Accepted Papers

Paper ID Paper Title Author Names Subject Areas
2 LAP: A Lightweight Authentication Protocol for Smart Dust Wireless Sensor Networks Saeid Pourroostaei Ardakani*, IUST
Mohsen Sharifi, iust
Saeed Sedighian kashi, iust
Cryptographic techniques and key management
Network security and protocols*
4 Information Security Incident Management Process Kostina Anna, The MEPhI (State University)
Natalia Miloslavskaya*, The MEPhI (State University)
Tolstoy Alexander, The MEPhI (State University)
Security in information systems
Security ontology, models, protocols & policies
Standards, guidelines and certification*
5 Ensuring Information Security Controls for the Russian Banking Organizations Kurilo Andrey, The Central Bank of Russia
Natalia Miloslavskaya*, The MEPhI (State University)
Tolstaya Svetlana, The Central Bank of Russia
Security in information systems
Security ontology, models, protocols & policies
Standards, guidelines and certification*
7 Trace and Revoke Systems with Short Ciphertexts Lie Liu*, Tsinghua University
Chun Yuan, Tsinghua University
Cryptographic techniques and key management*
Security in information systems
9 Pushing the Limits of One-time Signatures Kemal Bicakci*, TOBB ETU Cryptographic techniques and key management*
Network security and protocols
15 The Hush Cryptosystem Sari Haj Hussein*, Tishreen University Cryptographic techniques and key management
Security in information systems*
21 Effective Pair-wise Key Establishment Scheme for Wireless Sensor Networks Somanath Tripathy*, Indian institute of technology Cryptographic techniques and key management*
Network security and protocols
Security in information systems
22 A SIMPLE YET EFFECTIVE SPAM BLOCKING METHOD  GOKHAN DALKILIC*, Dokuz Eylul University
Devrim Sipahi,
Mehmet Ozcanhan, 
None of the above*
23 The method of interval estimation in risk-analysis system Vladimir Shishkin*, SPIIRAS
Sergey Savkov, SPbSUITMO
Information assurance
Security in information systems*
25 A model of mandatory access for current database management systems Alexander Basan*, Southern Federal University
Lyudmila  BABENKO, Federal University of South Russia, Russia.
Oleg Makarevich, Southern Federal University
Access control and intrusion detection*
Security in information systems
26 On The Untraceability of An Anonymous RFID Authentication Protocol with Constant Key-Lookup Bing LIANG*, SIS, SMU,Singapore
Changshe Ma,
Tieyan Li,
Yingjiu Li,
Robert Deng, 
Network security and protocols*
30 A UML Profile for Role-Based Access Control Çağdaş Cirit*, TUBITAK UEKAE
Feza Buzluca, Istanbul Technical University
Access control and intrusion detection
Security tools and development platforms*
Security ontology, models, protocols & policies
34 DFA-based and SIMD NFA-based Regular Expression Matching on Cell BE for Fast Network Traffic Filtering Feodor Kulishov*, MEPhI Access control and intrusion detection
Network security and protocols*
35 New approach to evaluate the effectiveness of the audio information protection for determining the identity of virtual speech images Vladimir Kotenko, South Federal University
Konstantin Rumjantsev, South Federal University
Aleksey Evseev*, South Federal University
Stas Kotenko, South Federal University
Access control and intrusion detection
Cryptographic techniques and key management*
Security in information systems
Security tools and development platforms
Security ontology, models, protocols & policies
37 An Architectural Approach for Assessing System Trust Based on Security Policy Specifications and Security Mechanisms Serif Bahtiyar*, Bogazici University
Murat Cihan, Bogazici University
Mehmet  CAGLAYAN, Bogazi�i U., Turkey
Information assurance*
Security in information systems
Autonomous and adaptive security
40 An Integrated Approach to detect phishing mail attacks A Case Study Kannan Saravanan*, VITU
Arunkumar Thangavelu, VIT
R Suriya, VIT
Access control and intrusion detection*
Security tools and development platforms
41 A Semantic-based Access Control Mechanism Using Semantic Technologies Moussa Ehsan*, Sharif Network Security Center
Morteza Amini, Sharif Network Security Center
Rasool Jalili, Sharif Network Security Center
Access control and intrusion detection
Security ontology, models, protocols & policies*
Secure ontology-based systems
42 Digital sound card identification based on recording path imperfections Dmitry Rublev*, Federal University of South Russia, Russia
Oleg Makarevich, Federal University of South Russia, Russia
Anatolij Chumachenko, Federal University of South Russia, Russia
Vladimir Fedorov, TI SFU
Security in information systems*
Security tools and development platforms
44 Extended Electronic Signature Policies Jorge Hernandez-Ardieta*, Univ. Carlos III of Madrid
Ana Isabel  FERRERES, Universidad Carlos III de Madrid, Spain
Benjamin Ramos, Univ. Carlos III of Madrid
Arturo Ribagorda, University Carlos III of Madrid
Security in information systems
Security ontology, models, protocols & policies
Standards, guidelines and certification*
46 A Secure Architecture for P2PSIP-based Communication Systems Xianghan Zheng*, UIA
Vladimir Oleshchuk, 
Security ontology, models, protocols & policies*
Secure ontology-based systems
47 TrueIP: Prevention of IP Spoofing Attacks Using Identity-Based Cryptography Christian Schridde*, University of Marburg
Matthew Smith, University of Marburg
Bernd Freisleben, University of Marburg
Cryptographic techniques and key management
Network security and protocols*
48 Hill Cipher Modification Based on Eigenvalues HCM-EE Ahmed Mahmoud*, EMU, CMPE
Alexander CHEFRANOV, Eastern Mediterranean U., TRNC
Cryptographic techniques and key management*
Security in information systems
50 Improving Risk Assessment Methodology: A Statistical Design of Experiments Approach Anand Singh*, Target Corporation
David Lilja, University of Minnesota
Information assurance*
Security in information systems
51 Functional model of information security management Irina Mashkina*, USATU
Vera Mordovina, USATU
Security in information systems*
52 Modeling Network Security Competence for Certification Tomi Kelo*, Tampere University of Tech.
Jukka Koskinen, Tampere University of Technology
Network security and protocols
Security ontology, models, protocols & policies
Standards, guidelines and certification*
55 Securing Web Database by Using Cryptographic Protocol Om Prakash*, NIT Rourkela,Orissa Network security and protocols
Security ontology, models, protocols & policies*
56 Fortifying the Dali' Attack on Digital Signature Francesco Buccafurri*, University of Reggio Calabria
Gianluca Lax, University of Reggio Calabria
Gianluca Caminiti, University of Reggio Calabria
Information assurance*
Standards, guidelines and certification
57 Pure E-Learning Course in Information Security Tomi Kelo*, Tampere University of Tech.
Jukka Koskinen, Tampere University of Technology
None of the above*
Information assurance
Security in information systems
Security tools and development platforms
60 An Approach to the Implementation of the Anti-Phishing Tool for Phishing Websites Detection (APTIPWD)  Abdullah Alnajim*, Durham University
Malcolm Munro, Durham University
Access control and intrusion detection*
Security in information systems
67 XML-Based Policy Specification Framework for Spatiotemporal Access Control SAMRAT MONDAL, IIT KHARAGPUR
SHAMIK SURAL*, IIT KHARAGPUR
Access control and intrusion detection*
Security ontology, models, protocols & policies
74 Robust Damage Assessment for Corrupted Database Systems Based on Inter-Transaction Dependencies Ge Fu*, Computer school of HUST
Yingjiu Li, 
Access control and intrusion detection
Security tools and development platforms
Security ontology, models, protocols & policies*
75 ARTIFICIAL IMMUNE SYSTEMS BASED INTRUSION DETECTION SYSTEM Vadim Kotov*, USATU (Ufa)
Vladimir  VASILYEV, Ural State Aviation Technology University, Russia
Access control and intrusion detection*
Security in information systems
Autonomous and adaptive security
76 Compatibility Infrastructure for Bridging IT Security Evaluation and Options Theory Haider Abbas*, KTH Information assurance
Standards, guidelines and certification*
78 A Scalable Multi-Core Aware Software Architecture for High-Performance Network Monitoring Mahdi Dashtbozorgi*, IUST
Mohammad Abdollahi Azgomi, IUST
Access control and intrusion detection
Security in information systems
Security tools and development platforms*
79 An efficient and secure protocol for DTV broadcasts Ashutosh  SAXENA*, Infosys Technologies, India Network security and protocols*
Security ontology, models, protocols & policies
84 Danger Theory Based SYN Flood Attack Detection in Autonomic Network Sanjay Rawat*, Infosys Technologies Ltd.
Ashutosh  SAXENA, Infosys Technologies, India
Network security and protocols
Security in information systems
Autonomous and adaptive security*
86 A Vulnerability Metric for Design Phase of Object Oriented Software Alka Agrawal*, B.B.A. University,Lucknow Information assurance
Security in information systems
Security tools and development platforms*
88 Efficient, Secure, and Isolated Execution of Cryptographic Algorithms on a Cryptographic Unit Erkay  SAVAS*, Sabanci University, Turkey
Kazim Yumbul, GYTE
Cryptographic techniques and key management*
89 Turkish National Electronic Identity Card Mücahit Mutlugün*, TÜBİTAK UEKAE
Oktay Adalıer, TÜBİTAK UEKAE
Cryptographic techniques and key management
Security in information systems*
90 An Information Security Ontology Incorporating Human-Behavioural Implications Simon Parkin*, Newcastle University
Aad Van Moorsel, Newcastle University
Security ontology, models, protocols & policies*
Secure ontology-based systems
Standards, guidelines and certification
91 Spam Filter Rationality Based on Signal Detection Theory Kuldeep Singh*, UNIK
Audun Jøsang, UNIK
Md. Sadek Ferdous, UNIK
Ravishankar Borgaonkar, UNIK
Security tools and development platforms*
93 Weakening The Dolev-Yao Model Through Probability Riccardo Bresciani*, Trinity College Dublin
Andrew Butterfield, Trinity College Dublin
Cryptographic techniques and key management
Network security and protocols*
94 Trust Based Traffic Monitoring Approach for Preventing Denial of Service Attacks Jayashree Padmanabhan*, Anna University, MIT
Easwarakumar K S, Anna University
Gokul  B,
Harishankar S, 
Access control and intrusion detection*
Network security and protocols
95 Security against DoS Attack in Mobile IP Communication Sazia Parvin*, University of Dhaka Network security and protocols*
Security ontology, models, protocols & policies
96 Static CFG Analyser for Metamorphic Malware Code Vinod P, MNIT, Jaipur, India
V Laxmi, MNIT, Jaipur, India
M Gaur*, MNIT
GVSS Phani Kumar, MNIT, Jaipur, India
Security tools and development platforms*
Autonomous and adaptive security
97 Buyer-Seller Watermarking Protocol for Digital Rights Management Mudassar Khan, MNIT, Jaipur, India
Sarath Kumar, MNIT, Jaipur, India
V Laxmi, MNIT, Jaipur, India
M Gaur*, MNIT
Information assurance
Security ontology, models, protocols & policies*
Standards, guidelines and certification
99 A LONGITUDINAL STUDY ON e-BANK TRUST Pedro Cruz*, ISG Business School None of the above*
Security in information systems
100 AWGN based Seed for Random Noise Generator in ParseKey+ Atilla ELCI, Eastern Mediterranean Univ.
Behnam Rahnama*, Eastern Mediterranean Univ.
Access control and intrusion detection
Cryptographic techniques and key management*
Network security and protocols
101 BEAN - A Lightweight Stream Cipher Kritika Jain*, DU
Sangeeta Lal, DU
Cryptographic techniques and key management*
103 Application of Artificial Neural Network in Detection of DOS Attacks Iftikhar Ahmad*, UTP
Azween Abdullah, Petronas
Abdullah Alghamdi
Access control and intrusion detection*
Network security and protocols
Security in information systems
105 Resiliency of Open-Source Firewalls against Remote Discovery of Last-Matching Rules Khaled SALAH*, KFUPM, Saudi Arabia
K. SATTAR, KFUPM, Saudi Arabia
Z. BAIG, KFUPM, Saudi Arabia
P. CALYAM, The Ohio State University
Access control and intrusion detection
Network security and protocols*
106 DESIGN OF A ZIGBEE-BASED RFID NETWORK FOR INDUSTRY APPLICATIONS Sumi HARIKRISHNAN, University of Calicut,India
Rahim RAJAN, Babha Atomic Research Centre, India
Ebrahim SOUJERI*, European University of Lefke
A. HARIKRISHNAN, University of Calicut,India
None of the above*
107 Privacy Preservation in k-Means Clustering by Cluster Rotation S.S.Shivaji Dhiraj*, NIT Warangal,India
Ameer Asif Khan,
Wajhiulla Khan,
Ajay Challagalla
Information assurance*
Security in information systems