SIN 2007 Proceeding

Update on March 27, 2008:
Copies of the proceedings book have arrived and being dispatched to registered participants. The copies will be airmailed to all participants abroad. If there is a change in the address you indicated in the registration form, please send an update to the Conference Chair.

The SIN 2007 proceedings is Available now for online orders from the publisher, Barnes and Noble, Amazon.com, Books-A-Million, and BookSense.com.
Google Book Search
Soon as e-book and in a bookstore near you!

Update on Jan. 22, 2008:
The proceedings book is now available through our publisher Trafford Publishing. Please follow this link to order.

We are ordering copies for shipment to all registered delegates of SIN Conf 2007. As soon as the books arrive we'll airmail them to participants' addresses. However, this will take time.

Copies of the proceeding will be available through online and conventional book sale channels soon.

Update on Dec. 11th, 2007:
Draft print of the proceedings book has just been shipped by the publisher. We're going to verify once recieved and if all are OK, then actual printing will be ordered. This is likely to task place in January 2008.

The SIN 2007 Proceeding is being prepared for publication in hardcopy and e-book formats by Trafford Publishing, Canada. The registrants of SIN 2007 will be send a hardcopy free-of-charge by the Conference Management; this is likely to be during January-February 2008. Both the hardcopy and the e-book media will become available for bulk/individual purchase through Trafford and major book channels starting January 2008.

Reference data of the proceeding is as follows:
Atilla ELCI, S. Berna ORS, and Bart PRENEEL (Editors). 2008. Security of Information and Networks, Proc. First International Conference on Security of Information and Networks (SIN 2007), Gazimagusa, TRNC, May 2007, Trafford Publishing, IX+370 pages, ISBN: 978-1-4251-4109-7.

The Table of Contents is as follows:

Table of Contents

Keynote Speech

Power Analysis Attacks—A Very Brief Introduction…………………………………           1

Elisabeth Oswald

On White-Box Cryptography…………………...…………………………………..…                 7

Marc Joye

 

Ciphers

ECSC-128: New Stream Cipher Based on Elliptic Curve Discrete Logarithm

Problem………………………………………………………………………………                             13

Khaled Suwais, Azman Samsudin

Hardware Implementation of Elliptic Curve Cryptosystem over GF(pm)………..    24

Ilker Yavuz, Berna Ors 

Secure Hill Cipher Modification SHC-M………………………………………….…                 34

A. G. Chefranov

Keyed Blind Multiresolution Watermarking Algorithm for Digital Images…………     38

Mahmoud Hassan, Sarah Alkuhlani, Wasan Talhouni and Laith Smadi

Covert Channel Communication in RFID……………………………………………                47

Md. Sadek Ferdous, Farida Chowdhury

Privacy-Preserving Decision Tree Classification in Horizontal Collaboration….…   53

Justin Zhan

Generalization of Open Key Knapsack Cryptosystems……………………………...        58

V. O. Osipyan

 

Mobile Agents & Networks

Practical Public Key Solution in Mobile Ad Hoc Networks…………………………          64

Wen-Jung Hsin, Lein Harn

A Recursive Method for Validating and Improving Network Security

Solutions……………………………………………………………………………...                          74

Suleyman Kondakci

Secure Multiparty Overall Mean Computation via Oblivious Polynomial

Evaluation…………………………………………………………………………….                           84

Mert Φzarar, Attila Φzgit

Linear Approximations for 2-round Trivium…………...……………………………              96

Meltem Sφnmez Turan, Orhun Kara

A New Data Integrity Protection Model for Free Roaming Mobile Agents……       106

Marwa M. Essam, Mohamed A. El-Sharkawy, Mohamed S. Abdelwahab

Secure Global Connectivity for Mobile Ad hoc Networks…………………………          116

K. Ramanarayana, Lillykutty Jacob

Security Considerations for Residential Mode on ZigBee Network………………..     126

Lee-Chun Ko

 

Attacks, Intrusion Detection, and Security Recommendations

Success Rate of Reflection Attack on Some DES Variants………………………...      136

Esen Akkemik, Orhun Kara, Cevat Manap

Concurrency Issues in Rule-Based Network Intrusion Detection Systems.…      146

Mustafa Atakan, Cevat ener

The Use of the Google Search Engine for Accessing Private Information on
the World Wide Web…………………………………………………………………………...             151

Ahmet Gόrel, Erhan Basri, Yıltan Bitirim

DARIS: A Probabilistic Model for Dependency Analysis of Risks in Information

Security……………………………………………………………………………...                           162

Sόleyman Kondakηı

Improved Threat Modeling Process for Grids………………………………………              167

Mohammad Othman Nassar

Achieving Private SVD-based Recommendations on Inconsistently Masked

Data ...............................................................................................  172

Ibrahim Yakut, Huseyin Polat.

 

Keynote Speech

Micro-Architectural Side-Channel Attacks & Branch Prediction Attack...………   177

Ηetin Kaya Koη

 

Keynote Speech

Web Services Security: Protocols, Implementations, and Proofs………………       178

Karthik Bhargawan

 

Security Software, Performance, and Experience

The Performance Results of ECDSA Implementation on Different Coordinate

Systems……………………………………………………………………………                             179

Serap Atay

Remote Security Evaluation Agent for the RSEP Protocol………………………          186

Suleyman Kondakci

Test Case Generation for Firewall Implementation Testing using Software
Testing Techniques………………………………………………………………………….                196

Tugkan Tuglular

Performance Study of Secure IEEE 802.11g Networks…………………………….         204

Zeynep Gurkas Aydın, A.Halim Zaim, M.Ali Aydın

Configuration of Microsoft ISA Server 2004 and Linux Squid Server and
Evaluation of Some Security Tools…………………………………………………………….        209

Hedaya Alasooly

Personal Data Protection in Turkey: Technical and Managerial Controls……       220

Yalcin Cebi, Osman Okyar Tahaoglu

 

Access Control and Security Assurance

Integrating Security Assurance within the (Rational) Unified Process……………    228

Mohammad Reza Razzazi, Yashar Heydari

Secure Communication and Access Control for Mobile Web Service

Provisioning………………………………………………………………………...                           238

Satish Srirama, Anton Naumenko

Creating Application Security Layer Based on Resource Access Decision

Service………………………………………………………………………………                             248

Mehmet Φzer Metin, Cevat ener, Yenal Gφğebakan

More Secure Authentication using Multiple Servers (MSAMS)…………………...      258

Belgin Bilgin, Ibrahim Soğukpınar.

 

Keynote Speech

Research Challenges in Cryptology………………………………………………...                268

Bart Preneel

 

Security Software, Performance, and Experience

On NTRU and Its Performance……………………………………………………..                   273

Ali Mersin, Mutlu Beyazıt

Establishing the ISMS at Tusas Aerospace Industries Inc. –TAI: Experiences and

Recommendations……………......…………….....…………….....…….............….           285

Bilge Yigit

A Memory Management Model for Cryptographic Software Libraries……………     292

Ali Mersin, Mutlu Beyazıt

Information Security Policy: Positioning the Technological Components of

Information Security Services under the Perspective of Electronic Business ... 302

Kaan Kurtel

 

Access Control and Security Assurance

Applying ParseKey+ as a New Multi-Way Client and Server Authentication

Approach to Resolve Imperfect Counter Utilization in IEEE802.11i for
Impersonation Avoidance…………………………………………………………………………...       308

Behnam Rahnama, Atilla Elci

Centralized Role-Based Access Control (RBAC) Framework for Critical Web

Applications………………………………………………………………….……...                          321

Alireza Goudarzi

Enforcing Security & Privacy Measures on Semantic Networks……………….…..     328

Pooyan Balouchian, Marjaneh Safaei, Alireza Goudarzi

Simple Data Sharing Security Model Based On MLS ..……………………….…...         336

Muhammad Reza Fatemi, Shima Izadpanahi, Kiavash Bahreini

Examining the Resistance of the Developed Program Using LSB Methods Called

Stego_LSB against RS Steganalysis…………………………………………….…..                341

Andac Sahin, Ercan Bulus, M.Tolga Sakallı, H.Nusret Bulus

 

Keynote Speech

Secure Routing in Ad Hoc Networks and Model Checking………………………..         346

Mehmet Ufuk Ηağlayan

 

Author Index……………………………………………………………………….                          370