ALL ACCEPTED PAPERS

SIN 2007: Accepted Full Papers with All Authors

Paperid PaperTitle Firstname Lastname Organization AuthorType
109 A New Data Integrity Protection Model for Free Roaming Mobile Agents Marwa Essam Faculty of Computer and Information Sciences -Ain Primary Contact
109 A New Data Integrity Protection Model for Free Roaming Mobile Agents Mohamed A. EL-Sharkawy Faculty of Computer and Information Sciences, Ain-Shams University Contact
109 A New Data Integrity Protection Model for Free Roaming Mobile Agents Mohamed S. Abdelwahab Faculty of Computer and Information Sciences, Ain-Shams University Contact
112 Keyed Blind Multiresolution Watermarking Algorithm For Digital Images Mahmoud Hassan Princess Sumaya University Primary Contact
113 Secure Global Connectivity for Mobile Ad hoc Networks Ramanarayana Kandikattu National Institute of Technology Calicut Primary Contact
113 Secure Global Connectivity for Mobile Ad hoc Networks Lillykutty Jacob National Institute of technology, Calicut Contact
117 Integrating Security Assurance within the (Rational) Unified Process Mohammad Reza Razzazi Amirkabir University of Technology (AUT) Contact
117 Integrating Security Assurance within the (Rational) Unified Process Yashar Heydari Primary Contact
128 Secure Communication and Access Control for Mobile Web Service Provisioning Satish Srirama Informatik V, RWTH Aachen University Primary Contact
128 Secure Communication and Access Control for Mobile Web Service Provisioning Anton Naumenko Industrial Ontologies Group, University of Jyväskylä Contact
131 Success Rate of Reflection Attack on Some DES Variants Esen Akkemik TUBITAK UEKAE Primary Contact
131 Success Rate of Reflection Attack on Some DES Variants Orhun Kara TUBITAK UEKAE Contact
131 Success Rate of Reflection Attack on Some DES Variants Cevat Manap TUBITAK UEKAE Contact
132 Creating Application Security Layer Based on Resource Access Decision Service Mehmet Özer Metin Siemens Primary Contact
132 Creating Application Security Layer Based on Resource Access Decision Service Cevat Şener METU, Department of Computer Engineering Contact
132 Creating Application Security Layer Based on Resource Access Decision Service Yenal Göğebakan Cybersoft, Ankara, Turkey Contact
135 Experience in ISMS at TAI: Findings and Recommendations Bilge Yigit TAI Primary Contact
136 ECSC-128: New Stream Cipher Based on Elliptic Curve Discrete Logarithm Problem Khaled Suwais Primary Contact
136 ECSC-128: New Stream Cipher Based on Elliptic Curve Discrete Logarithm Problem Azman Samsudin Universiti Sains Malaysia (USM) Contact
138 Practical Public Key Solution in Mobile Ad Hoc Networks W Hsin Primary Contact
138 Practical Public Key Solution in Mobile Ad Hoc Networks Lein Harn University of Missouri-Kansas City Contact
142 Security Considerations for Residential Mode on ZigBee Network Lee-Chun Ko ITRI Primary Contact
144 More Secure Authentication using Multiple Servers (MSAMS) Belgin Bilgin Gebze Institute of Technology Primary Contact
144 More Secure Authentication using Multiple Servers (MSAMS) ibrahim soğukpınar Gebze Yüksek Teknoloji Enstitüsü Contact
150 A Memory Management Model For Cryptographic Software Libraries Ali Mersin Izmir Yüksek Teknoloji Enstitüsü Primary Contact
150 A Memory Management Model For Cryptographic Software Libraries Mutlu Beyazıt İzmir Yüksek Teknoloji Enstitüsü Contact
158 A Recursive Method for Validating and Improving Network Security Solutions Suleyman Kondakci Izmir University of Economics Primary Contact
159 Secure Multiparty Overall Mean Computation via Oblivious Polynomial Evaluation Mert Özarar Primary Contact
159 Secure Multiparty Overall Mean Computation via Oblivious Polynomial Evaluation Attila Özgit METU Contact
160 Linear Approximations for 2-round Trivium Meltem Sönmez Turan Middle East Technical University Primary Contact
160 Linear Approximations for 2-round Trivium Orhun Kara TUBITAK UEKAE Contact
161 Türkiye’de Kişisel Veri Güvenliği, Teknik ve Yönetsel Önlemler Yalcin Cebi Dokuz Eylul University Contact
161 Türkiye’de Kişisel Veri Güvenliği, Teknik ve Yönetsel Önlemler Osman Okyar Tahaoglu Dokuz Eylul University Primary Contact
162 The Performance Results of ECDSA Implementation on Different Coordinate Systems Serap ATAY IZMIR INSTITUTE OF TECHNOLOGY Primary Contact
163 Extending P3P/Appel for Friend Finder Emin Islam Tatli Primary Contact
165 Remote Security Evaluation Agent for the RSEP Protocol Suleyman Kondakci Izmir University of Economics Primary Contact
168 Test Case Generation for Firewall Implementation Testing using Software Testing Techniques Tugkan TUGLULAR Izmir Institute of Technology Primary Contact
172 A Hardware Implementation of RSA Keklik Alptekin Bayam STMicroelectronics Contact
172 A Hardware Implementation of RSA Berna Ors Istanbul Technical University Primary Contact
172 A Hardware Implementation of RSA Bulent Orencik TUBITAK MAM Contact
173 Hardware Implementation of Elliptic Curve Cryptosystem over GF(p^m) ILKER YAVUZ TUBITAK-UEKAE Contact
173 Hardware Implementation of Elliptic Curve Cryptosystem over GF(p^m) Berna Ors Istanbul Technical University Primary Contact
174 Taktik Sahada Güvenli Mesajlasma Sorunu - Secure Messaging Problem In Tactical Domain A.Betul SASIOGLU TUBITAK UEKAE Primary Contact
176 A New Multi-Way Client and Server Authentication Approach for Impersonation Avoidance Behnam Rahnama Primary Contact
176 A New Multi-Way Client and Server Authentication Approach for Impersonation Avoidance Atilla Elci Eastern Mediterranean University Contact

 

SIN 2007: Accepted Short Papers with All Authors

Paperid PaperTitle Firstname Lastname Organization AuthorType
102 A Framework for an Adaptive Intrusion Detection System using Bayesian Network Farah Jemili Primary Contact
104 Instance-based Authorization Utilizing Query Augmentation Alex Wang Primary Contact
106 A PROPOSED SCHEME FOR A SECURED DECISION SUPPORT SYSTEM OF SEMIOTICS TYPE Ayman Berisha Beni_Swef University Primary Contact
108 Controlling devices in a LAN using a single keyboard and mouse bharani rao BEC Primary Contact
108 Controlling devices in a LAN using a single keyboard and mouse Raj Kumar Kulkarni Bellary Engg College Contact
111 Novel Mechanism to Defend DDOS Attacks Caused by Spam dina hanan Hannam University Primary Contact
120 Performance Study of Secure IEEE 802.11g Networks G.Zeynep GURKAS AYDIN Istanbul University Primary Contact
120 Performance Study of Secure IEEE 802.11g Networks A.Halim ZAIM Istanbul University Contact
120 Performance Study of Secure IEEE 802.11g Networks M.Ali AYDIN Istanbul University Contact
123 Examining the Resistance of the Developed Program Using LSB Methods Called Stego_LSB against RS Steganalysis Andac Sahin Trakya University, Engineering and Architecture Fa Primary Contact
123 Examining the Resistance of the Developed Program Using LSB Methods Called Stego_LSB against RS Steganalysis Ercan BULUS Trakya University, Faculty of Engineering and Architecture, Computer Eng. Dept. Contact
123 Examining the Resistance of the Developed Program Using LSB Methods Called Stego_LSB against RS Steganalysis M.Tolga Sakallı Trakya University Contact
123 Examining the Resistance of the Developed Program Using LSB Methods Called Stego_LSB against RS Steganalysis H.Nusret Bulus Trakya University Contact
126 CONCURRENCY ISSUES IN RULE-BASED NETWORK INTRUSION DETECTION SYSTEMS Mustafa Atakan Primary Contact
126 CONCURRENCY ISSUES IN RULE-BASED NETWORK INTRUSION DETECTION SYSTEMS Cevat Şener METU, Department of Computer Engineering Contact
127 Binary data hiding in audio streams based on wavelet transform Dmitry Pavlovich RUBLEV College of Information Security, Taganrog Technolo Primary Contact
127 Binary data hiding in audio streams based on wavelet transform Oleg Borisovich MAKAREVICH Taganrog Technological Institute of Southern Federal University Contact
127 Binary data hiding in audio streams based on wavelet transform Vladimir Mikhailovich FEDOROV Taganrog Technological Institute of Southern Federal University Contact
140 Configuration of Microsoft ISA Server 2004 and Linux Squid Server hedaya alasooly Primary Contact
143 Covert Channel Communication in RFID Md. Sadek Ferdous Metropolitan University Primary Contact
143 Covert Channel Communication in RFID Farida Chowdhury Dept. of Computer Science & Engineering, Shah Jalal University of Science & Technology, Sylhet, Bangladesh Contact
151 On NTRU and Its Performance Ali Mersin Izmir Yüksek Teknoloji Enstitüsü Primary Contact
151 On NTRU and Its Performance Mutlu Beyazıt İzmir Yüksek Teknoloji Enstitüsü Contact
152 DARIS: A new model for dependency analysis of risks in information security Suleyman Kondakci Izmir University of Economics Primary Contact
154 The use of the Google search engine for accessing private Information on the World Wide Web Ş. Ahmet Gürel Eastern Mediterranean University Contact
154 The use of the Google search engine for accessing private Information on the World Wide Web Erhan Basri Eastern Mediterranean University Primary Contact
154 The use of the Google search engine for accessing private Information on the World Wide Web Yıltan Bitirim Eastern Mediterranean University Contact
155 Secure Hill Cipher Modification SHC-M Alexander CHEFRANOV Eastern Mediterranean University Primary Contact
156 Security Policy: positioning the technological components of information security services under the perspective of electronic business Kaan Kurtel Izmir University of Economics Primary Contact
164 Simple Data Sharing Security Model Based On MLS Muhammad Reza Fatemi Abhari Primary Contact
164 Simple Data Sharing Security Model Based On MLS Shima Izadpanahi Eastern Mediterranean University Contact
164 Simple Data Sharing Security Model Based On MLS Kiavash Bahreini Eastern Mediterranean University Contact
166 A hybrid public key steganography protocol Sanjeev Kumar Nucleus Soft Contact
166 A hybrid public key steganography protocol Kumar Niraj Mohan Infosys Contact
166 A hybrid public key steganography protocol Vineet Jain Infosys Contact
166 A hybrid public key steganography protocol chirag jain Infosys Primary Contact
167 Centralized Role-based access control (RBAC) framework for critical web applications Alireza Goudarzi Primary Contact
169 Mental Network pooyan balouchian Primary Contact
169 Mental Network marjaneh safaei EMU Contact
169 Mental Network Alireza Goudarzi Contact
170 Achieving Private SVD-based Recommendations on Inconsistently Masked Data Yakut Ibrahim Contact
170 Achieving Private SVD-based Recommendations on Inconsistently Masked Data Huseyin Polat Anadolu University Primary Contact
175 A Constraint Oriented Role-Based Access Control Architecture Muhammad Nabeel Nabeel Multimedia University Primary Contact
177 GENERALIZATION OF OPEN KEY KNAPSACK CRYPTOSYSTEMS Valeriy O OSIPYAN -Kuban State University Primary Contact
179 A Crypto-Based Approach to Privacy-Preserving Collaborative Data Mining Justin ZHAN - Primary Contact
180 Improved threat modeling process for grids Mohammad Othman nassar Arab academy for banking and financial sciences Primary Contact