ISA 2011: Brno, Czech Republic
Tai-Hoon Kim, Hojjat Adeli, Rosslin John Robles, Maricel O. Balitanas (Eds.): Information Security and Assurance - International Conference, ISA 2011, Brno, Czech Republic, August 15-17, 2011. Proceedings. Springer 2011 Communications in Computer and Information Science 200 ISBN 978-3-642-23140-7
Bilal Khan, Khaled Alghathbar, Muhammad Khurram Khan: Information Security Awareness Campaign: An Alternate Approach. 1-10
Wei Wang: Equivalent Key Recovery Attack on H 2-MAC Instantiated with MD5. 11-20
Pierre-Louis Cayrel, Sidi Mohamed El Yousfi Alaoui, Gerhard Hoffmann, Mohammed Meziani, Robert Niebuhr: Recent Progress in Code-Based Cryptography. 21-32
Pierre-Louis Cayrel, Gerhard Hoffmann, Michael Schneider: GPU Implementation of the Keccak Hash Function Family. 33-42
Ines Bouzouita, Michel Liquiere, Samir Elloumi, Ali Jaoua: A Comparative Study of a New Associative Classification Approach for Mining Rare and Frequent Classification Rules. 43-52
Mohamed Saied Emam Mohamed, Stanislav Bulygin, Johannes Buchmann: Using SAT Solving to Improve Differential Fault Analysis of Trivium. 62-71
Lukás Durfina, Jakub Kroustek, Petr Zemek, Dusan Kolár, Tomas Hruska, Karel Masarik, Alexander Meduna: Design of a Retargetable Decompiler for a Static Platform-Independent Malware Analysis. 72-86
Soltan Alharbi, Jens H. Weber-Jahnke, Issa Traoré: The Proactive and Reactive Digital Forensics Investigation Process: A Systematic Literature Review. 87-100
Fabio Manganiello, Mirco Marchetti, Michele Colajanni: Multistep Attack Detection and Alert Correlation in Intrusion Detection Systems. 101-110
Mohammed Meziani, Pierre-Louis Cayrel, Sidi Mohamed El Yousfi Alaoui: 2SC: An Efficient Code-Based Stream Cipher. 111-122
Mohamed Saied Emam Mohamed, Jintai Ding, Johannes Buchmann: Towards Algebraic Cryptanalysis of HFE Challenge 2. 123-131
Mohammed Meziani, Özgür Dagdelen, Pierre-Louis Cayrel, Sidi Mohamed El Yousfi Alaoui: S-FSB: An Improved Variant of the FSB Hash Family. 132-145
Sidi Mohamed El Yousfi Alaoui, Pierre-Louis Cayrel, Mohammed Meziani: Improved Identity-Based Identification and Signature Schemes Using Quasi-Dyadic Goppa Codes. 146-155
Noureldien Abdelrhman Noureldien, Mahmud Awadelkariem, DeiaEldien M. Ahmed: A Detrministic Factorization and Primality Testing Algorithm for Integers of the Form Z Mod 6 = -1. 156-165
Jayaprakash Kar: Non-interactive Deniable Authentication Protocol Using Generalized ECDSA Signature Scheme. 166-176
Gerasimos C. Meletiou, Yannis C. Stamatiou, Apostolos Tsiakalos: Lower Bounds for Interpolating Polynomials for Square Roots of the Elliptic Curve Discrete Logarithm. 177-187
Jari Veijalainen, Veikko Hara: Towards Next Generation System Architecture for Emergency Services. 188-202
Rosslin John Robles, Gilcheol Park: Securing Communication between SCADA Master Station and Mobile Remote Components. 203-210
Maricel O. Balitanas, Seung-Hwan Jeon, Tai-Hoon Kim: Retrofit to CAIN of IP-Based Supervisory Control and Data Acquisition System. 211-218
Rosslin John Robles, Tai-Hoon Kim: Application Program Interface as Back-Up Data Source for SCADA Systems. 219-226
Maricel O. Balitanas, Tai-Hoon Kim: Supervisory Control and Data Acquisition System CAIN Issues. 227-235
Gyuyeong Kim, Hyuntae Kim, Jangsik Park, Yunsik Yu: Vehicle Tracking Based on Kalman Filter in Tunnel. 250-256
Chai-Jong Song, Seok-Pil Lee, Hochong Park: The Contents Based Music Retrieval Method Using Audio Feature Analysis against Polyphonic Music. 257-263
Hyuntae Kim, Daehyun Ryu, Jangsik Park: A Noise Robust Echo Canceller with Post-processing Using Liner Predictor and Wiener filter. 264-274
Jangsik Park, Hyuntae Kim, Yunsik Yu: Implementation Fire Detection Algorithm Using Fixed Point Digital Signal Processor. 275-281
Seung-Hyun Lee, Kyung-Soo Jang, Kee-Hyun Choi, Choon-Sung Nam, Dong Ryeol Shin: An Efficient Private Registry Management System Using DHT Based on FIPA Agent Platform. 282-291
You-Jin Song, Jae Sang Cha, Jang Mook Kang: A Study for Method of Construct Encryption Scheme for Supporting Range Query Based on Bucket ID Transformation about Sensor Applications. 292-305
Ji-Yeon Hwang, Seung-Jung Shin, DaeHyun Ryu: Improvement of Message Processing Method for SOA Based Digital Set-Top Box System. 306-312
You-Jin Song, Jae Sang Cha, Jang Mook Kang, Wan-Sik Kim: A Data Management Method to Secure Data in Cloud Computing Environment. 313-317
Dongjae Song, Soongyu Kwon, Chun-Guan Kim, Jong Tae Kim: VLSI Architecture of Adaptive Viterbi Decoder for Wireless Communication. 318-325
Jang Mook Kang, You-Jin Song, Jae Sang Cha, Seon-Hee Lee: A Study for Security Scheme and the Right to Be Forgotten Based on Social Network Service for Smart-Phone Environment. 326-332
Jun-Pil Boo, Do-Hyeun Kim: Development of Integrated Adapter Based on Multi-sensor Networks for Tracking and Surveillance. 333-338
Byoungman An, Youngseop Kim, Oh-Jin Kwon: High Speed and Low-Complexity Mode Decision for Advanced Video Coding. 339-348
Ji Hoon Yang, Seung-Jung Shin, Dong Kyun Lim, Jeong Jin Kang: Robust Congestion Control Design for Input Time Delayed AQM System. 349-358
Dong-Sung Ryu, Kwanghwi Kim, Hwan-Gue Cho: An Intelligent Clustering Method for Highly Similar Digital Photos Using Pyramid Matching with Human Perceptual 25 Color Histogram. 359-366
Yong-Kyun Cho, Young-Bum Park: Requirements Analysis and Critical Requirement Derivation Method Using Macrostruktur. 367-377
Jang Mook Kang, Jae Sang Cha, You-Jin Song, Goo-Man Park, Eun-Young Ko, Myong-chul Shin, Jeong Jin Kang, YouSik Hong: A Scheme for Role-Based 3D CCTV Using CS-RBAC (Context-Sensitivity Role-Based Access Control). 378-383
Jangsik Park, Hyuntae Kim, Gyuyeong Kim, Yunsik Yu: Vessel Tracking Using Adaboost Algorithm and AIS Information. 384-388
Xing Xiong, Byung-Jae Choi: Relative Self-Localization Base on Fish-Eye Lenses and SIFT Algorithm for Indoor Mobile Robot. 389-394
Wonjun Jang, Sikwan Cho, Hyung-Woo Lee: User-Oriented Pseudo Biometric Image Based One-Time Password Mechanism on Smart Phone. 395-404



