


default search action
IAS 2007: Manchester, UK
- Ning Zhang, Ajith Abraham:

Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007, August 29-31, 2007, Manchester, United Kingdom. IEEE Computer Society 2007, ISBN 978-0-7695-2876-2
E-Commerce Security
- Li-Sha He, Ning Zhang

, Li-Rong He, Ian Rogers:
Secure M-commerce Transactions: A Third Party Based Signature Protocol. 3-8 - Satish Devane, Madhumita Chatterjee, Deepak B. Phatak:

Secure E-Commerce Protocol for Purchase of e-Goods - Using Smart Card. 9-14 - Hao Wang

, Yuyi Ou, Jie Ling, Lu Liang, Xiang Xu:
Certified Email Delivery with Offline TTP. 15-20 - Ibrahim Mostafa Ibrahim, Sherif Hazem Nour El-Din, Abdel Fatah A. Hegazy:

An Effective and Secure Buyer-Seller Watermarking Protocol. 21-28
Network Security
- Mohamad Aljnidi, Jean Leneutre:

Towards an Autonomic Security System for Mobile Ad Hoc Networks. 29-32 - Pierre E. Abi-Char

, Abdallah Mhamed, Bachar El-Hassan:
A Secure Authenticated Key Agreement Protocol For Wireless Security. 33-38 - Sigurd Eskeland, Vladimir A. Oleshchuk:

Hierarchical Multi-Party Key Agreement for Wireless Networks. 39-43 - Kashif Kifayat

, Madjid Merabti, Qi Shi, David Llewellyn-Jones:
Applying Secure Data Aggregation techniques for a Structure and Density Independent Group Based Key Management Protocol. 44-49 - Su Mon Bo, Hannan Xiao

, Aderemi Adereti, James A. Malcolm, Bruce Christianson:
A Performance Comparison of Wireless Ad Hoc Network Routing Protocols under Security Attack. 50-55 - Tarag Fahad, Djamel Djenouri

, Robert Askwith:
On Detecting Packets Droppers in MANET: A Novel Low Cost Approach. 56-64
Cryptographic Schemes and Applications
- Ashutosh Saxena:

Threshold SKI Protocol for ID-based Cryptosystems. 65-70 - Thian Song Ong

, Andrew Beng Jin Teoh
:
Fuzzy Key Extraction from Fingerprint Biometrics based on Dynamic Quantization Mechanism. 71-76 - Dimitrios Hristu-Varsakelis

, Konstantinos Chalkias, George Stephanides:
Low-cost Anonymous Timed-Release Encryption. 77-82 - Evangelos Papoutsis, Gareth Howells, Andrew B. T. Hopkins, Klaus D. McDonald-Maier

:
Integrating Multi-Modal Circuit Features within an Efficient Encryption System. 83-88 - Pierre E. Abi-Char

, Abdallah Mhamed, Bachar El-Hassan:
A Secure Authenticated Key Agreement Protocol Based on Elliptic Curve Cryptography. 89-94 - Sandro Bartolini, Cinzia Castagnini, Enrico Martinelli:

Inclusion of a Montgomery Multiplier Unit into an Embedded Processor's Datapath to Speed-up Elliptic Curve Cryptography. 95-100 - Sandipan Dey, Ajith Abraham, Sugata Sanyal:

An LSB Data Hiding Technique Using Prime Numbers. 101-108
Authentication and Access Control
- Irfan Ahmed

, Usman Tariq
, Shoaib Mukhtar, Kyung-suk Lhee, S. W. Yoo, Piao Yanji, Manpyo Hong:
Binding Update Authentication Scheme for Mobile IPv6. 109-114 - M. M. Chowdhury:

An Authentication Scheme Using Non-Commutative Semigroups. 115-118 - Wei Zhou, Christoph Meinel:

Function-Based Authorization Constraints Specification and Enforcement. 119-124 - Hassan Takabi, Morteza Amini

, Rasool Jalili:
Separation of Duty in Role-Based Access Control Model through Fuzzy Relations. 125-130 - Hassan Takabi, Morteza Amini

, Rasool Jalili:
Enhancing Role-Based Access Control Model through Fuzzy Relations. 131-136 - Bo-Chao Cheng, Huan Chen, Ryh-Yuh Tseng:

A Theoretical Security Model for Access Control and Security Assurance. 137-142 - Naikuo Yang, Howard Barringer, Ning Zhang

:
A Purpose-Based Access Control Model. 143-148 - Yue Zhang, James B. D. Joshi:

SARBAC07: A Scoped Administration Model for RBAC with Hybrid Hierarchy. 149-154 - Aleksandra Nenadic, Ning Zhang

, Li Yao, Terry Morrow:
Levels of Authentication Assurance: an Investigation. 155-160
Intrusion Prevention
- Virginia N. L. Franqueira

, Raul H. C. Lopes:
Vulnerability Assessment by Learning Attack Specifications in Graphs. 161-164 - Alexey Smirnov, Tzi-cker Chiueh:

Automatic Patch Generation for Buffer Overflow Attacks. 165-170 - Muhammad Sher

, Thomas Magedanz:
Protecting IP Multimedia Subsystem (IMS) Service Delivery Platform from Time Independent Attacks. 171-176 - Do-Hoon Kim, Taek Lee, Sung-Oh David Jung, Hoh Peter In, Heejo Lee:

Cyber Threat Trend Analysis Model Using HMM. 177-182 - Kjetil Haslum, Ajith Abraham, Svein J. Knapskog:

DIPS: A Framework for Distributed Intrusion Prediction and Prevention Using Hidden Markov Models and Online Fuzzy Risk Assessment. 183-190
Intrusion Detection
- Anjali Sardana, Krishan Kumar

, Ramesh Chandra Joshi:
Detection and Honeypot Based Redirection to Counter DDoS Attacks in ISP Domain. 191-196 - Neil Cooke, Lee Gillam, Ahmet M. Kondoz:

IP protection: Detecting Email based breaches of confidence. 197-202 - Arnur G. Tokhtabayev, Victor A. Skormin:

Non-Stationary Markov Models and Anomaly Propagation Analysis in IDS. 203-208 - Fabrizio Baiardi

, Daniele Sgandurra:
Building Trustworthy Intrusion Detection through VM Introspection. 209-214 - Pravin Shinde, Srinivas Guntupalli:

Early DoS Attack Detection using Smoothened Time-Series andWavelet Analysis. 215-220 - Simon Fong, Zhuang Yan:

A Security Model for Detecting Suspicious Patterns in Physical Environment. 221-226 - Eric Medvet

, Cyril De Fillon, Alberto Bartoli
:
Detection of Web Defacements by means of Genetic Programming. 227-234
Security Analysis
- Zhenrong Yang, Aiman Hanna, Mourad Debbabi

:
Team Edit Automata for Testing Security Property. 235-240 - Patroklos G. Argyroudis, Robert McAdoo, Stephen Toner, Linda Doyle

, Donal O'Mahony
:
Analysing the Security Threats against Network Convergence Architectures. 241-246 - Fabio Massacci

, Artsiom Yautsiukhin
:
Modelling Quality of Protection in Outsourced Business Processes. 247-252 - Mohamed Mostafa Saleh

, Mourad Debbabi
:
Modeling Security Protocols as Games. 253-260
Data Security and Privacy
- Diego Scardaci, Giordano Scuderi:

A Secure Storage Service for the gLite Middleware. 261-266 - Dan Feng, Lanxiang Chen, Lingfang Zeng

, Zhongying Niu:
FPGA/ASIC based Cryptographic Object Store System. 267-272 - Waseem Ahmad, Ashfaq A. Khokhar:

An Architecture for Privacy Preserving Collaborative Filtering on Web Portals. 273-278 - Dhiah el Diehn I. Abou-Tair

, Stefan Berlik
, Udo Kelter:
Enforcing Privacy by Means of an Ontology Driven XACML Framework. 279-284 - Waleed A. Alrodhan, Chris J. Mitchell

:
Addressing privacy issues in CardSpace. 285-291 - Xiangrong Xiao, Xingming Sun, Minggang Chen:

Second-LSB-Dependent Robust Watermarking for Relational Database. 292-300
Risk and Trust Management
- Daniel Gideon Dresner, J. Robert (Bob) G. Wood:

Operational risk: acceptability criteria. 301-306 - Srinivasan T., Varun Ramachandran, Arun Vedachalam, S. K. Ghosh:

HPRS: A Hybrid P2P Reputation System using File and Peer Rating. 307-312 - Diala Abi Haidar, Nora Cuppens-Boulahia, Frédéric Cuppens, Hervé Debar

:
Resource Classification Based Negotiation in Web Services. 313-318 - Elvis Papalilo, Bernd Freisleben

:
Managing Behaviour Trust in Grids Using Statistical Methods of Quality Assurance. 319-324 - Reiko Ann Miura-Ko, Nicholas Bambos:

Dynamic Risk Mitigation in Computing Infrastructures. 325-328 - Wim Mees

:
Risk management in coalition networks. 329-336
Security Requirements and Policies
- Johs Hansen Hammer, Gerardo Schneider:

On the Definition and Policies of Confidentiality. 337-342 - Pravin Shinde, Priyanka Sharma, Srinivas Guntupalli:

Enhanced Availability and Security by Rate Control Using Extended Policy Framework in SELinux. 343-348 - Jose Romero-Mariona, Hadar Ziv, Debra J. Richardson:

CCARCH: Architecting Common Criteria Security Requirements. 349-356
Agent and System Security
- Martijn Warnier

, Frances M. T. Brazier:
Organized Anonymous Agents. 357-362 - Michail Fragkakis, Nikos Alexandris:

Comparing the Trust and Security Models of Mobile Agents. 363-368 - Bobby D. Birrer, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Robert W. Bennington:

Program Fragmentation as a Metamorphic Software Protection. 369-374 - Wei Li, Lap-Chung Lam, Tzi-cker Chiueh:

Accurate Application-Specific Sandboxing for Win32/Intel Binaries. 375-382
Workshop on Computational Forensics
- Katrin Franke, Sargur N. Srihari:

Computational Forensics: Towards Hybrid-Intelligent Crime Investigation. 383-386 - Danny Crookes, Hongjiang Su, Ahmed Bouridane, Mourad Gueham:

Shoeprint Image Retrieval Based on Local Image Features. 387-392 - Cor J. Veenman:

Statistical Disk Cluster Classification for File Carving. 393-398 - Richard Bache, Fabio Crestani

, David Canter, Donna Youngs:
Application of Language Models to Suspect Prioritisation and Suspect Likelihood in Serial Crimes. 399-404 - Slobodan Petrovic, Katrin Franke:

Improving the Efficiency of Digital Forensic Search by Means of the Constrained Edit Distance. 405-410 - Daniel Ramos, Joaquin Gonzalez-Rodriguez, Grzegorz Zadora

, Janina Zieba-Palus, Colin Aitken:
Information-theoretical comparison of likelihood ratio methods of forensic evidence evaluation. 411-416 - Vladimir Pervouchine, Graham Leedham:

Study of structural features of handwritten grapheme 'th' for writer identification. 417-422 - Gang Fang, Sargur N. Srihari, Harish Srinivasan:

Generative Models for Fingerprint Individuality using Ridge Types. 423-428 - Lucia Ballerini

, Oscar Cordón
, Sergio Damas
, José Santamaría
, Inmaculada Alemán
, Miguel Botella:
Craniofacial Superimposition in Forensic Identification using Genetic Algorithms. 429-434 - Donato Impedovo

, Mario Refice:
The Influence of Frame Length on Speaker Identification Performance. 435-438 - Babak Mahdian, Stanislav Saic:

On Periodic Properties of Interpolation and Their Application To Image Authentication. 439-446
Workshop on Data Hiding for Information and Multimedia Security
- Junwei Huang, Xingming Sun, Huajun Huang, Gang Luo:

Detection of Hidden Information in Webpages Based on Randomness. 447-452 - Andrew D. Ker:

A Weighted Stego Image Detector for Sequential LSB Replacement. 453-456 - Geong Sen Poh, Keith M. Martin:

A Framework for Design and Analysis of Asymmetric Fingerprinting Protocols. 457-461 - Julien Lafaye:

An Analysis of Database Watermarking Security. 462-467 - M. Venkatesan, P. Meenakshi Devi

, K. Duraiswamy, K. Thiagarajah:
A New Data Hiding Scheme with Quality Control for Binary Images Using Block Parity. 468-471 - Anirban Majumdar, Stephen Drape, Clark D. Thomborson

:
Metrics-based Evaluation of Slicing Obfuscations. 472-477 - Yan Zhu

, Chang-Tsun Li
, Hong-Jia Zhao:
Structural Digital Signature and Semi-Fragile Fingerprinting for Image Authentication in Wavelet Domain. 478-483 - Kannan Karthik, Dimitrios Hatzinakos:

A novel anti-collusion coding scheme tailored to track linear collusions. 484-489 - Lingyun Xiang, Xingming Sun, Gang Luo, Can Gan:

Research on Steganalysis for Text Steganography Based on Font Format. 490-495 - Yue Li, Chang-Tsun Li

, Chia-Hung Wei:
Protection of Mammograms Using Blind Steganography and Watermarking. 496-500

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














