default search action
3. ISA 2009: Seoul, Korea
- Jong Hyuk Park, Hsiao-Hwa Chen, Mohammed Atiquzzaman, Changhoon Lee, Tai-Hoon Kim, Sang-Soo Yeo:
Advances in Information Security and Assurance, Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings. Lecture Notes in Computer Science 5576, Springer 2009, ISBN 978-3-642-02616-4
Cryptographic Algorithms
- Kitae Jeong, Joongeun Choi, Yuseop Lee, Changhoon Lee, Jaechul Sung, Haeryong Park, Yeonjung Kang:
Update on SEED: SEED-192/256. 1-10 - Jesang Lee, Seokhie Hong, Jaechul Sung, Haeryong Park:
A New Double-Block-Length Hash Function Using Feistel Structure. 11-20
Authentication and Identity Management
- Franck Cassez:
The Dark Side of Timed Opacity. 21-30 - Yumin Yuan, Da Li, Liwen Tian, Haishan Zhu:
Certificateless Signature Scheme without Random Oracles. 31-40
Authorization and Access Control
- Vineela Muppavarapu, Soon Myoung Chung:
Fine-Grain Access Control Using Shibboleth for the Storage Resource Broker. 41-50 - Amril Syalim, Yoshiaki Hori, Kouichi Sakurai:
Grouping Provenance Information to Improve Efficiency of Access Control. 51-59 - Ronald Toegl:
Tagging the Turtle: Local Attestation for Kiosk Computing. 60-69 - Chao Huang, Jianling Sun, Xinyu Wang, Yuanjie Si:
Selective Regression Test for Access Control System Employing RBAC. 70-79 - Akihiro Sakai, Yoshiaki Hori, Kouichi Sakurai:
Formal Verification for Access Control in Web Information Sharing System. 80-89
Biometrics and Computer Forensics
- Rahib Hidayat Abiyev, Kemal Ihsan Kilic:
Adaptive Iris Segmentation. 90-99 - Hamidreza Rashidy Kanan, Mohammad Shahram Moin:
Recognizing Partially Occluded Faces from a Single Exemplar Image Per Person. 100-109 - Magdalena Szezynska, Ewa Huebner, Derek Bem, Chun Ruan:
Methodology and Tools of IS Audit and Computer Forensics - The Common Denominator. 110-121
Cryptographic Protocols
- Nadia El Mrabet:
What about Vulnerability to a Fault Attack of the Miller's Algorithm During an Identity Based Protocol?. 122-134 - Qingfeng Cheng, Chuangui Ma, Xuexian Hu:
A New Strongly Secure Authenticated Key Exchange Protocol. 135-144 - Changan Zhao, Dongqing Xie, Fangguo Zhang, Chong-zhi Gao, Jingwei Zhang:
Improved Implementations of Cryptosystems Based on Tate Pairing. 145-151 - Zheng Huang, Weidong Qiu, Qiang Li, Kefei Chen:
Efficient Secure Multiparty Computation Protocol in Asynchronous Network. 152-158
Data Integrity and Privacy
- Mohammad-Reza Zare-Mirakabad, Aman Jantan, Stéphane Bressan:
Clustering-Based Frequency l-Diversity Anonymization. 159-168 - Fangyong Hou, Nong Xiao, Yuhua Tang, Hongjun He, Fang Liu:
Protect Disk Integrity: Solid Security, Fine Performance and Fast Recovery. 169-178 - Benedikt Westermann, Andriy Panchenko, Lexi Pimenidis:
A Kademlia-Based Node Lookup System for Anonymization Networks. 179-189
Key Management and Recovery
- Abedelaziz Mohaisen, Nam-Su Jho, Dowon Hong:
A Computationally-Efficient Construction for the Matrix-Based Key Distribution in Sensor Network. 190-199 - Weidong Qiu, Yaowei Zhou, Bo Zhu, Yanfei Zheng, Mi Wen, Zheng Gong:
Key-Insulated Encryption Based Key Pre-distribution Scheme for WSN. 200-209
Mobile and RFID Network Security
- Matthew Smith, Christian Schridde, Björn Agel, Bernd Freisleben:
Securing Mobile Phone Calls with Identity-Based Cryptography. 210-222 - Abid Khan, Qasim Arshad, Xiamu Niu, Yong Zhang, Muhammad Waqas Anwar:
On the Security Properties and Attacks against Mobile Agent Graph Head Sealing (MAGHS). 223-228
Firewall, IDS, Anti-virus, and Other Security Products
- Hongying Tang, Bo Zhu, Kui Ren:
A New Approach to Malware Detection. 229-238 - Yongjin Kim:
ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION. 239-249 - Siraj A. Shaikh, Howard Chivers, Philip Nobles, John A. Clark, Hao Chen:
A Deployment Value Model for Intrusion Detection Sensors. 250-259
Internet and Web Services Security
- Zahra Aghajani, Mohammad Abdollahi Azgomi:
Security Evaluation of an Intrusion Tolerant Web Service Architecture Using Stochastic Activity Networks. 260-269 - Ieng-Fat Lam, Wei-Cheng Xiao, Szu-Chi Wang, Kuan-Ta Chen:
Counteracting Phishing Page Polymorphism: An Image Layout Analysis Approach. 270-279
Cyber-attack and Cyber-terrorism
- Georgios Kambourakis, Constantinos Kolias, Stefanos Gritzalis, Jong Hyuk Park:
Signaling-Oriented DoS Attacks in UMTS Networks. 280-289 - Tae Hwan Kim, Dong Seong Kim, Sang Min Lee, Jong Sou Park:
Detecting DDoS Attacks Using Dispersible Traffic Matrix and Weighted Moving Average. 290-300 - Ming-Yang Su, Kai-Chi Chang, Chun-Yuen Lin:
Attack Patterns Discovery by Frequent Episodes Mining from Honeypot Systems. 301-306
Other Security Research
- Yanjun Wu, Tzi-cker Chiueh, Chen Zhao:
Efficient and Automatic Instrumentation for Packed Binaries. 307-316 - Hedieh Sajedi, Mansour Jamzad:
Secure Cover Selection Steganography. 317-326 - Zhimin Chen, Syed Haider, Patrick Schaumont:
Side-Channel Leakage in Masked Circuits Caused by Higher-Order Circuit Effects. 327-336 - Kihong Kim, Jinkeun Hong:
Performance Analysis of Digital Secure Voice Transmission over HF Radio Channel. 337-346 - Chu-Hsing Lin, Jung-Chun Liu, Mao-Hua Cheng, Tsung-Che Yang, Mei-Chun Chou:
Energy Analysis of Multimedia Video Streaming on Mobile Devices. 347-357 - Lingli Deng, Yeping He, Ziyao Xu:
Combating Index Poisoning in P2P File Sharing. 358-367 - Jongsung Kim, Raphael C.-W. Phan:
A Cryptanalytic View of the NSA's Skipjack Block Cipher Design. 368-381 - Jinyang Shi, Kwok-Yan Lam:
MinuCode: A Fixed-Value Representation of Fingerprint Minutiae for Biometric Cryptosystem. 382-391 - Meng Ge, Kwok-Yan Lam:
Self-initialized Distributed Certificate Authority for Mobile Ad Hoc Network. 392-401 - Jemal H. Abawajy:
Design and Delivery of Undergraduate IT Security Management Course. 402-411
MoWiN 2009
- Rohit Pathak, Satyadhar Joshi:
Secure Multi-party Computation Using Virtual Parties for Computation on Encrypted Data. 412-421 - Edison Pignaton de Freitas, Tales Heimfarth, Marco A. Wehrmeister, Flávio Rech Wagner, Armando Morado Ferreira, Carlos Eduardo Pereira, Tony Larsson:
Using a Link Metric to Improve Communication Mechanisms and Real-Time Properties in an Adaptive Middleware for Heterogeneous Sensor Networks. 422-431 - Ronald Beaubrun, Badji Molo:
Performance Evaluation of DSR in Multi-services Ad Hoc Networks. 432-437 - Kazuyuki Sakoda, Yuichi Morioka, Chihiro Fujita, Erica Tanimoto, Kenzoh Nishikawa, Mitsuhiro Suzuki:
Implementation and Evaluation of WiMedia MAC LSI. 438-449 - Nomica Imran, Asad I. Khan:
A Reliable and Efficient Pedal Back Data Disseminating Scheme for Ad-Hoc WSNs. 450-460 - So-Young Kang, Jin-Woo Song, Kwang-Jo Lee, Ju-Hee Lee, Ji-Hoon Kim, Sung-Bong Yang:
Improved Location Acquisition Algorithms for the Location-Based Alert Service. 461-470 - Kyunghwa Lee, Joohyun Lee, Bongduk Zhang, Jaeho Kim, Yongtae Shin:
An Enhanced Trust Center Based Authentication in ZigBee Networks. 471-484 - Takahide Yanaka, Toshihiko Sasama, Hiroshi Masuyama:
Sensor Disposition Problem in Wireless Ad-Hoc Sensor Networks. 485-493 - Kentaro Kishida, Toshihiko Sasama, Hiroshi Masuyama:
Performance Evaluation of Cost Effective Routing for Packet Transmissions in Mobile Ad Hoc Networks. 494-501 - Toshihiko Sasama, Yasuhiro Abe, Hiroshi Masuyama:
Energy Lesser Broadcasting Algorithms Using Adjustable Transmission Ranges in Mobile Ad Hoc Networks. 502-511 - Mei-Jhen Chen, Gwo-Jong Yu:
A Multi-Path Routing Supported Scheduling Algorithm for Multi-Channel Single-Transceiver Wireless Mesh Networks. 512-521 - Ebtisam Amar, Selma Boumerdassi, Éric Renault:
Predictive Scheme for Location Service in Mobile Ad-Hoc Networks. 522-531 - Anh-Ngoc Le, Dong-Won Kum, You Ze Cho:
An Efficient Hybrid Routing Approach for Hybrid Wireless Mesh Networks. 532-542 - Lily Shui-Lien Chen, Michael Chih-Hung Wang, Yung-Hsin Lee:
Relationship between Motivation and Satisfaction of Online Computer Games: Evidence from Adolescent Players Using Wireless Service in Taiwan. 543-552 - Chih-Chung Lai, Ren-Song Ko:
DISHES: A Distributed Shell System for Ubiquitous Computing. 553-562 - Hsin-Kun Lai, Chia-Chin Ma, Erl-Huei Lu:
Error Control Scheme of Hybrid ARQ Based on Majority Voting Bit by Bit. 563-569 - Yejun Zhou, Hui Li, Jianfeng Ma:
Secure Error-Correction Network Coding in a Randomized Setting. 570-577 - Beatrice Cynthia Dhinakaran, Dhinaharan Nagamalai, Jae-Kwang Lee:
Bayesian Approach Based Comment Spam Defending Tool. 578-587
NASSUE 2009
- Jianhong Zhang, Yixian Yang, Xinxin Niu, Shengnan Gao, Hua Chen, Qin Geng:
An Improved Secure Identity-Based On-Line/Off-Line Signature Scheme. 588-597 - Ghassan Ahmed Ali, Aman Jantan, Abdulghani Ali:
Honeybee-Based Model to Detect Intrusion. 598-607 - Zenghui Liu, Yingxu Lai:
A Data Mining Framework for Building Intrusion Detection Models Based on IPv6. 608-618 - Sameh M. Shohdy, Ashraf El-Sisi, Nabil A. Ismail:
FPGA Implementation of Elliptic Curve Point Multiplication over GF(2191). 619-634 - Bin Li:
A Forward-Secrecy WTLS Handshake Protocol Based on XTR. 635-643 - Mazleena Salleh, Teoh Chin Yew:
Application of 2D Barcode in Hardcopy Document Verification System. 644-651 - Deven Shah, Ashish Mangal, Mayank Agarwal, Mahendra Mehra, Tushar Dave, Dhiren R. Patel:
Protecting Global SOA from DoS and Other Security Threats. 652-661 - ByungRae Cha, YoungIl Kim:
CRYPTEX Model for E-Commercial Contract of Software Source Code Using Secrete Sharing Scheme. 662-671 - Binod Vaidya, Jong Hyuk Park, Joel J. P. C. Rodrigues:
HOTP-Based User Authentication Scheme in Home Networks. 672-681
IAWSN 2009
- Firdous Kausar, Ayesha Naureen:
A Comparative Analysis of HC-128 and Rabbit Encryption Schemes for Pervasive Computing in WSN Environment. 682-691 - Ayesha Naureen, Attiya Akram, Rabia Riaz, Ki-Hyung Kim, H. Farooq Ahmed:
A Comparative Analysis of PKC and Semi-PKC Based Key Management Schemes for Hierarchical Sensor Networks. 692-701 - Naima Iltaf, Mukhtar Hussain, Farrukh Kamran:
A Mathematical Approach towards Trust Based Security in Pervasive Computing Environment. 702-711 - Asma Khalid, Mukhtar Hussain:
A Secure Group Rekeying Scheme with Compromised Node Revocation in Wireless Sensor Networks. 712-721 - Usama Ahmed, Muhammad Arif Wahla, Firdous Kausar:
Fault Tolerant Secure Routing in Cluster Based Mobile Sensor Networks. 722-731 - Rabia Latif, Mukhtar Hussain:
Hardware-Based Random Number Generation in Wireless Sensor Networks(WSNs). 732-740 - Shakil Ahmad, Muhammad Arif Wahla, Firdous Kausar:
Authenticated Encryption in WSN Using eSTREAM Ciphers. 741-749
WNGS 2009 and CGMS 2009
- Markus Rückert, Dominique Schröder:
Aggregate and Verifiably Encrypted Signatures from Multilinear Maps without Random Oracles. 750-759 - Jong Sik Moon, Deok-Gyu Lee, Im-Yeong Lee:
Device Authentication/Authorization Protocol for Home Network in Next Generation Security. 760-768 - Hangbae Chang, Jonggu Kang, Hyuk-Jun Kwon:
A Study on Feasibility and Establishment of a Security Grade Certification Scheme for the New IT Services. 769-777 - Albert Park:
Domain Specific Intended Use Evaluation Method: Intrusion Detection Specific Intended Use Evaluation Method. 778-787 - Soonseok Kim, Haeyoung Han, Donghwi Shin, Inkyung Jeun, Hyun Cheol Jeong:
A Study of International Trend Analysis on Web Service Vulnerabilities in OWASP and WASC. 788-796 - Song-Hee Lee, Nam-Sup Park, Soo-Kyun Kim, Jin-Young Choi:
Cryptanalysis of Secure Key Exchange Protocol between STB and Smart Card in IPTV Broadcasting. 797-803 - Sunhwa Jung, Min Hong, Min-Hyung Choi:
Free-Form Deformation Axis Aligned Bounding Box. 804-813
SHCI-ISA 2009
- Jong-Min Kim, Myung A. Kang:
A Study on Mosaic Based CCTV System Using Localization. 814-822 - Jeong Seok Oh, Jang Sik Park, Jeong Rock Kwon:
Selecting the Wireless Communication Methods for Establishing Ubiquitous City-Gas Facilities in Korea. 823-828 - Hoon Ko, Ning Chen, Goreti Marreiros, Carlos Ramos:
Safety High Accuracy Context-Aware Matrix (CAM) Making Based on X.509 Proxy Certificate. 829-837
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.