SIN 2007 Proceeding
Update on March 27, 2008:
Copies of the proceedings book have arrived and
being dispatched to registered participants. The copies will be airmailed
to all participants abroad. If there is a change in the address you indicated in
the registration form, please send an update to the
Conference Chair.
The SIN 2007 proceedings is Available now for
online orders from the publisher,
Barnes and Noble,
Google Book Search
Soon as e-book and in a bookstore near you!
Update on Jan. 22, 2008:
The proceedings
book is now available through our publisher Trafford Publishing. Please follow
this link to order.
We are ordering copies for shipment to all registered delegates of SIN Conf 2007. As soon as the books arrive we'll airmail them to participants' addresses. However, this will take time.
Copies of the proceeding will be available through online and conventional book sale channels soon.
Update on Dec. 11th, 2007:
Draft print of
the proceedings book has just been shipped by the publisher. We're going to
verify once recieved and if all are OK, then actual printing will be ordered.
This is likely to task place in January 2008.
The SIN 2007 Proceeding is being prepared for publication in hardcopy and e-book formats by Trafford Publishing, Canada. The registrants of SIN 2007 will be send a hardcopy free-of-charge by the Conference Management; this is likely to be during January-February 2008. Both the hardcopy and the e-book media will become available for bulk/individual purchase through Trafford and major book channels starting January 2008.
Reference data of the proceeding
is as follows:
Atilla ELCI, S. Berna ORS,
and Bart PRENEEL (Editors). 2008. Security of Information
and Networks, Proc. First International Conference on Security of Information and
Networks (SIN 2007), Gazimagusa, TRNC, May 2007, Trafford Publishing, IX+370
pages, ISBN: 978-1-4251-4109-7.
The Table of Contents is as follows:
Table of Contents
Keynote Speech
Power Analysis AttacksA Very Brief Introduction 1
Elisabeth Oswald
On White-Box Cryptography ... .. 7
Marc Joye
Ciphers
ECSC-128: New Stream Cipher Based on Elliptic Curve Discrete Logarithm
Problem 13
Khaled Suwais, Azman Samsudin
Hardware Implementation of Elliptic Curve Cryptosystem over GF(pm) .. 24
Ilker Yavuz, Berna Ors
Secure Hill Cipher Modification SHC-M . 34
A. G. Chefranov
Keyed Blind Multiresolution Watermarking Algorithm for Digital Images 38
Mahmoud Hassan, Sarah Alkuhlani, Wasan Talhouni and Laith Smadi
Covert Channel Communication in RFID 47
Md. Sadek Ferdous, Farida Chowdhury
Privacy-Preserving Decision Tree Classification in Horizontal Collaboration . 53
Justin Zhan
Generalization of Open Key Knapsack Cryptosystems ... 58
V. O. Osipyan
Mobile Agents & Networks
Practical Public Key Solution in Mobile Ad Hoc Networks 64
Wen-Jung Hsin, Lein Harn
A Recursive Method for Validating and Improving Network Security
Solutions ... 74
Suleyman Kondakci
Secure Multiparty Overall Mean Computation via Oblivious Polynomial
Evaluation . 84
Mert Φzarar, Attila Φzgit
Linear Approximations for 2-round Trivium ... 96
Meltem Sφnmez Turan, Orhun Kara
A New Data Integrity Protection Model for Free Roaming Mobile Agents 106
Marwa M. Essam, Mohamed A. El-Sharkawy, Mohamed S. Abdelwahab
Secure Global Connectivity for Mobile Ad hoc Networks 116
K. Ramanarayana, Lillykutty Jacob
Security Considerations for Residential Mode on ZigBee Network .. 126
Lee-Chun Ko
Attacks, Intrusion Detection, and Security Recommendations
Success Rate of Reflection Attack on Some DES Variants ... 136
Esen Akkemik, Orhun Kara, Cevat Manap
Concurrency Issues in Rule-Based Network Intrusion Detection Systems. 146
Mustafa Atakan, Cevat ener
The Use of the
Google Search Engine for Accessing Private Information on
the World Wide Web
... 151
Ahmet Gόrel, Erhan Basri, Yıltan Bitirim
DARIS: A Probabilistic Model for Dependency Analysis of Risks in Information
Security ... 162
Sόleyman Kondakηı
Improved Threat Modeling Process for Grids 167
Mohammad Othman Nassar
Achieving Private SVD-based Recommendations on Inconsistently Masked
Data ............................................................................................... 172
Ibrahim Yakut, Huseyin Polat.
Keynote Speech
Micro-Architectural Side-Channel Attacks & Branch Prediction Attack... 177
Ηetin Kaya Koη
Keynote Speech
Web Services Security: Protocols, Implementations, and Proofs 178
Karthik Bhargawan
Security Software, Performance, and Experience
The Performance Results of ECDSA Implementation on Different Coordinate
Systems 179
Serap Atay
Remote Security Evaluation Agent for the RSEP Protocol 186
Suleyman Kondakci
Test Case
Generation for Firewall Implementation Testing using Software
Testing Techniques
. 196
Tugkan Tuglular
Performance Study of Secure IEEE 802.11g Networks . 204
Zeynep Gurkas Aydın, A.Halim Zaim, M.Ali Aydın
Configuration
of Microsoft ISA Server 2004 and Linux Squid Server and
Evaluation of Some Security Tools
. 209
Hedaya Alasooly
Personal Data Protection in Turkey: Technical and Managerial Controls 220
Yalcin Cebi, Osman Okyar Tahaoglu
Access Control and Security Assurance
Integrating Security Assurance within the (Rational) Unified Process 228
Mohammad Reza Razzazi, Yashar Heydari
Secure Communication and Access Control for Mobile Web Service
Provisioning ... 238
Satish Srirama, Anton Naumenko
Creating Application Security Layer Based on Resource Access Decision
Service 248
Mehmet Φzer Metin, Cevat ener, Yenal Gφğebakan
More Secure Authentication using Multiple Servers (MSAMS) ... 258
Belgin Bilgin, Ibrahim Soğukpınar.
Keynote Speech
Research Challenges in Cryptology ... 268
Bart Preneel
Security Software, Performance, and Experience
On NTRU and Its Performance .. 273
Ali Mersin, Mutlu Beyazıt
Establishing the ISMS at Tusas Aerospace Industries Inc. TAI: Experiences and
Recommendations ...... ..... ..... ............. . 285
Bilge Yigit
A Memory Management Model for Cryptographic Software Libraries 292
Ali Mersin, Mutlu Beyazıt
Information Security Policy: Positioning the Technological Components of
Information Security Services under the Perspective of Electronic Business ... 302
Kaan Kurtel
Access Control and Security Assurance
Applying ParseKey+ as a New Multi-Way Client and Server Authentication
Approach to
Resolve Imperfect Counter Utilization in IEEE802.11i for
Impersonation Avoidance
... 308
Behnam Rahnama, Atilla Elci
Centralized Role-Based Access Control (RBAC) Framework for Critical Web
Applications . ... 321
Alireza Goudarzi
Enforcing Security & Privacy Measures on Semantic Networks . .. 328
Pooyan Balouchian, Marjaneh Safaei, Alireza Goudarzi
Simple Data Sharing Security Model Based On MLS .. . ... 336
Muhammad Reza Fatemi, Shima Izadpanahi, Kiavash Bahreini
Examining the Resistance of the Developed Program Using LSB Methods Called
Stego_LSB against RS Steganalysis . .. 341
Andac Sahin, Ercan Bulus, M.Tolga Sakallı, H.Nusret Bulus
Keynote Speech
Secure Routing in Ad Hoc Networks and Model Checking .. 346
Mehmet Ufuk Ηağlayan
Author Index . 370