default search action
IAS 2007: Manchester, UK
- Ning Zhang, Ajith Abraham:
Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007, August 29-31, 2007, Manchester, United Kingdom. IEEE Computer Society 2007, ISBN 978-0-7695-2876-2
E-Commerce Security
- Li-Sha He, Ning Zhang, Li-Rong He, Ian Rogers:
Secure M-commerce Transactions: A Third Party Based Signature Protocol. 3-8 - Satish Devane, Madhumita Chatterjee, Deepak B. Phatak:
Secure E-Commerce Protocol for Purchase of e-Goods - Using Smart Card. 9-14 - Hao Wang, Yuyi Ou, Jie Ling, Lu Liang, Xiang Xu:
Certified Email Delivery with Offline TTP. 15-20 - Ibrahim Mostafa Ibrahim, Sherif Hazem Nour El-Din, Abdel Fatah A. Hegazy:
An Effective and Secure Buyer-Seller Watermarking Protocol. 21-28
Network Security
- Mohamad Aljnidi, Jean Leneutre:
Towards an Autonomic Security System for Mobile Ad Hoc Networks. 29-32 - Pierre E. Abi-Char, Abdallah Mhamed, Bachar El-Hassan:
A Secure Authenticated Key Agreement Protocol For Wireless Security. 33-38 - Sigurd Eskeland, Vladimir A. Oleshchuk:
Hierarchical Multi-Party Key Agreement for Wireless Networks. 39-43 - Kashif Kifayat, Madjid Merabti, Qi Shi, David Llewellyn-Jones:
Applying Secure Data Aggregation techniques for a Structure and Density Independent Group Based Key Management Protocol. 44-49 - Su Mon Bo, Hannan Xiao, Aderemi Adereti, James A. Malcolm, Bruce Christianson:
A Performance Comparison of Wireless Ad Hoc Network Routing Protocols under Security Attack. 50-55 - Tarag Fahad, Djamel Djenouri, Robert Askwith:
On Detecting Packets Droppers in MANET: A Novel Low Cost Approach. 56-64
Cryptographic Schemes and Applications
- Ashutosh Saxena:
Threshold SKI Protocol for ID-based Cryptosystems. 65-70 - Thian Song Ong, Andrew Beng Jin Teoh:
Fuzzy Key Extraction from Fingerprint Biometrics based on Dynamic Quantization Mechanism. 71-76 - Dimitrios Hristu-Varsakelis, Konstantinos Chalkias, George Stephanides:
Low-cost Anonymous Timed-Release Encryption. 77-82 - Evangelos Papoutsis, Gareth Howells, Andrew B. T. Hopkins, Klaus D. McDonald-Maier:
Integrating Multi-Modal Circuit Features within an Efficient Encryption System. 83-88 - Pierre E. Abi-Char, Abdallah Mhamed, Bachar El-Hassan:
A Secure Authenticated Key Agreement Protocol Based on Elliptic Curve Cryptography. 89-94 - Sandro Bartolini, Cinzia Castagnini, Enrico Martinelli:
Inclusion of a Montgomery Multiplier Unit into an Embedded Processor's Datapath to Speed-up Elliptic Curve Cryptography. 95-100 - Sandipan Dey, Ajith Abraham, Sugata Sanyal:
An LSB Data Hiding Technique Using Prime Numbers. 101-108
Authentication and Access Control
- Irfan Ahmed, Usman Tariq, Shoaib Mukhtar, Kyung-suk Lhee, S. W. Yoo, Piao Yanji, Manpyo Hong:
Binding Update Authentication Scheme for Mobile IPv6. 109-114 - M. M. Chowdhury:
An Authentication Scheme Using Non-Commutative Semigroups. 115-118 - Wei Zhou, Christoph Meinel:
Function-Based Authorization Constraints Specification and Enforcement. 119-124 - Hassan Takabi, Morteza Amini, Rasool Jalili:
Separation of Duty in Role-Based Access Control Model through Fuzzy Relations. 125-130 - Hassan Takabi, Morteza Amini, Rasool Jalili:
Enhancing Role-Based Access Control Model through Fuzzy Relations. 131-136 - Bo-Chao Cheng, Huan Chen, Ryh-Yuh Tseng:
A Theoretical Security Model for Access Control and Security Assurance. 137-142 - Naikuo Yang, Howard Barringer, Ning Zhang:
A Purpose-Based Access Control Model. 143-148 - Yue Zhang, James B. D. Joshi:
SARBAC07: A Scoped Administration Model for RBAC with Hybrid Hierarchy. 149-154 - Aleksandra Nenadic, Ning Zhang, Li Yao, Terry Morrow:
Levels of Authentication Assurance: an Investigation. 155-160
Intrusion Prevention
- Virginia N. L. Franqueira, Raul H. C. Lopes:
Vulnerability Assessment by Learning Attack Specifications in Graphs. 161-164 - Alexey Smirnov, Tzi-cker Chiueh:
Automatic Patch Generation for Buffer Overflow Attacks. 165-170 - Muhammad Sher, Thomas Magedanz:
Protecting IP Multimedia Subsystem (IMS) Service Delivery Platform from Time Independent Attacks. 171-176 - Do-Hoon Kim, Taek Lee, Sung-Oh David Jung, Hoh Peter In, Heejo Lee:
Cyber Threat Trend Analysis Model Using HMM. 177-182 - Kjetil Haslum, Ajith Abraham, Svein J. Knapskog:
DIPS: A Framework for Distributed Intrusion Prediction and Prevention Using Hidden Markov Models and Online Fuzzy Risk Assessment. 183-190
Intrusion Detection
- Anjali Sardana, Krishan Kumar, Ramesh Chandra Joshi:
Detection and Honeypot Based Redirection to Counter DDoS Attacks in ISP Domain. 191-196 - Neil Cooke, Lee Gillam, Ahmet M. Kondoz:
IP protection: Detecting Email based breaches of confidence. 197-202 - Arnur G. Tokhtabayev, Victor A. Skormin:
Non-Stationary Markov Models and Anomaly Propagation Analysis in IDS. 203-208 - Fabrizio Baiardi, Daniele Sgandurra:
Building Trustworthy Intrusion Detection through VM Introspection. 209-214 - Pravin Shinde, Srinivas Guntupalli:
Early DoS Attack Detection using Smoothened Time-Series andWavelet Analysis. 215-220 - Simon Fong, Zhuang Yan:
A Security Model for Detecting Suspicious Patterns in Physical Environment. 221-226 - Eric Medvet, Cyril De Fillon, Alberto Bartoli:
Detection of Web Defacements by means of Genetic Programming. 227-234
Security Analysis
- Zhenrong Yang, Aiman Hanna, Mourad Debbabi:
Team Edit Automata for Testing Security Property. 235-240 - Patroklos G. Argyroudis, Robert McAdoo, Stephen Toner, Linda Doyle, Donal O'Mahony:
Analysing the Security Threats against Network Convergence Architectures. 241-246 - Fabio Massacci, Artsiom Yautsiukhin:
Modelling Quality of Protection in Outsourced Business Processes. 247-252 - Mohamed Mostafa Saleh, Mourad Debbabi:
Modeling Security Protocols as Games. 253-260
Data Security and Privacy
- Diego Scardaci, Giordano Scuderi:
A Secure Storage Service for the gLite Middleware. 261-266 - Dan Feng, Lanxiang Chen, Lingfang Zeng, Zhongying Niu:
FPGA/ASIC based Cryptographic Object Store System. 267-272 - Waseem Ahmad, Ashfaq A. Khokhar:
An Architecture for Privacy Preserving Collaborative Filtering on Web Portals. 273-278 - Dhiah el Diehn I. Abou-Tair, Stefan Berlik, Udo Kelter:
Enforcing Privacy by Means of an Ontology Driven XACML Framework. 279-284 - Waleed A. Alrodhan, Chris J. Mitchell:
Addressing privacy issues in CardSpace. 285-291 - Xiangrong Xiao, Xingming Sun, Minggang Chen:
Second-LSB-Dependent Robust Watermarking for Relational Database. 292-300
Risk and Trust Management
- Daniel Gideon Dresner, J. Robert (Bob) G. Wood:
Operational risk: acceptability criteria. 301-306 - Srinivasan T., Varun Ramachandran, Arun Vedachalam, S. K. Ghosh:
HPRS: A Hybrid P2P Reputation System using File and Peer Rating. 307-312 - Diala Abi Haidar, Nora Cuppens-Boulahia, Frédéric Cuppens, Hervé Debar:
Resource Classification Based Negotiation in Web Services. 313-318 - Elvis Papalilo, Bernd Freisleben:
Managing Behaviour Trust in Grids Using Statistical Methods of Quality Assurance. 319-324 - Reiko Ann Miura-Ko, Nicholas Bambos:
Dynamic Risk Mitigation in Computing Infrastructures. 325-328 - Wim Mees:
Risk management in coalition networks. 329-336
Security Requirements and Policies
- Johs Hansen Hammer, Gerardo Schneider:
On the Definition and Policies of Confidentiality. 337-342 - Pravin Shinde, Priyanka Sharma, Srinivas Guntupalli:
Enhanced Availability and Security by Rate Control Using Extended Policy Framework in SELinux. 343-348 - Jose Romero-Mariona, Hadar Ziv, Debra J. Richardson:
CCARCH: Architecting Common Criteria Security Requirements. 349-356
Agent and System Security
- Martijn Warnier, Frances M. T. Brazier:
Organized Anonymous Agents. 357-362 - Michail Fragkakis, Nikos Alexandris:
Comparing the Trust and Security Models of Mobile Agents. 363-368 - Bobby D. Birrer, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Robert W. Bennington:
Program Fragmentation as a Metamorphic Software Protection. 369-374 - Wei Li, Lap-Chung Lam, Tzi-cker Chiueh:
Accurate Application-Specific Sandboxing for Win32/Intel Binaries. 375-382
Workshop on Computational Forensics
- Katrin Franke, Sargur N. Srihari:
Computational Forensics: Towards Hybrid-Intelligent Crime Investigation. 383-386 - Danny Crookes, Hongjiang Su, Ahmed Bouridane, Mourad Gueham:
Shoeprint Image Retrieval Based on Local Image Features. 387-392 - Cor J. Veenman:
Statistical Disk Cluster Classification for File Carving. 393-398 - Richard Bache, Fabio Crestani, David Canter, Donna Youngs:
Application of Language Models to Suspect Prioritisation and Suspect Likelihood in Serial Crimes. 399-404 - Slobodan Petrovic, Katrin Franke:
Improving the Efficiency of Digital Forensic Search by Means of the Constrained Edit Distance. 405-410 - Daniel Ramos, Joaquin Gonzalez-Rodriguez, Grzegorz Zadora, Janina Zieba-Palus, Colin Aitken:
Information-theoretical comparison of likelihood ratio methods of forensic evidence evaluation. 411-416 - Vladimir Pervouchine, Graham Leedham:
Study of structural features of handwritten grapheme 'th' for writer identification. 417-422 - Gang Fang, Sargur N. Srihari, Harish Srinivasan:
Generative Models for Fingerprint Individuality using Ridge Types. 423-428 - Lucia Ballerini, Oscar Cordón, Sergio Damas, José Santamaría, Inmaculada Alemán, Miguel Botella:
Craniofacial Superimposition in Forensic Identification using Genetic Algorithms. 429-434 - Donato Impedovo, Mario Refice:
The Influence of Frame Length on Speaker Identification Performance. 435-438 - Babak Mahdian, Stanislav Saic:
On Periodic Properties of Interpolation and Their Application To Image Authentication. 439-446
Workshop on Data Hiding for Information and Multimedia Security
- Junwei Huang, Xingming Sun, Huajun Huang, Gang Luo:
Detection of Hidden Information in Webpages Based on Randomness. 447-452 - Andrew D. Ker:
A Weighted Stego Image Detector for Sequential LSB Replacement. 453-456 - Geong Sen Poh, Keith M. Martin:
A Framework for Design and Analysis of Asymmetric Fingerprinting Protocols. 457-461 - Julien Lafaye:
An Analysis of Database Watermarking Security. 462-467 - M. Venkatesan, P. Meenakshi Devi, K. Duraiswamy, K. Thiagarajah:
A New Data Hiding Scheme with Quality Control for Binary Images Using Block Parity. 468-471 - Anirban Majumdar, Stephen Drape, Clark D. Thomborson:
Metrics-based Evaluation of Slicing Obfuscations. 472-477 - Yan Zhu, Chang-Tsun Li, Hong-Jia Zhao:
Structural Digital Signature and Semi-Fragile Fingerprinting for Image Authentication in Wavelet Domain. 478-483 - Kannan Karthik, Dimitrios Hatzinakos:
A novel anti-collusion coding scheme tailored to track linear collusions. 484-489 - Lingyun Xiang, Xingming Sun, Gang Luo, Can Gan:
Research on Steganalysis for Text Steganography Based on Font Format. 490-495 - Yue Li, Chang-Tsun Li, Chia-Hung Wei:
Protection of Mammograms Using Blind Steganography and Watermarking. 496-500
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.