Hamid R. Arabnia, Selim Aissi (Eds.):
Proceedings of the 2008 International Conference on Security & Management, SAM 2008, Las Vegas, Nevada, USA, July 14-17, 2008.
CSREA Press 2008, ISBN 1-60132-085-X BibTeX
Cryptography
Authentication
- Qikan Fang, Nandita Bhattacharjee:
Incremental Fingerprint Recognition Model for Distributed Authentication.
41-47 BibTeX
- Hyungkyu Lee, Jongwook Han, Kyoil Chung:
How to Integrate Diverse Client Authentication Protocol with various authentication means.
48-52 BibTeX
- Ben Salah Abderrazak:
Realization of Customer Authentication by SMS and a New Way to Pay in e-Commerce.
53-57 BibTeX
- Masanori Nakakuni, Hiroshi Dozono, Eisuke Ito, Yoshiaki Kasahara:
A Method of Automatic User Authentication by Fulltime Monitoring of Keystroke Timings.
58-63 BibTeX
- Senthilkumar Chinnappa Gounder Periaswamy, Dale Thompson, Jia Di:
Ownership Transfer of RFID Tags based on Electronic Fingerprint.
64-67 BibTeX
- S. Giftson Selladurai, S. Aathi Lingam, J. Anish Jeo Blysis, Sylvia Lilly Jebarani:
E-mail Security and Authentication Using Captcha and DSA.
68-74 BibTeX
- Jiafen Liu, Mingtian Zhou:
General Authentication Test.
75-80 BibTeX
- Sarabjeet Singh Bedi, Harpreet Singh Sobti, Rabia Bano, Shekhar Verma:
Digital Watermarking Technique for Ownership Claim using Buyer Signature.
81-86 BibTeX
- Ming-Jheng Li, Justie Su-tzu Juan:
Efficient Biometrics Remote User Authentication Scheme.
87-90 BibTeX
Privacy and Passwords + Intrusion Detection and Firewalls
- Xianping Wu, Huy Hoang Ngo, Phu Dung Le, Balasubramaniam Srinivasan:
A Novel Group Key Management Scheme for Privacy Protection Sensitive Information Systems.
93-99 BibTeX
- Chung S. Rhee, Shi Mei Jin Jin, Yong Zhen Li Li:
An Authorization Scheme Using partial ID for Privacy protection in RFID.
100-105 BibTeX
- Geoff Skinner:
Making A CASE for PACE: Components of the Combined Authentication Scheme Encapsulation for a Privacy Augmented Collaborative Environment.
106-112 BibTeX
- Mark Bedworth:
A Theory of Probabilistic One-Time Passwords.
113-118 BibTeX
- Bogdan Hoanca, Kenrick J. Mock:
Password Entry Scheme Resistant to Eavesdropping.
119-125 BibTeX
- Shashank Kaushik, Thomas Way:
Design of an Automatic Password Protection Mechanism for Digital Documents.
126-132 BibTeX
- Mark Bedworth, Colin Allison:
Visual Applications of Probabilistic One-Time Passwords for Personal Authentication.
133-138 BibTeX
- M. N. Doja, Naveen Kumar:
Virtual Password: Virtual Environment Based User Authentication.
139-144 BibTeX
- Colin Allison, Mark Bedworth:
Experiments with a Visual Probabilistic One-Time Password Authentication System.
145-148 BibTeX
- Boutheina A. Fessi, Mohamed Hamdi, Salah Benabdallah, Noureddine Boudriga:
Automated Intrusion Response System: Surveys and Analysis.
149-155 BibTeX
- Olalekan Adeyinka:
IPSec Mechanism for Implementing VPN.
156-160 BibTeX
- Seon Hwan Kim, Jang Su Park, Byoungchul Ahn:
Remote IP Addresses Based Intrusion Detection.
161-164 BibTeX
- Jong-Hyuk Roh, Seung-Hun Jin:
Website Registration Using Link for Privacy.
165-167 BibTeX
Information Security
- Wayne Jansen, Aurélien Delaitre:
Forensic Protocol Filtering of Phone Managers.
171-177 BibTeX
- Heinz Lothar Grob, Gereon Strauch, Christian Buddendick:
Conceptual Modeling of Information Systems for Integrated IT-Risk and Security Management.
178-184 BibTeX
- Jeong Ryou:
A Security Design for Information Sharing between Control System and Information System.
185-189 BibTeX
- Ilze Murane:
Raising Awareness in Information Security: Everyone Should Participate.
190-195 BibTeX
- Karthik Channakeshava, Kaigui Bian, Michael S. Hsiao, Jung Min Park, Robert E. Crossler, France Belanger, Payal Aggarwal, Janine Hiller:
On Providing Automatic Parental Consent over Information Collection from Children.
196-202 BibTeX
- Benfano Soewito, Ning Weng:
Approximate Packet Pre-filtering to Accelerate Pattern Matching.
203-209 BibTeX
Access Control and Signatures
- Masakatsu Nishigaki, Yoichi Shibata:
Physical Access Control with Biometric Keys.
213-219 BibTeX
- Akira Yamada, Ayumu Kubota, Yutaka Miyake:
Service Independent Access Control Architecture for User Generated Content (UGC).
220-226 BibTeX
- Harsh Kumar Verma, Kamalpreet Kaur, Raman Kumar:
Comparison of Threshold Proxy Signature Schemes.
227-231 BibTeX
- Li Cao, Ye Ji, Lequan Min:
A Generalized Chaos Synchronization Based Digital Signature Scheme with Application.
232-237 BibTeX
- Hoda Jannati, Javad Mohajeri, Mahmoud Salmasizadeh:
New Proxy Signature, Proxy Blind Signature and Blind Proxy Signature Based on the Okamoto Signature.
238-242 BibTeX
Trust Models
Systems and Implementations
Applications
- Robert Erbacher, Adele Cutler, Pranab Banerjee, Jim Marshall:
A Multi-Layered Approach to Botnet Detection.
301-308 BibTeX
- Bahram Sadeghi Bigham, Sasha Chernin, Akram Madadi, Najme Madadi, Pedram Tavajoh:
Phishing Guard and Antivirus: A New Approach.
309-312 BibTeX
- Ahmad Ghafarian:
Web Spoofing.
313-317 BibTeX
- Robert Erbacher:
Steps for Improving Data Comprehension for Digital Security and Forensics.
318-326 BibTeX
- Xiaowen Zhang, Li Shu, Ke Tang:
Multi-Map Orbit Hopping Chaotic Cipher.
327-332 BibTeX
- Tobias Eggendorfer:
Combining the SMTP tar pit simulator with white listing.
333-339 BibTeX
- Katalin Emese Bite:
Security at the Terminal Building at Airports.
340-344 BibTeX
- Jun-woo Lee, Mi-kyung Han, Gil-heang Lee:
Considerations of the SLA management system.
345-349 BibTeX
- Christoph Busch, Alexander Nouak:
3D Face Recognition for Unattended Border Control.
350-356 BibTeX
- Scott Peterson, Ray Kresman:
A Client-Server Approach to Capture Web Browsing History.
357-362 BibTeX
- Abdulrahman Alarifi:
Managing Diversity in Networks.
363-373 BibTeX
- Vincent Zimmer:
System Isolation Beyond BIOS using the Unified Extensible Firmware Interface.
374-380 BibTeX
- Ching-Ching Lee, Kamalendu Biswas:
Distributed Authorization Cache.
381-386 BibTeX
- Md. Saifuddin Khalid, Md. Ruhul Amin:
Detection of Malicious User in Oracle 10g DBMS and Cost of Elimination.
387-390 BibTeX
- Xiaowen Zhang:
The Multi-Map Orbit Hopping Mechanism.
391-394 BibTeX
Emerging Technologies and Applications
- Yvonne Yao, Huiping Guo, Chengyu Sun:
An Improved Indexing Scheme for Range Queries.
397-403 BibTeX
- A. S. Abdul-Ahad, Baran Çürüklü, Waleed A. Mahmoud:
Robust Distance-Based Watermarking for Digital Image.
404-409 BibTeX
- Keonwoo Kim, Dowon Hong, Jae-Cheol Ryu:
Forensic Data Acquisition from Cell Phones using JTAG Interface.
410-414 BibTeX
- Xidong Wang, Charlie Gladden, Huirong Fu:
Secure Inter-Vehicle Vital Signal Communication via Short Dynamic Group Management.
415-421 BibTeX
- Manuel Sánchez, Óscar Cánovas Reverte, Gabriel López:
Support for multiple federation technologies in a Single Sign On architecture.
422-427 BibTeX
- Phillip Bradford, Daniel Ray:
Requirements for Digital Forensics Investigation Domain-Specific Languages.
428-434 BibTeX
Algorithms and Protocols
Special Track on Applied Cryptology and Network Security
- Billy Bob Brumley:
Implementing Cryptography for Packet Level Authentication.
475-480 BibTeX
- Sunghyuck Hong, Junghoon An:
Secure Authentication in Virtual Community by Using Media Access Control address (MAC).
481-485 BibTeX
- Maryam Rajabzadeh Asaar, Javad Mohajeri, Mahmoud Salmasizadeh:
Security Modification for the Hwang-Wen-Hwang's E-voting Scheme.
486-490 BibTeX
- Emre Celebi, Mesut Gozutok, Levent Ertaul:
Implementations of Montgomery Multiplication Algorithms in Machine Languages.
491-497 BibTeX
- Levent Ertaul, Johan H. Yang:
Implementation of Domingo Ferrer's a New Privacy Homomorphism (DF a New PH) in Securing Wireless Sensor Networks (WSN).
498-504 BibTeX
- Kevin Daimi, Ya-Chin Hsu, Yu-Ping Lin, Lingyun Zheng:
A Cryptographic Protocol for E-Voting Systems.
505-513 BibTeX
- Esen Akkemik, Orhun Kara:
Real Time Cryptanalysis of Unsystematic Cipher.
514-520 BibTeX
Developing Information Security Applications for Adversarial Environments
Identity Theft Prevention - Privacy Preserving Protection of Digital Identity
Late Papers
- Yuhong Dong, Bing Wu:
Web Intrusion Detection Using a Graph-based Sequence Learning Algorithm.
565-570 BibTeX
- Rabia Jafri, Hamid R. Arabnia, Kathy J. Simpson:
An Integrated Face-Gait System for Automatic Recognition of Humans.
571-581 BibTeX
- Rahat Qureshi, Min Chang, Hesiri Weerasinghe, Huirong Fu:
Intrusion Detection System for Wireless Sensor Networks.
582-585 BibTeX
- Andrzej Bialas:
Ontology-based Approach to the Common Criteria Compliant IT Security Development.
586-592 BibTeX
- Andrew Woodward, Peter Hannay:
Forensic Implications of Using the Firewire Memory Exploit with Microsoft Windows XP.
593-597 BibTeX
- Patricia A. H. Williams:
Is There an Ideal Forensic Process?.
598-603 BibTeX
- Craig Valli, Andy Jones:
A Study into the Forensic Recoverability of Data from 2nd Hand Blackberry Devices: World-Class Security, Foiled by Humans.
604-607 BibTeX
- Andrew Woodward:
What Artifacts do Current BitTorrent Clients Leave Behind?.
608-613 BibTeX
- Justin Brown, Greg Baatard:
Integrating Forensics Capabilities into Web Applications: Teaching Students the Why and How.
614-619 BibTeX
- Peter Hannay, Andrew Woodward:
Cold Boot Memory Acquisition: An Investigation into Memory Freezing and Data Retention Claims.
620-622 BibTeX
- Eltayeb S. Abuelyaman, Abdul-Aziz S. Alsehibani:
A Comparison Between Residues of Prime Numbers and Arithmetic Modulo Powers of Two for S-Box Implementation.
623-630 BibTeX
- Ngoc-Bao Tran, Dinh-Thuc Nguyen:
Matrix Cipher and Its Application in Computer Security.
631-637 BibTeX
- Parman Sukarno, Nandita Bhattacharjee:
Authentication Architecture Based on Crypto-Biometric Systems.
638-644 BibTeX
- Sofien Beji, Nabil El-Kadhi:
Towards a Mobile Applications Security Approach.
645-654 BibTeX
- Maria Jesús Poza, Luis A. Puente, Belen Ruiz, Juan Miguel Gómez:
Identity Authentication Services.
655-659 BibTeX
- Maria Jesús Poza, Luis A. Puente, Diego Carrero, Juan Miguel Gómez:
A Knowledge-Based Distributed Biometric Authentication Entity Mechanism.
660-662 BibTeX
- Charlie Obimbo:
An Adaptive Coding Algorithm for Secret Transmission of Information.
663-668 BibTeX
- Misbahuddin Mohammed, P. Premchand, A. Govardhan:
An Image-Based Website User Authentication Mechanism Using Smart Card.
669-674 BibTeX
- Pedro Ashidani, Jamil Barbar, Luis Faina, Ítalo S. Cunha:
Framework Proposal for Sender's Authentication.
675-679 BibTeX
Copyright © Sat May 16 23:04:20 2009
by Michael Ley (ley@uni-trier.de)