Selim Aissi, Hamid R. Arabnia (Eds.):
Proceedings of the 2007 International Conference on Security & Management, SAM 2007, Las Vegas, Nevada, USA, June 25-28, 2007.
CSREA Press 2007, ISBN 1-60132-048-5 BibTeX
Intrusion Detection
- Maitreya Natu, Adarshpal S. Sethi:
Intrusion Detection System to Detect Wormhole Using Fault Localization Techniques.
3-9 BibTeX
- Hong Nguyen, Ravi Palaniappan, Nevin Aydin, Shiyuan Jin, Damla Turgut:
Intrusion Detection in Wireless Sensor Networks.
10-16 BibTeX
- Wei Wang, Sylvain Gombault:
Distance Measures for Anomaly Intrusion Detection.
17-23 BibTeX
- Jun Lu, Chong-Jun Wang, Jun Wang, Shifu Chen:
An Intrusion Detection Model Based on Intention Modeling.
24-29 BibTeX
- Réginalds Lips, Nabil El-Kadhi:
Intelligent Mobile Agent for Intrusion Detection System.
30-38 BibTeX
Biometric,
Authentication,
Steganography
- Slobodan Dokic, Andrea Kulesh, Megha Dombal, Huirong Fu:
An Overview of Multi-modal Biometrics for Authentication.
39-44 BibTeX
- Yoichi Shibata, Masahiro Mimura, Kenta Takahashi, Masakatsu Nishigaki:
A study on biometric key generation from fingerprints: Fingerprint-key generation from stable feature value.
45-51 BibTeX
- Guillermo Martínez-Silva, Francisco Rodríguez-Henríquez, Nareli Cruz Cortés, Levent Ertaul:
On the Generation of X.509v3 Certificates with Biometric Information.
52-57 BibTeX
- Takumi Yamamoto, Atsushi Harada, Takeo Isarida, Masakatsu Nishigaki:
Improvement of User Authentication Using Schema of Visual Memory: Guidance by Verbal Cue.
58-64 BibTeX
- Ashutosh Saxena, Shailaja Gummadidala, Phani Kumar Kancharla:
An Efficient Authentication Protocol for GSM.
65-69 BibTeX
- Atluri Kavitha, Dhavala Lalitha Bhaskari, Peri S. Avadhani:
Combinatorial Approach For Authentication Based on Face Recognition.
70-75 BibTeX
- J. Octavio Gutiérrez-García, Félix F. Ramos Corchado, Herwig Unger:
User Authentication via Mouse Biometrics and the usage of Graphic User Interfaces: An Application Approach.
76-82 BibTeX
- Kannan Karthik, Dimitrios Hatzinakos:
A Unified Approach To Construct Non-perfect Secret Sharing And Traitor Tracing Schemes.
83-89 BibTeX
- Nu-El Choi, Eun-Jun Yoon, Hyun-Jin Park, Kee-Young Yoo:
Visual Multi-Secret Sharing Scheme with Cheater Identification.
90-96 BibTeX
- Behnam Rahnama, Atilla Elçi:
ParseKey+: A Five-Way Strong Authentication Procedure as an Approach to Client/Server Impersonation Avoidance using Steganography for Key Encryption.
97-106 BibTeX
- Hayk Ghazaryan:
Steganographic File System Development Based On The Information Hiding Scheme By Permutation Of Sequence Elements.
107-111 BibTeX
- Jujia Wang, Yoichi Muraoka:
Proposal on Automatic Authentication of Cellular Phones by Using Force Sensor.
112-117 BibTeX
- Hyun-Jin Park, Eun-Jun Yoon, Kee-Young Yoo:
A New Steganography Scheme using a Frame.
118-122 BibTeX
- Paul Seymer, George Dimitoglou:
Performance Optimization of Close-Color Pair Steganalysis.
123-130 BibTeX
Cryptography
Security and Privacy
- Mahjoub Langar, Mohamed Mejri, Kamel Adi:
A Formal Approach for Security Policy Enforcement in Concurrent Programs.
165-171 BibTeX
- Lizzie Coles-Kemp, Richard E. Overill:
Triangulating the Views of Human and Non-Human Stakeholders in Information System Security Risk Assessment.
172-178 BibTeX
- Wei Wang:
Security Based Heuristic SAX for XML Parsing.
179-185 BibTeX
- Jan vom Brocke, Heinz Lothar Grob, Gereon Strauch, Christian Buddendick:
Calculating the Return on Security Investments - An Approach Based on Principles of Capital Budgeting.
186-191 BibTeX
- Shoua Yang, Shanti Sukumaran, Dipali Yermalkar, Hesiri Weerasinghe, Huirong Fu:
Security and Privacy: Open Issues with RFID.
192-197 BibTeX
- Martin Schaffer, Peter Schartner, Stefan Rass:
Universally Unique Identifiers: How To Ensure Uniqueness While Protecting The Issuer's Privacy.
198-204 BibTeX
- Valli Kumari Vatsavayi, K. V. S. V. N. Raju:
Enhanced User Privacy on Trusted Processors.
205-210 BibTeX
- Adam Nowicki, Artur Rot, Leszek Ziora:
Implementation of Protections as the Element of Information System Security Management. Experiences of Polish Enterprises.
211-216 BibTeX
- Habtamu Bogale, Jigang Liu:
Secure Web Applications: A Systematic Approach.
217-222 BibTeX
- Andrzej Bialas:
Modeling the Security Objectives According to the Common Criteria Methodology.
223-229 BibTeX
- Li-Yen Hsu, Shin-Shin Kao:
Extending Security/Sustainability through Pervasive Spider Web Networks in Urbanism.
230-235 BibTeX
- Ki-Hyang Hong, Gang Shin Lee, Jae-il Lee, Ik-Sub Lee:
Advance Diagnosis of Information Security for the Mobile RFID Service.
236-241 BibTeX
- Jin-Sub Park, Young-Sun Shin, Jung-Jin Park, Sung-Gi Kang:
A Study of Estimate Risk Level Model Based on Security Maturity.
242-247 BibTeX
- Ben Salah Abderrazak:
More Security on Tunisian e-Commerce Payments by Using SMS for Customer's Authenticity With National Post Office.
248-254 BibTeX
- Sarah M. North, Max M. North:
A Brief Study of Students' Attitudes, Curiosity, Interest, and Perceptions of Information and National Security.
255-259 BibTeX
- Min Guo, Meng Cao:
A Key-Set Label Model for Protecting Information Security.
260-266 BibTeX
- Dongmin Choi, Yeojin Lee, Choongyong Cho, Okbin Lee, Yongkeun Bae, Ilyong Chung:
A Secure Key Distribution Scheme in Wireless Sensor Networks Using Dynamic Clustering Algorithms.
267-273 BibTeX
- Shima Izadpanahi, Muhammad Reza Fatemi:
Enhanced Multi-Level Security: Secure Sharing.
274-276 BibTeX
- Guoqing Tu, Pingxiang Li:
A Trusted Domain-based Approach for Authorization and Delegation on Mobile Distributed System.
277-281 BibTeX
- Marcin Szczodrak, Jinwoo Kim:
4G and Manet, Wireless Network of Future Battlefield.
282-290 BibTeX
Analysis and Evaluation
- Mohammed Ketel:
Economic Evaluation of IT Security.
291-297 BibTeX
- Gregory Vert, Phanid Dogiparthi:
A Generic Metric for Evaluation of Database Security.
298-305 BibTeX
- Eltayeb Abuelyaman, Mohammed El-Affendi:
Evaluation of the S-Box Construction Using Arithmetic Modulo Prime Numbers.
306-309 BibTeX
- Hareesh Khattri, Salvador Mandujano:
On the Security of 802.11 and 802.1X: Evaluating an Embedded Network Stack.
310-316 BibTeX
- Bo Chen, Baohua Zhao, Chao Lu:
Analysis of Probabilistic Information Flow Security Properties.
317-322 BibTeX
- Ronggong Song, Larry Korba, George Yee:
Analysis of Smart Card-Based Remote User Authentication Schemes.
323-329 BibTeX
- Qijun Gu:
Analysis of Software Vulnerability in Sensor Nodes.
330-336 BibTeX
- Hiroshi Dozono, Shinsuke Ito, Hisao Tokushima, Masanori Nakakuni:
The Analysis of Key Typing Sounds using Self Organizing Maps.
337-341 BibTeX
- Hesham Elzouka, Fatma Zada:
A Survey on Digital Watermarking Technologies.
342-349 BibTeX
- Luigi Alcuri, Pietro Cassarà:
A Study about DDoS Attacks in SIP Environments.
350-357 BibTeX
- EunJoung Byun, SungJin Choi, Chong-Sun Hwang, SangKeun Lee:
Survey on Reputation Management Systems in P2P Network.
358-366 BibTeX
Systems and Algorithms
- Bin Fu, Sai Aravalli, John Abraham:
Software Protection by Hardware and Obfuscation.
367-373 BibTeX
- Fatiha Benali, Véronique Legrand, Stéphane Ubéda:
An Ontology for the Management of Heteregenous Alerts of Information System.
374-380 BibTeX
- Manghui Tu, Dongfeng Wang, Peng Li, Nasser Tadayon:
Allocation of Partitioned Data by Using A Neural Network Based Approach.
381-387 BibTeX
- Tobias Eggendorfer:
Reducing Spam Using Network Management Techniques.
388-394 BibTeX
- Ihor Vasyltsov, Eduard Hambardzumyan:
Immunity to Passive Attacks on Generic RNG Model.
395-399 BibTeX
- Vincent Zimmer:
Platform Trust Beyond BIOS Using the Unified Extensible Firmware Interface.
400-405 BibTeX
- Nguyen Ngoc Diep, Sungyoung Lee, Young-Koo Lee, Heejo Lee:
Contextual Risk-Based Access Control.
406-412 BibTeX
- Ming-Jheng Li, Justie Su-tzu Juan:
A Practical English Auction Based on the Discrete Logarithms.
413-419 BibTeX
- Meixing Le, Jiajin Le:
Efficient Encrypted Storage Structure for Prevention of Information Leakage.
420-425 BibTeX
- Phillip G. Bradford, Daniel A. Ray:
Finding the Change-Point in a Binary Stream with Two Unknown, but Distant, Distributions.
426-431 BibTeX
- Se-Min Kim, Jun-Cheol Jeon, Byung-Heon Kang, Sang-Ho Shin, Kee-Young Yoo:
Non-linear and Non-group Cellular Automata for Cryptographic Applications.
432-438 BibTeX
Applied Cryptology and Network Security
Security of Supercomputing Clusters
Securing Medical Information
Late Papers
- Fernanda Mendes, Jamil Salem Barbar, Gustavo S. B. do Carmo:
The Use of Watermark for the Authentication of Digital Images Mapped Through the Use of the Wavelet Transform.
527-533 BibTeX
- Rabia Jafri, Hamid R. Arabnia:
PCA-Based Methods for Face Recognition.
534-541 BibTeX
- Richard A. Wasniowski:
Using Honeynets and Alerts Correlation for Intrusion Detection and Prevention.
542-545 BibTeX
- Kooshiar Azimian, Javad Mohajeri, Mahmoud Salmasizadeh:
A New Public Key Encryption Scheme Equivalent to Factoring.
546-552 BibTeX
- Amit Jain:
Enhancement of Information Hiding Using XML.
553-558 BibTeX
- Dan T. F. Chan, Siu-Ming Yiu, Lucas Chi Kwong Hui:
Remote Group User Authentication with Forward Secrecy and Key Agreement with Smartcard.
559-565 BibTeX
- Lifeng Guo, Guilin Wang, Duncan S. Wong, Lei Hu:
Further Discussions on the Security of a Nominative Signature Scheme.
566-572 BibTeX
- Haixin Wang, Yao Yue, Chunming Zhang, Guoqiang Bai, Hongyi Chen:
A Novel Unified Control Architecture for a High-Performance Network Security Accelerator.
573-579 BibTeX
- Dong GuiShan, Li Xin, Lu XianLiang:
A MLS Cooperation System Based on Virtual Machine Monitor.
580-584 BibTeX
- Chung-Han Chen, Hira N. Narang:
Education in Software Security.
585-590 BibTeX
- Brian J. d'Auriol, Tuyen Nguyen, Vo Quoc Hung, Duc Thang, Hassan Jameel, Le Xuan Hung, Syed Muhammad Khaliq-ur-rehman Raazi, Dao Phuong Thuy, Ngo Trong Canh, Adil Mehmood Khan, Sunghyun Kim, Shu Lei, Sakib Pathan, Tran Van Phuong, Sungyoung Lee, Young-Koo Lee:
Embedded Processor Security.
591- BibTeX
Copyright © Sat May 16 23:04:20 2009
by Michael Ley (ley@uni-trier.de)