


default search action
3. ISA 2009: Seoul, Korea
- Jong Hyuk Park, Hsiao-Hwa Chen, Mohammed Atiquzzaman, Changhoon Lee, Tai-Hoon Kim, Sang-Soo Yeo:

Advances in Information Security and Assurance, Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings. Lecture Notes in Computer Science 5576, Springer 2009, ISBN 978-3-642-02616-4
Cryptographic Algorithms
- Kitae Jeong, Joongeun Choi, Yuseop Lee, Changhoon Lee

, Jaechul Sung, Haeryong Park, Yeonjung Kang:
Update on SEED: SEED-192/256. 1-10 - Jesang Lee, Seokhie Hong, Jaechul Sung

, Haeryong Park:
A New Double-Block-Length Hash Function Using Feistel Structure. 11-20
Authentication and Identity Management
- Franck Cassez

:
The Dark Side of Timed Opacity. 21-30 - Yumin Yuan, Da Li, Liwen Tian, Haishan Zhu:

Certificateless Signature Scheme without Random Oracles. 31-40
Authorization and Access Control
- Vineela Muppavarapu, Soon Myoung Chung:

Fine-Grain Access Control Using Shibboleth for the Storage Resource Broker. 41-50 - Amril Syalim, Yoshiaki Hori, Kouichi Sakurai:

Grouping Provenance Information to Improve Efficiency of Access Control. 51-59 - Ronald Toegl:

Tagging the Turtle: Local Attestation for Kiosk Computing. 60-69 - Chao Huang, Jianling Sun, Xinyu Wang, Yuanjie Si:

Selective Regression Test for Access Control System Employing RBAC. 70-79 - Akihiro Sakai, Yoshiaki Hori, Kouichi Sakurai:

Formal Verification for Access Control in Web Information Sharing System. 80-89
Biometrics and Computer Forensics
- Rahib Hidayat Abiyev, Kemal Ihsan Kilic

:
Adaptive Iris Segmentation. 90-99 - Hamidreza Rashidy Kanan, Mohammad Shahram Moin

:
Recognizing Partially Occluded Faces from a Single Exemplar Image Per Person. 100-109 - Magdalena Szezynska, Ewa Huebner, Derek Bem, Chun Ruan:

Methodology and Tools of IS Audit and Computer Forensics - The Common Denominator. 110-121
Cryptographic Protocols
- Nadia El Mrabet:

What about Vulnerability to a Fault Attack of the Miller's Algorithm During an Identity Based Protocol?. 122-134 - Qingfeng Cheng, Chuangui Ma, Xuexian Hu

:
A New Strongly Secure Authenticated Key Exchange Protocol. 135-144 - Changan Zhao

, Dongqing Xie, Fangguo Zhang
, Chong-zhi Gao, Jingwei Zhang:
Improved Implementations of Cryptosystems Based on Tate Pairing. 145-151 - Zheng Huang, Weidong Qiu, Qiang Li, Kefei Chen:

Efficient Secure Multiparty Computation Protocol in Asynchronous Network. 152-158
Data Integrity and Privacy
- Mohammad-Reza Zare-Mirakabad, Aman Jantan

, Stéphane Bressan:
Clustering-Based Frequency l-Diversity Anonymization. 159-168 - Fangyong Hou, Nong Xiao, Yuhua Tang, Hongjun He, Fang Liu:

Protect Disk Integrity: Solid Security, Fine Performance and Fast Recovery. 169-178 - Benedikt Westermann, Andriy Panchenko, Lexi Pimenidis:

A Kademlia-Based Node Lookup System for Anonymization Networks. 179-189
Key Management and Recovery
- Abedelaziz Mohaisen, Nam-Su Jho, Dowon Hong

:
A Computationally-Efficient Construction for the Matrix-Based Key Distribution in Sensor Network. 190-199 - Weidong Qiu, Yaowei Zhou, Bo Zhu, Yanfei Zheng, Mi Wen, Zheng Gong:

Key-Insulated Encryption Based Key Pre-distribution Scheme for WSN. 200-209
Mobile and RFID Network Security
- Matthew Smith, Christian Schridde, Björn Agel, Bernd Freisleben

:
Securing Mobile Phone Calls with Identity-Based Cryptography. 210-222 - Abid Khan

, Qasim Arshad, Xiamu Niu, Yong Zhang, Muhammad Waqas Anwar:
On the Security Properties and Attacks against Mobile Agent Graph Head Sealing (MAGHS). 223-228
Firewall, IDS, Anti-virus, and Other Security Products
- Hongying Tang, Bo Zhu, Kui Ren

:
A New Approach to Malware Detection. 229-238 - Yongjin Kim:

ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION. 239-249 - Siraj A. Shaikh

, Howard Chivers, Philip Nobles, John A. Clark, Hao Chen:
A Deployment Value Model for Intrusion Detection Sensors. 250-259
Internet and Web Services Security
- Zahra Aghajani, Mohammad Abdollahi Azgomi

:
Security Evaluation of an Intrusion Tolerant Web Service Architecture Using Stochastic Activity Networks. 260-269 - Ieng-Fat Lam, Wei-Cheng Xiao, Szu-Chi Wang, Kuan-Ta Chen:

Counteracting Phishing Page Polymorphism: An Image Layout Analysis Approach. 270-279
Cyber-attack and Cyber-terrorism
- Georgios Kambourakis

, Constantinos Kolias, Stefanos Gritzalis
, Jong Hyuk Park:
Signaling-Oriented DoS Attacks in UMTS Networks. 280-289 - Tae Hwan Kim, Dong Seong Kim

, Sang Min Lee, Jong Sou Park:
Detecting DDoS Attacks Using Dispersible Traffic Matrix and Weighted Moving Average. 290-300 - Ming-Yang Su, Kai-Chi Chang, Chun-Yuen Lin:

Attack Patterns Discovery by Frequent Episodes Mining from Honeypot Systems. 301-306
Other Security Research
- Yanjun Wu, Tzi-cker Chiueh, Chen Zhao:

Efficient and Automatic Instrumentation for Packed Binaries. 307-316 - Hedieh Sajedi

, Mansour Jamzad:
Secure Cover Selection Steganography. 317-326 - Zhimin Chen, Syed Haider, Patrick Schaumont

:
Side-Channel Leakage in Masked Circuits Caused by Higher-Order Circuit Effects. 327-336 - Kihong Kim, Jinkeun Hong:

Performance Analysis of Digital Secure Voice Transmission over HF Radio Channel. 337-346 - Chu-Hsing Lin, Jung-Chun Liu, Mao-Hua Cheng, Tsung-Che Yang, Mei-Chun Chou:

Energy Analysis of Multimedia Video Streaming on Mobile Devices. 347-357 - Lingli Deng, Yeping He, Ziyao Xu:

Combating Index Poisoning in P2P File Sharing. 358-367 - Jongsung Kim, Raphael C.-W. Phan

:
A Cryptanalytic View of the NSA's Skipjack Block Cipher Design. 368-381 - Jinyang Shi, Kwok-Yan Lam:

MinuCode: A Fixed-Value Representation of Fingerprint Minutiae for Biometric Cryptosystem. 382-391 - Meng Ge, Kwok-Yan Lam

:
Self-initialized Distributed Certificate Authority for Mobile Ad Hoc Network. 392-401 - Jemal H. Abawajy:

Design and Delivery of Undergraduate IT Security Management Course. 402-411
MoWiN 2009
- Rohit Pathak, Satyadhar Joshi

:
Secure Multi-party Computation Using Virtual Parties for Computation on Encrypted Data. 412-421 - Edison Pignaton de Freitas

, Tales Heimfarth, Marco A. Wehrmeister
, Flávio Rech Wagner, Armando Morado Ferreira, Carlos Eduardo Pereira
, Tony Larsson:
Using a Link Metric to Improve Communication Mechanisms and Real-Time Properties in an Adaptive Middleware for Heterogeneous Sensor Networks. 422-431 - Ronald Beaubrun, Badji Molo:

Performance Evaluation of DSR in Multi-services Ad Hoc Networks. 432-437 - Kazuyuki Sakoda, Yuichi Morioka, Chihiro Fujita, Erica Tanimoto, Kenzoh Nishikawa, Mitsuhiro Suzuki:

Implementation and Evaluation of WiMedia MAC LSI. 438-449 - Nomica Imran

, Asad I. Khan
:
A Reliable and Efficient Pedal Back Data Disseminating Scheme for Ad-Hoc WSNs. 450-460 - So-Young Kang, Jin-Woo Song, Kwang-Jo Lee, Ju-Hee Lee, Ji-Hoon Kim, Sung-Bong Yang:

Improved Location Acquisition Algorithms for the Location-Based Alert Service. 461-470 - Kyunghwa Lee, Joohyun Lee, Bongduk Zhang, Jaeho Kim, Yongtae Shin:

An Enhanced Trust Center Based Authentication in ZigBee Networks. 471-484 - Takahide Yanaka, Toshihiko Sasama, Hiroshi Masuyama:

Sensor Disposition Problem in Wireless Ad-Hoc Sensor Networks. 485-493 - Kentaro Kishida, Toshihiko Sasama, Hiroshi Masuyama:

Performance Evaluation of Cost Effective Routing for Packet Transmissions in Mobile Ad Hoc Networks. 494-501 - Toshihiko Sasama, Yasuhiro Abe, Hiroshi Masuyama:

Energy Lesser Broadcasting Algorithms Using Adjustable Transmission Ranges in Mobile Ad Hoc Networks. 502-511 - Mei-Jhen Chen, Gwo-Jong Yu:

A Multi-Path Routing Supported Scheduling Algorithm for Multi-Channel Single-Transceiver Wireless Mesh Networks. 512-521 - Ebtisam Amar, Selma Boumerdassi

, Éric Renault:
Predictive Scheme for Location Service in Mobile Ad-Hoc Networks. 522-531 - Anh-Ngoc Le

, Dong-Won Kum, You Ze Cho:
An Efficient Hybrid Routing Approach for Hybrid Wireless Mesh Networks. 532-542 - Lily Shui-Lien Chen, Michael Chih-Hung Wang, Yung-Hsin Lee:

Relationship between Motivation and Satisfaction of Online Computer Games: Evidence from Adolescent Players Using Wireless Service in Taiwan. 543-552 - Chih-Chung Lai, Ren-Song Ko:

DISHES: A Distributed Shell System for Ubiquitous Computing. 553-562 - Hsin-Kun Lai, Chia-Chin Ma, Erl-Huei Lu:

Error Control Scheme of Hybrid ARQ Based on Majority Voting Bit by Bit. 563-569 - Yejun Zhou, Hui Li, Jianfeng Ma:

Secure Error-Correction Network Coding in a Randomized Setting. 570-577 - Beatrice Cynthia Dhinakaran, Dhinaharan Nagamalai, Jae-Kwang Lee:

Bayesian Approach Based Comment Spam Defending Tool. 578-587
NASSUE 2009
- Jianhong Zhang, Yixian Yang, Xinxin Niu, Shengnan Gao, Hua Chen, Qin Geng:

An Improved Secure Identity-Based On-Line/Off-Line Signature Scheme. 588-597 - Ghassan Ahmed Ali

, Aman Jantan
, Abdulghani Ali
:
Honeybee-Based Model to Detect Intrusion. 598-607 - Zenghui Liu, Yingxu Lai:

A Data Mining Framework for Building Intrusion Detection Models Based on IPv6. 608-618 - Sameh M. Shohdy, Ashraf El-Sisi, Nabil A. Ismail

:
FPGA Implementation of Elliptic Curve Point Multiplication over GF(2191). 619-634 - Bin Li:

A Forward-Secrecy WTLS Handshake Protocol Based on XTR. 635-643 - Mazleena Salleh

, Teoh Chin Yew:
Application of 2D Barcode in Hardcopy Document Verification System. 644-651 - Deven Shah, Ashish Mangal, Mayank Agarwal, Mahendra Mehra, Tushar Dave, Dhiren R. Patel:

Protecting Global SOA from DoS and Other Security Threats. 652-661 - ByungRae Cha, YoungIl Kim:

CRYPTEX Model for E-Commercial Contract of Software Source Code Using Secrete Sharing Scheme. 662-671 - Binod Vaidya, Jong Hyuk Park, Joel J. P. C. Rodrigues:

HOTP-Based User Authentication Scheme in Home Networks. 672-681
IAWSN 2009
- Firdous Kausar

, Ayesha Naureen:
A Comparative Analysis of HC-128 and Rabbit Encryption Schemes for Pervasive Computing in WSN Environment. 682-691 - Ayesha Naureen, Attiya Akram, Rabia Riaz

, Ki-Hyung Kim, H. Farooq Ahmed:
A Comparative Analysis of PKC and Semi-PKC Based Key Management Schemes for Hierarchical Sensor Networks. 692-701 - Naima Iltaf, Mukhtar Hussain, Farrukh Kamran:

A Mathematical Approach towards Trust Based Security in Pervasive Computing Environment. 702-711 - Asma Khalid, Mukhtar Hussain:

A Secure Group Rekeying Scheme with Compromised Node Revocation in Wireless Sensor Networks. 712-721 - Usama Ahmed, Muhammad Arif Wahla, Firdous Kausar

:
Fault Tolerant Secure Routing in Cluster Based Mobile Sensor Networks. 722-731 - Rabia Latif

, Mukhtar Hussain:
Hardware-Based Random Number Generation in Wireless Sensor Networks(WSNs). 732-740 - Shakil Ahmad, Muhammad Arif Wahla, Firdous Kausar

:
Authenticated Encryption in WSN Using eSTREAM Ciphers. 741-749
WNGS 2009 and CGMS 2009
- Markus Rückert, Dominique Schröder

:
Aggregate and Verifiably Encrypted Signatures from Multilinear Maps without Random Oracles. 750-759 - Jong Sik Moon, Deok-Gyu Lee, Im-Yeong Lee:

Device Authentication/Authorization Protocol for Home Network in Next Generation Security. 760-768 - Hangbae Chang, Jonggu Kang, Hyuk-Jun Kwon:

A Study on Feasibility and Establishment of a Security Grade Certification Scheme for the New IT Services. 769-777 - Albert Park:

Domain Specific Intended Use Evaluation Method: Intrusion Detection Specific Intended Use Evaluation Method. 778-787 - Soonseok Kim, Haeyoung Han, Donghwi Shin, Inkyung Jeun, Hyun Cheol Jeong:

A Study of International Trend Analysis on Web Service Vulnerabilities in OWASP and WASC. 788-796 - Song-Hee Lee, Nam-Sup Park, Soo-Kyun Kim

, Jin-Young Choi
:
Cryptanalysis of Secure Key Exchange Protocol between STB and Smart Card in IPTV Broadcasting. 797-803 - Sunhwa Jung, Min Hong, Min-Hyung Choi:

Free-Form Deformation Axis Aligned Bounding Box. 804-813
SHCI-ISA 2009
- Jong-Min Kim, Myung A. Kang:

A Study on Mosaic Based CCTV System Using Localization. 814-822 - Jeong Seok Oh, Jang Sik Park, Jeong Rock Kwon:

Selecting the Wireless Communication Methods for Establishing Ubiquitous City-Gas Facilities in Korea. 823-828 - Hoon Ko

, Ning Chen, Goreti Marreiros
, Carlos Ramos
:
Safety High Accuracy Context-Aware Matrix (CAM) Making Based on X.509 Proxy Certificate. 829-837

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














