Ashutosh
q Scardaci, Diego
q Schneider, Gerardo
q Scuderi, Giordano
q Sgandurra, Daniele
q Sharma, Priyanka
q Sher, Muhammad
q Shi, Qi
q Shinde, Pravin
q Skormin, Victor A.
q Smirnov, Alexey
q Srihari, Sargur N.
q Srinivasan, Harish
q Stephanides, G.
q Su, H.
q Sun, Xingming
Tq T., Srinivasan
q Takabi, Hassan
q Tariq, Usman
q Teoh, Andrew Beng Jin
q Thiagarajah, K.
q Thomborson, Clark
q Tokhtabayev, Arnur G.
q Toner, Stephen
q Tseng, Ryh-Yuh
Vq Vedachalam, Arun
q Veenman, Cor J.
q Venkatesan, M.
Papers by Author
Wq Wang, Hao
q Warnier, Martijn
q Wei, Chia-Hung
q Wood, J. Robert (Bob) G.
Xq Xiang, Lingyun
q Xiao, Hannan
q Xiao, Xiangrong
q Xu, Xiang
Yq Yan, Zhuang
q Yang, Naikuo
q Yang, Zhenrong
q Yanji, Piao
q Yao, Li
q Yautsiukhin, Artsiom
q Yoo, S.W.
q Youngs, Donna
Zq Zadora, Grzegorz
q Zeng, Lingfang
q Zhang, Ning
q Zhang, Yue
q Zhao, Hong-Jia
q Zhou, Wei
q Zhu, Yan
q Zieba-Palus, Janina
q Ziv, Hadar
Papers by Author
Abi-Char, Pierre E.q A Secure Authenticated Key Agreement Protocol for Wireless Security
q A Secure Authenticated Key Agreement Protocol Based on Elliptic CurveCryptography
Abou-Tair, Dhiah el Diehn I.q Enforcing Privacy by Means of an Ontology Driven XACML Framework
Abraham, Ajithq An LSB Data Hiding Technique Using Prime Numbers
q DIPS: A Framework for Distributed Intrusion Prediction and Prevention UsingHidden Markov Models and Online Fuzzy Risk Assessment
Adereti, Aderemiq A Performance Comparison of Wireless Ad Hoc Network Routing Protocols
under Security Attack
Papers by Author
Ahmad, Waseemq An Architecture for Privacy Preserving Collaborative Filtering on Web Portals
Ahmed, Irfanq Binding Update Authentication Scheme for Mobile IPv6
Aitken, Colinq Information-Theoretical Comparison of Likelihood Ratio Methods of Forensic
Evidence Evaluation
Aleman, Inmaculadaq Craniofacial Superimposition in Forensic Identification Using Genetic Algorithms
Alexandris, Nikolaosq Comparing the Trust and Security Models of Mobile Agents
Papers by Author
Aljnidi, Mohamadq Towards an Autonomic Security System for Mobile Ad Hoc Networks
Alrodhan, Waleed A.q Addressing Privacy Issues in CardSpace
Amini, Mortezaq Separation of Duty in Role-Based Access Control Model through Fuzzy Relations
q Enhancing Role-Based Access Control Model through Fuzzy Relations
Argyroudis, Patroklosq Analysing the Security Threats against Network Convergence Architectures
Askwith, Robertq On Detecting Packets Droppers in MANET: A Novel Low Cost Approach
Papers by Author
Bache, Richardq Application of Language Models to Suspect Prioritisation and Suspect Likelihood
in Serial Crimes
Baiardi, Fabrizioq Building Trustworthy Intrusion Detection through VM Introspection
Baldwin, Rusty O.q Program Fragmentation as a Metamorphic Software Protection
Ballerini, Luciaq Craniofacial Superimposition in Forensic Identification Using Genetic Algorithms
Bambos, Nicholasq Dynamic Risk Mitigation in Computing Infrastructures
Papers by Author
Barringer, Howardq A Purpose-Based Access Control Model
Bartoli, Albertoq Detection of Web Defacements by Means of Genetic Programming
Bartolini, S.q Inclusion of a Montgomery Multiplier Unit into an Embedded Processor’s Datapath
to Speed-Up Elliptic Curve Cryptography
Bennington, Robert W.q Program Fragmentation as a Metamorphic Software Protection
Berlik, Stefanq Enforcing Privacy by Means of an Ontology Driven XACML Framework
Papers by Author
Birrer, Bobby D.q Program Fragmentation as a Metamorphic Software Protection
Bo, Su Monq A Performance Comparison of Wireless Ad Hoc Network Routing Protocols
under Security Attack
Botella, Miguelq Craniofacial Superimposition in Forensic Identification Using Genetic Algorithms
Bouridane, A.q Shoeprint Image Retrieval Based on Local Image Features
Brazier, Francesq Organized Anonymous Agents
Papers by Author
Canter, Davidq Application of Language Models to Suspect Prioritisation and Suspect Likelihood
in Serial Crimes
Castagnini, G.q Inclusion of a Montgomery Multiplier Unit into an Embedded Processor’s Datapath
to Speed-Up Elliptic Curve Cryptography
Chalkias, K.q Low-Cost Anonymous Timed-Release Encryption
Chatterjee, Madhumitaq Secure E-Commerce Protocol for Purchase of e-Goods - Using Smart Card
Papers by Author
Chen, Huanq A Theoretical Security Model for Access Control and Security Assurance
Chen, Lanxiangq FPGA/ASIC Based Cryptographic Object Store System
Chen, Minggangq Second-LSB-Dependent Robust Watermarking for Relational Database
Cheng, Bo-Chaoq A Theoretical Security Model for Access Control and Security Assurance
Chiueh, Tzi-ckerq Automatic Patch Generation for Buffer Overflow Attacks
q Accurate Application-Specific Sandboxing for Win32/Intel Binaries
Papers by Author
Chowdhury, M. M.q An Authentication Scheme Using Non-commutative Semigroups
Christianson, Bruceq A Performance Comparison of Wireless Ad Hoc Network Routing Protocols
under Security Attack
Cooke, Neilq IP Protection: Detecting Email Based Breaches of Confidence
Cordon, Oscarq Craniofacial Superimposition in Forensic Identification Using Genetic Algorithms
Crestani, Fabioq Application of Language Models to Suspect Prioritisation and Suspect Likelihood
in Serial Crimes
Papers by Author
Crookes, D.q Shoeprint Image Retrieval Based on Local Image Features
Cuppens, Frédéricq Resource Classification Based Negotiation in Web Services
Cuppens, Noraq Resource Classification Based Negotiation in Web Services
Damas, Sergioq Craniofacial Superimposition in Forensic Identification Using Genetic Algorithms
Debar, Hervéq Resource Classification Based Negotiation in Web Services
Papers by Author
Debbabi, Mouradq Team Edit Automata for Testing Security Property
q Modeling Security Protocols as Games
Devane, Satishq Secure E-Commerce Protocol for Purchase of e-Goods - Using Smart Card
Devi, P. Meenakshiq A New Data Hiding Scheme with Quality Control for Binary Images Using Block
Parity
Dey, Sandipanq An LSB Data Hiding Technique Using Prime Numbers
Papers by Author
Djenouri, Djamelq On Detecting Packets Droppers in MANET: A Novel Low Cost Approach
Doyle, Lindaq Analysing the Security Threats against Network Convergence Architectures
Drape, Stephenq Metrics-Based Evaluation of Slicing Obfuscations
Dresner, Daniel Gideonq Operational Risk: Acceptability Criteria
Duraiswamy, K.q A New Data Hiding Scheme with Quality Control for Binary Images Using Block
Parity
Papers by Author
El-Din, Sherif Hazem Nourq An Effective and Secure Buyer-Seller Watermarking Protocol
El-Hassan, Bacharq A Secure Authenticated Key Agreement Protocol for Wireless Security
q A Secure Authenticated Key Agreement Protocol Based on Elliptic CurveCryptography
Eskeland, Sigurdq Hierarchical Multi-party Key Agreement for Wireless Networks
Fahad, Taragq On Detecting Packets Droppers in MANET: A Novel Low Cost Approach
Papers by Author
Fang, Gangq Generative Models for Fingerprint Individuality Using Ridge Types
Feng, Danq FPGA/ASIC Based Cryptographic Object Store System
Fillon, Cyrilq Detection of Web Defacements by Means of Genetic Programming
Fong, Simonq A Security Model for Detecting Suspicious Patterns in Physical Environment
Fragkakis, Michailq Comparing the Trust and Security Models of Mobile Agents
Papers by Author
Franke, Katrinq Computational Forensics: Towards Hybrid-Intelligent Crime Investigation
q Improving the Efficiency of Digital Forensic Search by Means of the ConstrainedEdit Distance
Franqueira, Virginia N. L.q Vulnerability Assessment by Learning Attack Specifications in Graphs
Freisleben, Berndq Managing Behaviour Trust in Grids Using Statistical Methods of Quality Assurance
Gan, Canq Research on Steganalysis for Text Steganography Based on Font Format
Papers by Author
Ghosh, S. K.q HPRS: A Hybrid P2P Reputation System Using File and Peer Rating
Gillam, Leeq IP Protection: Detecting Email Based Breaches of Confidence
Gonzalez-Rodriguez, Joaquinq Information-Theoretical Comparison of Likelihood Ratio Methods of Forensic
Evidence Evaluation
Gueham, M.q Shoeprint Image Retrieval Based on Local Image Features
Guntupalli, Srinivasq Early DoS Attack Detection Using Smoothened Time-Series and Wavelet Analysis
Papers by Author
q Enhanced Availability and Security by Rate Control Using Extended PolicyFramework in SELinux
Haidar, Diala Abiq Resource Classification Based Negotiation in Web Services
Hammer, Johs Hansenq On the Definition and Policies of Confidentiality
Hanna, Aimanq Team Edit Automata for Testing Security Property
Haslum, Kjetilq DIPS: A Framework for Distributed Intrusion Prediction and Prevention Using
Hidden Markov Models and Online Fuzzy Risk Assessment
Papers by Author
Hatzinakos, Dimitriosq A Novel Anti-collusion Coding Scheme Tailored to Track Linear Collusions
He, Lirongq Secure M-Commerce Transactions: A Third Party Based Signature Protocol
He, Lishaq Secure M-Commerce Transactions: A Third Party Based Signature Protocol
Hegazy, Abdel Fatah A.q An Effective and Secure Buyer-Seller Watermarking Protocol
Hong, ManPyoq Binding Update Authentication Scheme for Mobile IPv6
Papers by Author
Hopkins, Andrewq Integrating Multi-modal Circuit Features within an Efficient Encryption System
Howells, Garethq Integrating Multi-modal Circuit Features within an Efficient Encryption System
Hristu-Varsakelis, D.q Low-Cost Anonymous Timed-Release Encryption
Huang, Huajunq Detection of Hidden Information in Webpages Based on Randomness
Huang, Junweiq Detection of Hidden Information in Webpages Based on Randomness
Papers by Author
Ibrahim, Ibrahim M.q An Effective and Secure Buyer-Seller Watermarking Protocol
Impedovo, Donatoq The Influence of Frame Length on Speaker Identification Performance
In, Hoh Peterq Cyber Threat Trend Analysis Model Using HMM
Jalili, Rasoolq Separation of Duty in Role-Based Access Control Model through Fuzzy Relations
q Enhancing Role-Based Access Control Model through Fuzzy Relations
Joshi, James B.D.q SARBAC07: A Scoped Administration Model for RBAC with Hybrid Hierarchy
Papers by Author
Joshi, R. C.q Detection and Honeypot Based Redirection to Counter DDoS Attacks in ISP
Domain
Jung, Sung-Oh Davidq Cyber Threat Trend Analysis Model Using HMM
Karthik, Kannanq A Novel Anti-collusion Coding Scheme Tailored to Track Linear Collusions
Kelter, Udoq Enforcing Privacy by Means of an Ontology Driven XACML Framework
Ker, Andrew D.q A Weighted Stego Image Detector for Sequential LSB Replacement
Papers by Author
Khokhar, Ashfaqq An Architecture for Privacy Preserving Collaborative Filtering on Web Portals
Kifayat, Kashifq Applying Secure Data Aggregation Techniques for a Structure and Density
Independent Group Based Key Management Protocol
Kim, Do Hoonq Cyber Threat Trend Analysis Model Using HMM
Knapskog, Sveinq DIPS: A Framework for Distributed Intrusion Prediction and Prevention Using
Hidden Markov Models and Online Fuzzy Risk Assessment
Papers by Author
Kondoz, Ahmetq IP Protection: Detecting Email Based Breaches of Confidence
Kumar, Krishanq Detection and Honeypot Based Redirection to Counter DDoS Attacks in ISP
Domain
Lafaye, Julienq An Analysis of Database Watermarking Security
Lam, Lap-chungq Accurate Application-Specific Sandboxing for Win32/Intel Binaries
Lee, Hee Joq Cyber Threat Trend Analysis Model Using HMM
Papers by Author
Lee, Taekq Cyber Threat Trend Analysis Model Using HMM
Leedham, Grahamq Study of Structural Features of Handwritten Grapheme 'th' for Writer Identification
Leneutre, Jeanq Towards an Autonomic Security System for Mobile Ad Hoc Networks
Lhee, Kyung-sukq Binding Update Authentication Scheme for Mobile IPv6
Li, Chang-Tsunq Structural Digital Signature and Semi-fragile Fingerprinting for Image
Authentication in Wavelet Domain
q Protection of Mammograms Using Blind Steganography and Watermarking
Papers by Author
Li, Weiq Accurate Application-Specific Sandboxing for Win32/Intel Binaries
Li, Yueq Protection of Mammograms Using Blind Steganography and Watermarking
Liang, Luq Certified Email Delivery with Offline TTP
Ling, Jieq Certified Email Delivery with Offline TTP
Llewellyn-Jones, Davidq Applying Secure Data Aggregation Techniques for a Structure and Density
Independent Group Based Key Management Protocol
Papers by Author
Lopes, Raul H. C.q Vulnerability Assessment by Learning Attack Specifications in Graphs
Luo, Gangq Detection of Hidden Information in Webpages Based on Randomness
q Research on Steganalysis for Text Steganography Based on Font Format
Magedanz, Thomasq Protecting IP Multimedia Subsystem (IMS) Service Delivery Platform from Time
Independent Attacks
Mahdian, Babakq On Periodic Properties of Interpolation and Their Application to Image
Authentication
Papers by Author
Majumdar, Anirbanq Metrics-Based Evaluation of Slicing Obfuscations
Malcolm, James A.q A Performance Comparison of Wireless Ad Hoc Network Routing Protocols
under Security Attack
Martin, Keith M.q A Framework for Design and Analysis of Asymmetric Fingerprinting Protocols
Martinelli, E.q Inclusion of a Montgomery Multiplier Unit into an Embedded Processor’s Datapath
to Speed-Up Elliptic Curve Cryptography
Papers by Author
Massacci, Fabioq Modelling Quality of Protection in Outsourced Business Processes
McAdoo, Robertq Analysing the Security Threats against Network Convergence Architectures
McDonald-Maier, Klausq Integrating Multi-modal Circuit Features within an Efficient Encryption System
Medvet, Ericq Detection of Web Defacements by Means of Genetic Programming
Mees, Wimq Risk Management in Coalition Networks
Papers by Author
Meinel, Christophq Function-Based Authorization Constraints Specification and Enforcement
Merabti, Madjidq Applying Secure Data Aggregation Techniques for a Structure and Density
Independent Group Based Key Management Protocol
Mhamed, Abdallahq A Secure Authenticated Key Agreement Protocol for Wireless Security
q A Secure Authenticated Key Agreement Protocol Based on Elliptic CurveCryptography
Mitchell, Chris J.q Addressing Privacy Issues in CardSpace
Papers by Author
Miura-Ko, R. Annq Dynamic Risk Mitigation in Computing Infrastructures
Morrow, Terryq Levels of Authentication Assurance: An Investigation
Mukhtar, Shoaibq Binding Update Authentication Scheme for Mobile IPv6
Mullins, Barry E.q Program Fragmentation as a Metamorphic Software Protection
Nenadic, Aleksandraq Levels of Authentication Assurance: An Investigation
Papers by Author
Niu, Zhongyingq FPGA/ASIC Based Cryptographic Object Store System
O’Mahony, Donalq Analysing the Security Threats against Network Convergence Architectures
Oleshchuk, Vladimirq Hierarchical Multi-party Key Agreement for Wireless Networks
Ong, Thian Songq Fuzzy Key Extraction from Fingerprint Biometrics Based on Dynamic Quantization
Mechanism
Ou, Yuyiq Certified Email Delivery with Offline TTP
Papers by Author
Papalilo, Elvisq Managing Behaviour Trust in Grids Using Statistical Methods of Quality Assurance
Papoutsis, Evangelosq Integrating Multi-modal Circuit Features within an Efficient Encryption System
Pervouchine, Vladimirq Study of Structural Features of Handwritten Grapheme 'th' for Writer Identification
Petrovi, Slobodanq Improving the Efficiency of Digital Forensic Search by Means of the Constrained
Edit Distance
Phatak, Deepakq Secure E-Commerce Protocol for Purchase of e-Goods - Using Smart Card
Papers by Author
Poh, Geong Senq A Framework for Design and Analysis of Asymmetric Fingerprinting Protocols
Raines, Richard A.q Program Fragmentation as a Metamorphic Software Protection
Ramachandran, Varunq HPRS: A Hybrid P2P Reputation System Using File and Peer Rating
Ramos, Danielq Information-Theoretical Comparison of Likelihood Ratio Methods of Forensic
Evidence Evaluation
Refice, Marioq The Influence of Frame Length on Speaker Identification Performance
Papers by Author
Richardson, Debra J.q CCARCH: Architecting Common Criteria Security Requirements
Rogers, Ianq Secure M-Commerce Transactions: A Third Party Based Signature Protocol
Romero-Mariona, Joseq CCARCH: Architecting Common Criteria Security Requirements
Saic, Stanislavq On Periodic Properties of Interpolation and Their Application to Image
Authentication
Saleh, Mohamedq Modeling Security Protocols as Games
Papers by Author
Santamaría, Joseq Craniofacial Superimposition in Forensic Identification Using Genetic Algorithms
Sanyal, Sugataq An LSB Data Hiding Technique Using Prime Numbers
Sardana, Anjaliq Detection and Honeypot Based Redirection to Counter DDoS Attacks in ISP
Domain
Saxena, Ashutoshq Threshold SKI Protocol for ID-Based Cryptosystems
Scardaci, Diegoq A Secure Storage Service for the gLite Middleware
Papers by Author
Schneider, Gerardoq On the Definition and Policies of Confidentiality
Scuderi, Giordanoq A Secure Storage Service for the gLite Middleware
Sgandurra, Danieleq Building Trustworthy Intrusion Detection through VM Introspection
Sharma, Priyankaq Enhanced Availability and Security by Rate Control Using Extended Policy
Framework in SELinux
Sher, Muhammadq Protecting IP Multimedia Subsystem (IMS) Service Delivery Platform from Time
Independent Attacks
Papers by Author
Shi, Qiq Applying Secure Data Aggregation Techniques for a Structure and Density
Independent Group Based Key Management Protocol
Shinde, Pravinq Early DoS Attack Detection Using Smoothened Time-Series and Wavelet Analysis
q Enhanced Availability and Security by Rate Control Using Extended PolicyFramework in SELinux
Skormin, Victor A.q Non-stationary Markov Models and Anomaly Propagation Analysis in IDS
Smirnov, Alexeyq Automatic Patch Generation for Buffer Overflow Attacks
Papers by Author
Srihari, Sargur N.q Computational Forensics: Towards Hybrid-Intelligent Crime Investigation
q Generative Models for Fingerprint Individuality Using Ridge Types
Srinivasan, Harishq Generative Models for Fingerprint Individuality Using Ridge Types
Stephanides, G.q Low-Cost Anonymous Timed-Release Encryption
Su, H.q Shoeprint Image Retrieval Based on Local Image Features
Sun, Xingmingq Second-LSB-Dependent Robust Watermarking for Relational Database
q Detection of Hidden Information in Webpages Based on Randomness
Papers by Author
q Research on Steganalysis for Text Steganography Based on Font Format
T., Srinivasanq HPRS: A Hybrid P2P Reputation System Using File and Peer Rating
Takabi, Hassanq Separation of Duty in Role-Based Access Control Model through Fuzzy Relations
q Enhancing Role-Based Access Control Model through Fuzzy Relations
Tariq, Usmanq Binding Update Authentication Scheme for Mobile IPv6
Teoh, Andrew Beng Jinq Fuzzy Key Extraction from Fingerprint Biometrics Based on Dynamic Quantization
Mechanism
Papers by Author
Thiagarajah, K.q A New Data Hiding Scheme with Quality Control for Binary Images Using Block
Parity
Thomborson, Clarkq Metrics-Based Evaluation of Slicing Obfuscations
Tokhtabayev, Arnur G.q Non-stationary Markov Models and Anomaly Propagation Analysis in IDS
Toner, Stephenq Analysing the Security Threats against Network Convergence Architectures
Tseng, Ryh-Yuhq A Theoretical Security Model for Access Control and Security Assurance
Papers by Author
Vedachalam, Arunq HPRS: A Hybrid P2P Reputation System Using File and Peer Rating
Veenman, Cor J.q Statistical Disk Cluster Classification for File Carving
Venkatesan, M.q A New Data Hiding Scheme with Quality Control for Binary Images Using Block
Parity
Wang, Haoq Certified Email Delivery with Offline TTP
Warnier, Martijnq Organized Anonymous Agents
Papers by Author
Wei, Chia-Hungq Protection of Mammograms Using Blind Steganography and Watermarking
Wood, J. Robert (Bob) G.q Operational Risk: Acceptability Criteria
Xiang, Lingyunq Research on Steganalysis for Text Steganography Based on Font Format
Xiao, Hannanq A Performance Comparison of Wireless Ad Hoc Network Routing Protocols
under Security Attack
Xiao, Xiangrongq Second-LSB-Dependent Robust Watermarking for Relational Database
Papers by Author
Xu, Xiangq Certified Email Delivery with Offline TTP
Yan, Zhuangq A Security Model for Detecting Suspicious Patterns in Physical Environment
Yang, Naikuoq A Purpose-Based Access Control Model
Yang, Zhenrongq Team Edit Automata for Testing Security Property
Yanji, Piaoq Binding Update Authentication Scheme for Mobile IPv6
Papers by Author
Yao, Liq Levels of Authentication Assurance: An Investigation
Yautsiukhin, Artsiomq Modelling Quality of Protection in Outsourced Business Processes
Yoo, S.W.q Binding Update Authentication Scheme for Mobile IPv6
Youngs, Donnaq Application of Language Models to Suspect Prioritisation and Suspect Likelihood
in Serial Crimes
Zadora, Grzegorzq Information-Theoretical Comparison of Likelihood Ratio Methods of Forensic
Evidence Evaluation
Papers by Author
Zeng, Lingfangq FPGA/ASIC Based Cryptographic Object Store System
Zhang, Ningq Secure M-Commerce Transactions: A Third Party Based Signature Protocol
q A Purpose-Based Access Control Model
q Levels of Authentication Assurance: An Investigation
Zhang, Yueq SARBAC07: A Scoped Administration Model for RBAC with Hybrid Hierarchy
Zhao, Hong-Jiaq Structural Digital Signature and Semi-fragile Fingerprinting for Image
Authentication in Wavelet Domain
Papers by Author
Zhou, Weiq Function-Based Authorization Constraints Specification and Enforcement
Zhu, Yanq Structural Digital Signature and Semi-fragile Fingerprinting for Image
Authentication in Wavelet Domain
Zieba-Palus, Janinaq Information-Theoretical Comparison of Likelihood Ratio Methods of Forensic
Evidence Evaluation
Ziv, Hadarq CCARCH: Architecting Common Criteria Security Requirements
Papers by Author
A B C D E F G
H I J K L M N
O P Q R S T U
V W X Y Z