ALL ACCEPTED PAPERS
Paperid | PaperTitle | Firstname | Lastname | Organization | AuthorType |
---|---|---|---|---|---|
109 | A New Data Integrity Protection Model for Free Roaming Mobile Agents | Marwa | Essam | Faculty of Computer and Information Sciences -Ain | Primary Contact |
109 | A New Data Integrity Protection Model for Free Roaming Mobile Agents | Mohamed | A. EL-Sharkawy | Faculty of Computer and Information Sciences, Ain-Shams University | Contact |
109 | A New Data Integrity Protection Model for Free Roaming Mobile Agents | Mohamed | S. Abdelwahab | Faculty of Computer and Information Sciences, Ain-Shams University | Contact |
112 | Keyed Blind Multiresolution Watermarking Algorithm For Digital Images | Mahmoud | Hassan | Princess Sumaya University | Primary Contact |
113 | Secure Global Connectivity for Mobile Ad hoc Networks | Ramanarayana | Kandikattu | National Institute of Technology Calicut | Primary Contact |
113 | Secure Global Connectivity for Mobile Ad hoc Networks | Lillykutty | Jacob | National Institute of technology, Calicut | Contact |
117 | Integrating Security Assurance within the (Rational) Unified Process | Mohammad Reza | Razzazi | Amirkabir University of Technology (AUT) | Contact |
117 | Integrating Security Assurance within the (Rational) Unified Process | Yashar | Heydari | Primary Contact | |
128 | Secure Communication and Access Control for Mobile Web Service Provisioning | Satish | Srirama | Informatik V, RWTH Aachen University | Primary Contact |
128 | Secure Communication and Access Control for Mobile Web Service Provisioning | Anton | Naumenko | Industrial Ontologies Group, University of Jyväskylä | Contact |
131 | Success Rate of Reflection Attack on Some DES Variants | Esen | Akkemik | TUBITAK UEKAE | Primary Contact |
131 | Success Rate of Reflection Attack on Some DES Variants | Orhun | Kara | TUBITAK UEKAE | Contact |
131 | Success Rate of Reflection Attack on Some DES Variants | Cevat | Manap | TUBITAK UEKAE | Contact |
132 | Creating Application Security Layer Based on Resource Access Decision Service | Mehmet Özer | Metin | Siemens | Primary Contact |
132 | Creating Application Security Layer Based on Resource Access Decision Service | Cevat | Şener | METU, Department of Computer Engineering | Contact |
132 | Creating Application Security Layer Based on Resource Access Decision Service | Yenal | Göğebakan | Cybersoft, Ankara, Turkey | Contact |
135 | Experience in ISMS at TAI: Findings and Recommendations | Bilge | Yigit | TAI | Primary Contact |
136 | ECSC-128: New Stream Cipher Based on Elliptic Curve Discrete Logarithm Problem | Khaled | Suwais | Primary Contact | |
136 | ECSC-128: New Stream Cipher Based on Elliptic Curve Discrete Logarithm Problem | Azman | Samsudin | Universiti Sains Malaysia (USM) | Contact |
138 | Practical Public Key Solution in Mobile Ad Hoc Networks | W | Hsin | Primary Contact | |
138 | Practical Public Key Solution in Mobile Ad Hoc Networks | Lein | Harn | University of Missouri-Kansas City | Contact |
142 | Security Considerations for Residential Mode on ZigBee Network | Lee-Chun | Ko | ITRI | Primary Contact |
144 | More Secure Authentication using Multiple Servers (MSAMS) | Belgin | Bilgin | Gebze Institute of Technology | Primary Contact |
144 | More Secure Authentication using Multiple Servers (MSAMS) | ibrahim | soğukpınar | Gebze Yüksek Teknoloji Enstitüsü | Contact |
150 | A Memory Management Model For Cryptographic Software Libraries | Ali | Mersin | Izmir Yüksek Teknoloji Enstitüsü | Primary Contact |
150 | A Memory Management Model For Cryptographic Software Libraries | Mutlu | Beyazıt | İzmir Yüksek Teknoloji Enstitüsü | Contact |
158 | A Recursive Method for Validating and Improving Network Security Solutions | Suleyman | Kondakci | Izmir University of Economics | Primary Contact |
159 | Secure Multiparty Overall Mean Computation via Oblivious Polynomial Evaluation | Mert | Özarar | Primary Contact | |
159 | Secure Multiparty Overall Mean Computation via Oblivious Polynomial Evaluation | Attila | Özgit | METU | Contact |
160 | Linear Approximations for 2-round Trivium | Meltem | Sönmez Turan | Middle East Technical University | Primary Contact |
160 | Linear Approximations for 2-round Trivium | Orhun | Kara | TUBITAK UEKAE | Contact |
161 | Türkiyede Kişisel Veri Güvenliği, Teknik ve Yönetsel Önlemler | Yalcin | Cebi | Dokuz Eylul University | Contact |
161 | Türkiyede Kişisel Veri Güvenliği, Teknik ve Yönetsel Önlemler | Osman Okyar | Tahaoglu | Dokuz Eylul University | Primary Contact |
162 | The Performance Results of ECDSA Implementation on Different Coordinate Systems | Serap | ATAY | IZMIR INSTITUTE OF TECHNOLOGY | Primary Contact |
163 | Extending P3P/Appel for Friend Finder | Emin Islam | Tatli | Primary Contact | |
165 | Remote Security Evaluation Agent for the RSEP Protocol | Suleyman | Kondakci | Izmir University of Economics | Primary Contact |
168 | Test Case Generation for Firewall Implementation Testing using Software Testing Techniques | Tugkan | TUGLULAR | Izmir Institute of Technology | Primary Contact |
172 | A Hardware Implementation of RSA | Keklik | Alptekin Bayam | STMicroelectronics | Contact |
172 | A Hardware Implementation of RSA | Berna | Ors | Istanbul Technical University | Primary Contact |
172 | A Hardware Implementation of RSA | Bulent | Orencik | TUBITAK MAM | Contact |
173 | Hardware Implementation of Elliptic Curve Cryptosystem over GF(p^m) | ILKER | YAVUZ | TUBITAK-UEKAE | Contact |
173 | Hardware Implementation of Elliptic Curve Cryptosystem over GF(p^m) | Berna | Ors | Istanbul Technical University | Primary Contact |
174 | Taktik Sahada Güvenli Mesajlasma Sorunu - Secure Messaging Problem In Tactical Domain | A.Betul | SASIOGLU | TUBITAK UEKAE | Primary Contact |
176 | A New Multi-Way Client and Server Authentication Approach for Impersonation Avoidance | Behnam | Rahnama | Primary Contact | |
176 | A New Multi-Way Client and Server Authentication Approach for Impersonation Avoidance | Atilla | Elci | Eastern Mediterranean University | Contact |
Paperid | PaperTitle | Firstname | Lastname | Organization | AuthorType |
---|---|---|---|---|---|
102 | A Framework for an Adaptive Intrusion Detection System using Bayesian Network | Farah | Jemili | Primary Contact | |
104 | Instance-based Authorization Utilizing Query Augmentation | Alex | Wang | Primary Contact | |
106 | A PROPOSED SCHEME FOR A SECURED DECISION SUPPORT SYSTEM OF SEMIOTICS TYPE | Ayman | Berisha | Beni_Swef University | Primary Contact |
108 | Controlling devices in a LAN using a single keyboard and mouse | bharani | rao | BEC | Primary Contact |
108 | Controlling devices in a LAN using a single keyboard and mouse | Raj Kumar | Kulkarni | Bellary Engg College | Contact |
111 | Novel Mechanism to Defend DDOS Attacks Caused by Spam | dina | hanan | Hannam University | Primary Contact |
120 | Performance Study of Secure IEEE 802.11g Networks | G.Zeynep | GURKAS AYDIN | Istanbul University | Primary Contact |
120 | Performance Study of Secure IEEE 802.11g Networks | A.Halim | ZAIM | Istanbul University | Contact |
120 | Performance Study of Secure IEEE 802.11g Networks | M.Ali | AYDIN | Istanbul University | Contact |
123 | Examining the Resistance of the Developed Program Using LSB Methods Called Stego_LSB against RS Steganalysis | Andac | Sahin | Trakya University, Engineering and Architecture Fa | Primary Contact |
123 | Examining the Resistance of the Developed Program Using LSB Methods Called Stego_LSB against RS Steganalysis | Ercan | BULUS | Trakya University, Faculty of Engineering and Architecture, Computer Eng. Dept. | Contact |
123 | Examining the Resistance of the Developed Program Using LSB Methods Called Stego_LSB against RS Steganalysis | M.Tolga | Sakallı | Trakya University | Contact |
123 | Examining the Resistance of the Developed Program Using LSB Methods Called Stego_LSB against RS Steganalysis | H.Nusret | Bulus | Trakya University | Contact |
126 | CONCURRENCY ISSUES IN RULE-BASED NETWORK INTRUSION DETECTION SYSTEMS | Mustafa | Atakan | Primary Contact | |
126 | CONCURRENCY ISSUES IN RULE-BASED NETWORK INTRUSION DETECTION SYSTEMS | Cevat | Şener | METU, Department of Computer Engineering | Contact |
127 | Binary data hiding in audio streams based on wavelet transform | Dmitry Pavlovich | RUBLEV | College of Information Security, Taganrog Technolo | Primary Contact |
127 | Binary data hiding in audio streams based on wavelet transform | Oleg Borisovich | MAKAREVICH | Taganrog Technological Institute of Southern Federal University | Contact |
127 | Binary data hiding in audio streams based on wavelet transform | Vladimir Mikhailovich | FEDOROV | Taganrog Technological Institute of Southern Federal University | Contact |
140 | Configuration of Microsoft ISA Server 2004 and Linux Squid Server | hedaya | alasooly | Primary Contact | |
143 | Covert Channel Communication in RFID | Md. Sadek | Ferdous | Metropolitan University | Primary Contact |
143 | Covert Channel Communication in RFID | Farida | Chowdhury | Dept. of Computer Science & Engineering, Shah Jalal University of Science & Technology, Sylhet, Bangladesh | Contact |
151 | On NTRU and Its Performance | Ali | Mersin | Izmir Yüksek Teknoloji Enstitüsü | Primary Contact |
151 | On NTRU and Its Performance | Mutlu | Beyazıt | İzmir Yüksek Teknoloji Enstitüsü | Contact |
152 | DARIS: A new model for dependency analysis of risks in information security | Suleyman | Kondakci | Izmir University of Economics | Primary Contact |
154 | The use of the Google search engine for accessing private Information on the World Wide Web | Ş. Ahmet | Gürel | Eastern Mediterranean University | Contact |
154 | The use of the Google search engine for accessing private Information on the World Wide Web | Erhan | Basri | Eastern Mediterranean University | Primary Contact |
154 | The use of the Google search engine for accessing private Information on the World Wide Web | Yıltan | Bitirim | Eastern Mediterranean University | Contact |
155 | Secure Hill Cipher Modification SHC-M | Alexander | CHEFRANOV | Eastern Mediterranean University | Primary Contact |
156 | Security Policy: positioning the technological components of information security services under the perspective of electronic business | Kaan | Kurtel | Izmir University of Economics | Primary Contact |
164 | Simple Data Sharing Security Model Based On MLS | Muhammad Reza | Fatemi Abhari | Primary Contact | |
164 | Simple Data Sharing Security Model Based On MLS | Shima | Izadpanahi | Eastern Mediterranean University | Contact |
164 | Simple Data Sharing Security Model Based On MLS | Kiavash | Bahreini | Eastern Mediterranean University | Contact |
166 | A hybrid public key steganography protocol | Sanjeev | Kumar | Nucleus Soft | Contact |
166 | A hybrid public key steganography protocol | Kumar Niraj | Mohan | Infosys | Contact |
166 | A hybrid public key steganography protocol | Vineet | Jain | Infosys | Contact |
166 | A hybrid public key steganography protocol | chirag | jain | Infosys | Primary Contact |
167 | Centralized Role-based access control (RBAC) framework for critical web applications | Alireza | Goudarzi | Primary Contact | |
169 | Mental Network | pooyan | balouchian | Primary Contact | |
169 | Mental Network | marjaneh | safaei | EMU | Contact |
169 | Mental Network | Alireza | Goudarzi | Contact | |
170 | Achieving Private SVD-based Recommendations on Inconsistently Masked Data | Yakut | Ibrahim | Contact | |
170 | Achieving Private SVD-based Recommendations on Inconsistently Masked Data | Huseyin | Polat | Anadolu University | Primary Contact |
175 | A Constraint Oriented Role-Based Access Control Architecture | Muhammad Nabeel | Nabeel | Multimedia University | Primary Contact |
177 | GENERALIZATION OF OPEN KEY KNAPSACK CRYPTOSYSTEMS | Valeriy O | OSIPYAN | -Kuban State University | Primary Contact |
179 | A Crypto-Based Approach to Privacy-Preserving Collaborative Data Mining | Justin | ZHAN | - | Primary Contact |
180 | Improved threat modeling process for grids | Mohammad | Othman nassar | Arab academy for banking and financial sciences | Primary Contact |