default search action
2nd SIN 2009: Gazimagusa, North Cyprus
- Atilla Elçi, Oleg B. Makarevich, Mehmet A. Orgun, Alexander G. Chefranov, Josef Pieprzyk, Yuri Anatolievich Bryukhomitsky, Siddika Berna Örs:
Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009. ACM 2009, ISBN 978-1-60558-412-6
Keynote session 1
- Vijay Varadharajan:
Evolution and challenges in trust and security in information system infrastructures. 1-2
SA.1 SA: security assessment, policies, and educational programs
- Vladimir Mikhailovich Shishkin, Sergey Vitalievich Savkov:
The method of interval estimation in risk-analysis system. 3-7 - Jukka A. Koskinen, Tomi O. Kelo:
Pure e-learning course in information security. 8-13 - Mücahit Mutlugün, Oktay Adalier:
Turkish national electronic identity card. 14-18
Keynote session 2
- Elisa Bertino:
Assured information sharing: concepts and issues. 19-20
SA.2 SA: security assessment, policies, and educational programs
- Anand Singh, David J. Lilja:
Improving risk assessment methodology: a statistical design of experiments approach. 21-29 - Tomi O. Kelo, Jukka A. Koskinen:
Modeling network security competence for certification. 30-38
SA.3 SA: security assessment, policies, and educational programs
- Haider Abbas, Louise Yngström, Ahmed Hemani:
Adaptability infrastructure for bridging IT security evaluation and options theory. 39-45 - Simon Edward Parkin, Aad P. A. van Moorsel, Robert Coles:
An information security ontology incorporating human-behavioural implications. 46-55
SI.1 SI: security and integrity management and models
- Andrey P. Kurilo, Natalia G. Miloslavskaya, Svetlana Tolstaya:
Ensuring information security controls for the Russian banking organizations. 56-60 - Lie Liu, Chun Yuan:
Trace and revoke systems with short ciphertexts. 61-66 - Alexandr S. Basan, Lyudmila K. Babenko, Oleg B. Makarevich:
A model of mandatory access for current database management systems. 67-70 - Serif Bahtiyar, Murat Cihan, Mehmet Ufuk Çaglayan:
An architectural approach for assessing system trust based on security policy specifications and security mechanisms. 71-74
SI.2 SI: security and integrity management and models
- Xianghan Zheng, Vladimir A. Oleshchuk:
A secure architecture for P2PSIP-based communication systems. 75-82 - Çagdas Cirit, Feza Buzluca:
A UML profile for role-based access control. 83-92
SI.3 SI: security and integrity management and models
- Anna Kostina, Natalia G. Miloslavskaya, Alexander I. Tolstoy:
Information security incident management process. 93-97 - Samrat Mondal, Shamik Sural:
XML-based policy specification framework for spatiotemporal access control. 98-103
Keynote session 3
- Erdal Cayirci:
Deployed sensor networks and their security challenges in practice. 104
CS.1 CS: cryptography, security, and networks
- Sari Haj Hussein:
The hush cryptosystem. 105-110 - Sumi M., Ebrahim A. Soujeri, Rahim Rajan, Harikrishnan A. I.:
Design of a zigbee-based RFID network for industry applications. 111-116 - Mahdi Dashtbozorgi, Mohammad Abdollahi Azgomi:
A scalable multi-core aware software architecture for high-performance network monitoring. 117-122
CS.2 CS: cryptography, security, and networks
- Feodor Kulishov:
DFA-based and SIMD NFA-based regular expression matching on cell BE for fast network traffic filtering. 123-127 - Christian Schridde, Matthew Smith, Bernd Freisleben:
TrueIP: prevention of IP spoofing attacks using identity-based cryptography. 128-137
Keynote session 4
- Sorin Alexander Huss:
Embedded systems for IT security applications: properties and design considerations. 138-142
CS.3 CS: cryptography, security, and networks
- Kazim Yumbul, Erkay Savas:
Efficient, secure, and isolated execution of cryptographic algorithms on a cryptographic unit. 143-151 - Sazia Parvin, Shohrab Ali, Song Han, Tharam S. Dillon:
Security against DOS attack in mobile IP communication. 152-157
CS.4 CS: cryptography, security, and networks
- Somanath Tripathy:
Effective pair-wise key establishment scheme for wireless sensor networks. 158-163 - Ahmed Y. Mahmoud, Alexander G. Chefranov:
Hill cipher modification based on eigenvalues HCM-EE. 164-167 - Naveen Kumar, Shrikant Ojha, Kritika Jain, Sangeeta Lal:
BEAN: a lightweight stream cipher. 168-171 - Erdal Cayirci, Son Thanh Nguyen, Chunming Rong:
Secure many to many routing for wireless sensor and actuator networks. 172-178
SA.1 AI: attacks and intrusion detection
- Gökhan Dalkiliç, Devrim Sipahi, Mehmet Hilal Özcanhan:
A simple yet effective spam blocking method. 179-185 - Khaled Salah, Karim Sattar, Zubair A. Baig, Mohammed H. Sqalli, Prasad Calyam:
Resiliency of open-source firewalls against remote discovery of last-matching rules. 186-192
SA.2 AI: attacks and intrusion detection
- R. Suriya, K. Saravanan, Arunkumar Thangavelu:
An integrated approach to detect phishing mail attacks: a case study. 193-199 - Jayashree Padmanabhan, K. S. Easwarakumar, Gokul B., Harishankar S.:
Trust based traffic monitoring approach for preventing denial of service attacks. 200-206
SA.3 AI: attacks and intrusion detection
- Vadim D. Kotov, Vladimir I. Vasilyev:
Artificial immune system based intrusion detection system. 207-212 - Sanjay Rawat, Ashutosh Saxena:
Danger theory based SYN flood attack detection in autonomic network. 213-218
SA.4 AI: attacks and intrusion detection
- Kuldeep Singh, Audun Jøsang, Md. Sadek Ferdous, Ravishankar Borgaonkar:
Spam filter optimality based on signal detection theory. 219-224 - Vinod P. Nair, Vijay Laxmi, Manoj Singh Gaur, G. V. S. S. Phani Kumar, Yadvendra S. Chundawat:
Static CFG analyzer for metamorphic Malware code. 225-228 - Iftikhar Ahmad, Azween B. Abdullah, Abdullah Sharaf Alghamdi:
Application of artificial neural network in detection of DOS attacks. 229-234
AC.1 AC: access control and security assurance
- Vladimir Kotenko, Alexey Evseev, Stas Kotenko, Konstantin E. Rumyantsev:
New approach to evaluate the effectiveness of the audio information protection for determining the identity of virtual speech images. 235-239 - Dmitry Rublev, Vladimir Fedorov, Oleg B. Makarevich, Anatolij Chumachenko:
Digital sound card identification based on recording path imperfections. 240-243 - Atilla Elçi, Behnam Rahnama:
AWGN based seed for random noise generator in ParseKey+. 244-248
AC.2 AC: access control and security assurance
- Kemal Bicakci:
Pushing the limits of one-time signatures. 249-257 - Moussa Amir Ehsan, Morteza Amini, Rasool Jalili:
A semantic-based access control mechanism using semantic technologies. 258-267
AC.3 AC: access control and security assurance
- Jorge L. Hernandez-Ardieta, Ana Isabel González-Tablas Ferreres, Benjamín Ramos, Arturo Ribagorda:
Extended electronic signature policies. 268-277 - Francesco Buccafurri, Gianluca Caminiti, Gianluca Lax:
Fortifying the dalì attack on digital signature. 278-287
AC.4 AC: access control and security assurance
- Ashutosh Saxena:
An efficient and secure protocol for DTV broadcasts. 288-292 - Riccardo Bresciani, Andrew Butterfield:
Weakening the Dolev-Yao model through probability. 293-297 - Vijay Laxmi, Mudassar N. Khan, Sarath S. Kumar, Manoj Singh Gaur:
Buyer seller watermarking protocol for digital rights management. 298-301
Technopark reception
- Oleg B. Makarevich, Lyudmila K. Babenko:
Research and Education Activities of the Department of Security of Information Technologies of Taganrog Institute of Technology of the Southern Federal University in the Field of Information Security. 302-303
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.