IAS 2007:
Manchester,
UK
Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007, August 29-31, 2007, Manchester, United Kingdom.
IEEE Computer Society 2007 BibTeX
E-Commerce Security
- Li-Sha He, Ning Zhang, Li-Rong He, Ian Rogers:
Secure M-commerce Transactions: A Third Party Based Signature Protocol.
3-8
Electronic Edition (link) BibTeX
- Satish Devane, Madhumita Chatterjee, Deepak Phatak:
Secure E-Commerce Protocol for Purchase of e-Goods - Using Smart Card.
9-14
Electronic Edition (link) BibTeX
- Hao Wang, Yuyi Ou, Jie Ling, Lu Liang, Xiang Xu:
Certified Email Delivery with Offline TTP.
15-20
Electronic Edition (link) BibTeX
- Ibrahim M. Ibrahim, Sherif Hazem Nour El-Din, Abdel Fatah A. Hegazy:
An Effective and Secure Buyer-Seller Watermarking Protocol.
21-28
Electronic Edition (link) BibTeX
Network Security
- Mohamad Aljnidi, Jean Leneutre:
Towards an Autonomic Security System for Mobile Ad Hoc Networks.
29-32
Electronic Edition (link) BibTeX
- Pierre E. Abi-Char, Abdallah Mhamed, Bachar El-Hassan:
A Secure Authenticated Key Agreement Protocol For Wireless Security.
33-38
Electronic Edition (link) BibTeX
- Sigurd Eskeland, Vladimir A. Oleshchuk:
Hierarchical Multi-Party Key Agreement for Wireless Networks.
39-43
Electronic Edition (link) BibTeX
- Kashif Kifayat, Madjid Merabti, Qi Shi, David Llewellyn-Jones:
Applying Secure Data Aggregation techniques for a Structure and Density Independent Group Based Key Management Protocol.
44-49
Electronic Edition (link) BibTeX
- Su Mon Bo, Hannan Xiao, Aderemi Adereti, James A. Malcolm, Bruce Christianson:
A Performance Comparison of Wireless Ad Hoc Network Routing Protocols under Security Attack.
50-55
Electronic Edition (link) BibTeX
- Tarag Fahad, Djamel Djenouri, Robert Askwith:
On Detecting Packets Droppers in MANET: A Novel Low Cost Approach.
56-64
Electronic Edition (link) BibTeX
Cryptographic Schemes and Applications
- Ashutosh Saxena:
Threshold SKI Protocol for ID-based Cryptosystems.
65-70
Electronic Edition (link) BibTeX
- Thian Song Ong, Andrew Beng Jin Teoh:
Fuzzy Key Extraction from Fingerprint Biometrics based on Dynamic Quantization Mechanism.
71-76
Electronic Edition (link) BibTeX
- Dimitrios Hristu-Varsakelis, Konstantinos Chalkias, George Stephanides:
Low-cost Anonymous Timed-Release Encryption.
77-82
Electronic Edition (link) BibTeX
- Evangelos Papoutsis, Gareth Howells, Andrew B. T. Hopkins, Klaus D. McDonald-Maier:
Integrating Multi-Modal Circuit Features within an Efficient Encryption System.
83-88
Electronic Edition (link) BibTeX
- Pierre E. Abi-Char, Abdallah Mhamed, Bachar El-Hassan:
A Secure Authenticated Key Agreement Protocol Based on Elliptic Curve Cryptography.
89-94
Electronic Edition (link) BibTeX
- Sandro Bartolini, Cinzia Castagnini, Enrico Martinelli:
Inclusion of a Montgomery Multiplier Unit into an Embedded Processors Datapath to Speed-up Elliptic Curve Cryptography.
95-100
Electronic Edition (link) BibTeX
- Sandipan Dey, Ajith Abraham, Sugata Sanyal:
An LSB Data Hiding Technique Using Prime Numbers.
101-108
Electronic Edition (link) BibTeX
Authentication and Access Control
- Irfan Ahmed, Usman Tariq, Shoaib Mukhtar, Kyung-suk Lhee, S. W. Yoo, Piao Yanji, Manpyo Hong:
Binding Update Authentication Scheme for Mobile IPv6.
109-114
Electronic Edition (link) BibTeX
- M. M. Chowdhury:
An Authentication Scheme Using Non-Commutative Semigroups.
115-118
Electronic Edition (link) BibTeX
- Wei Zhou, Christoph Meinel:
Function-Based Authorization Constraints Specification and Enforcement.
119-124
Electronic Edition (link) BibTeX
- Hassan Takabi, Morteza Amini, Rasool Jalili:
Separation of Duty in Role-Based Access Control Model through Fuzzy Relations.
125-130
Electronic Edition (link) BibTeX
- Hassan Takabi, Morteza Amini, Rasool Jalili:
Enhancing Role-Based Access Control Model through Fuzzy Relations.
131-136
Electronic Edition (link) BibTeX
- Bo-Chao Cheng, Huan Chen, Ryh-Yuh Tseng:
A Theoretical Security Model for Access Control and Security Assurance.
137-142
Electronic Edition (link) BibTeX
- Naikuo Yang, Howard Barringer, Ning Zhang:
A Purpose-Based Access Control Model.
143-148
Electronic Edition (link) BibTeX
- Yue Zhang, James B. D. Joshi:
SARBAC07: A Scoped Administration Model for RBAC with Hybrid Hierarchy.
149-154
Electronic Edition (link) BibTeX
- Aleksandra Nenadic, Ning Zhang, Li Yao, Terry Morrow:
Levels of Authentication Assurance: an Investigation.
155-160
Electronic Edition (link) BibTeX
Intrusion Prevention
Intrusion Detection
- Anjali Sardana, Krishan Kumar, Ramesh Chandra Joshi:
Detection and Honeypot Based Redirection to Counter DDoS Attacks in ISP Domain.
191-196
Electronic Edition (link) BibTeX
- Neil Cooke, Lee Gillam, Ahmet M. Kondoz:
IP protection: Detecting Email based breaches of confidence.
197-202
Electronic Edition (link) BibTeX
- Arnur G. Tokhtabayev, Victor A. Skormin:
Non-Stationary Markov Models and Anomaly Propagation Analysis in IDS.
203-208
Electronic Edition (link) BibTeX
- Fabrizio Baiardi, Daniele Sgandurra:
Building Trustworthy Intrusion Detection through VM Introspection.
209-214
Electronic Edition (link) BibTeX
- Pravin Shinde, Srinivas Guntupalli:
Early DoS Attack Detection using Smoothened Time-Series andWavelet Analysis.
215-220
Electronic Edition (link) BibTeX
- Simon Fong, Zhuang Yan:
A Security Model for Detecting Suspicious Patterns in Physical Environment.
221-226
Electronic Edition (link) BibTeX
- Eric Medvet, Cyril De Fillon, Alberto Bartoli:
Detection of Web Defacements by means of Genetic Programming.
227-234
Electronic Edition (link) BibTeX
Security Analysis
Data Security and Privacy
- Diego Scardaci, Giordano Scuderi:
A Secure Storage Service for the gLite Middleware.
261-266
Electronic Edition (link) BibTeX
- Dan Feng, Lanxiang Chen, Lingfang Zeng, Zhongying Niu:
FPGA/ASIC based Cryptographic Object Store System.
267-272
Electronic Edition (link) BibTeX
- Waseem Ahmad, Ashfaq A. Khokhar:
An Architecture for Privacy Preserving Collaborative Filtering on Web Portals.
273-278
Electronic Edition (link) BibTeX
- Dhiah el Diehn I. Abou-Tair, Stefan Berlik, Udo Kelter:
Enforcing Privacy by Means of an Ontology Driven XACML Framework.
279-284
Electronic Edition (link) BibTeX
- Waleed A. Alrodhan, Chris J. Mitchell:
Addressing privacy issues in CardSpace.
285-291
Electronic Edition (link) BibTeX
- Xiangrong Xiao, Xingming Sun, Minggang Chen:
Second-LSB-Dependent Robust Watermarking for Relational Database.
292-300
Electronic Edition (link) BibTeX
Risk and Trust Management
Security Requirements and Policies
Agent and System Security
Workshop on Computational Forensics
- Katrin Franke, Sargur N. Srihari:
Computational Forensics: Towards Hybrid-Intelligent Crime Investigation.
383-386
Electronic Edition (link) BibTeX
- Danny Crookes, H. Su, Ahmed Bouridane, Mourad Gueham:
Shoeprint Image Retrieval Based on Local Image Features.
387-392
Electronic Edition (link) BibTeX
- Cor J. Veenman:
Statistical Disk Cluster Classification for File Carving.
393-398
Electronic Edition (link) BibTeX
- Richard Bache, Fabio Crestani, David Canter, Donna Youngs:
Application of Language Models to Suspect Prioritisation and Suspect Likelihood in Serial Crimes.
399-404
Electronic Edition (link) BibTeX
- Slobodan Petrovic, Katrin Franke:
Improving the Efficiency of Digital Forensic Search by Means of the Constrained Edit Distance.
405-410
Electronic Edition (link) BibTeX
- Daniel Ramos, Joaquin Gonzalez-Rodriguez, Grzegorz Zadora, Janina Zieba-Palus, Colin Aitken:
Information-theoretical comparison of likelihood ratio methods of forensic evidence evaluation.
411-416
Electronic Edition (link) BibTeX
- Vladimir Pervouchine, Graham Leedham:
Study of structural features of handwritten grapheme th for writer identification.
417-422
Electronic Edition (link) BibTeX
- Gang Fang, Sargur N. Srihari, Harish Srinivasan:
Generative Models for Fingerprint Individuality using Ridge Types.
423-428
Electronic Edition (link) BibTeX
- Lucia Ballerini, Oscar Cordón, Sergio Damas, Jose Santamaría, Inmaculada Aleman, Miguel Botella:
Craniofacial Superimposition in Forensic Identification using Genetic Algorithms.
429-434
Electronic Edition (link) BibTeX
- Donato Impedovo, Mario Refice:
The Influence of Frame Length on Speaker Identification Performance.
435-438
Electronic Edition (link) BibTeX
- Babak Mahdian, Stanislav Saic:
On Periodic Properties of Interpolation and Their Application To Image Authentication.
439-446
Electronic Edition (link) BibTeX
Workshop on Data Hiding for Information and Multimedia Security
- Junwei Huang, Xingming Sun, Huajun Huang, Gang Luo:
Detection of Hidden Information in Webpages Based on Randomness.
447-452
Electronic Edition (link) BibTeX
- Andrew D. Ker:
A Weighted Stego Image Detector for Sequential LSB Replacement.
453-456
Electronic Edition (link) BibTeX
- Geong Sen Poh, Keith M. Martin:
A Framework for Design and Analysis of Asymmetric Fingerprinting Protocols.
457-461
Electronic Edition (link) BibTeX
- Julien Lafaye:
An Analysis of Database Watermarking Security.
462-467
Electronic Edition (link) BibTeX
- M. Venkatesan, P. Meenakshi Devi, K. Duraiswamy, K. Thiagarajah:
A New Data Hiding Scheme with Quality Control for Binary Images Using Block Parity.
468-471
Electronic Edition (link) BibTeX
- Anirban Majumdar, Stephen Drape, Clark D. Thomborson:
Metrics-based Evaluation of Slicing Obfuscations.
472-477
Electronic Edition (link) BibTeX
- Yan Zhu, Chang-Tsun Li, Hong-Jia Zhao:
Structural Digital Signature and Semi-Fragile Fingerprinting for Image Authentication in Wavelet Domain.
478-483
Electronic Edition (link) BibTeX
- Kannan Karthik, Dimitrios Hatzinakos:
A novel anti-collusion coding scheme tailored to track linear collusions.
484-489
Electronic Edition (link) BibTeX
- Lingyun Xiang, Xingming Sun, Gang Luo, Can Gan:
Research on Steganalysis for Text Steganography Based on Font Format.
490-495
Electronic Edition (link) BibTeX
- Yue Li, Chang-Tsun Li, Chia-Hung Wei:
Protection of Mammograms Using Blind Steganography and Watermarking.
496-500
Electronic Edition (link) BibTeX
Copyright © Sat May 16 23:22:24 2009
by Michael Ley (ley@uni-trier.de)