Accepted Papers
Paper ID | Paper Title | Author Names | Subject Areas |
2 | LAP: A Lightweight Authentication Protocol for Smart Dust Wireless Sensor Networks |
Saeid Pourroostaei Ardakani*, IUST Mohsen Sharifi, iust Saeed Sedighian kashi, iust |
Cryptographic techniques and key management Network security and protocols* |
4 | Information Security Incident Management Process |
Kostina Anna, The MEPhI (State University) Natalia Miloslavskaya*, The MEPhI (State University) Tolstoy Alexander, The MEPhI (State University) |
Security in information systems Security ontology, models, protocols & policies Standards, guidelines and certification* |
5 | Ensuring Information Security Controls for the Russian Banking Organizations |
Kurilo Andrey, The Central Bank of Russia Natalia Miloslavskaya*, The MEPhI (State University) Tolstaya Svetlana, The Central Bank of Russia |
Security in information systems Security ontology, models, protocols & policies Standards, guidelines and certification* |
7 | Trace and Revoke Systems with Short Ciphertexts |
Lie Liu*, Tsinghua University Chun Yuan, Tsinghua University |
Cryptographic techniques and key management* Security in information systems |
9 | Pushing the Limits of One-time Signatures | Kemal Bicakci*, TOBB ETU |
Cryptographic techniques and key management* Network security and protocols |
15 | The Hush Cryptosystem | Sari Haj Hussein*, Tishreen University |
Cryptographic techniques and key management Security in information systems* |
21 | Effective Pair-wise Key Establishment Scheme for Wireless Sensor Networks | Somanath Tripathy*, Indian institute of technology |
Cryptographic techniques and key management* Network security and protocols Security in information systems |
22 | A SIMPLE YET EFFECTIVE SPAM BLOCKING METHOD |
GOKHAN DALKILIC*, Dokuz Eylul University Devrim Sipahi, Mehmet Ozcanhan, |
None of the above* |
23 | The method of interval estimation in risk-analysis system |
Vladimir Shishkin*, SPIIRAS Sergey Savkov, SPbSUITMO |
Information assurance Security in information systems* |
25 | A model of mandatory access for current database management systems |
Alexander Basan*, Southern Federal University Lyudmila BABENKO, Federal University of South Russia, Russia. Oleg Makarevich, Southern Federal University |
Access control and intrusion detection* Security in information systems |
26 | On The Untraceability of An Anonymous RFID Authentication Protocol with Constant Key-Lookup |
Bing LIANG*, SIS, SMU,Singapore Changshe Ma, Tieyan Li, Yingjiu Li, Robert Deng, |
Network security and protocols* |
30 | A UML Profile for Role-Based Access Control |
Çağdaş Cirit*, TUBITAK UEKAE Feza Buzluca, Istanbul Technical University |
Access control and intrusion detection Security tools and development platforms* Security ontology, models, protocols & policies |
34 | DFA-based and SIMD NFA-based Regular Expression Matching on Cell BE for Fast Network Traffic Filtering | Feodor Kulishov*, MEPhI |
Access control and intrusion detection Network security and protocols* |
35 | New approach to evaluate the effectiveness of the audio information protection for determining the identity of virtual speech images |
Vladimir Kotenko, South Federal University Konstantin Rumjantsev, South Federal University Aleksey Evseev*, South Federal University Stas Kotenko, South Federal University |
Access control and intrusion detection Cryptographic techniques and key management* Security in information systems Security tools and development platforms Security ontology, models, protocols & policies |
37 | An Architectural Approach for Assessing System Trust Based on Security Policy Specifications and Security Mechanisms |
Serif Bahtiyar*, Bogazici University Murat Cihan, Bogazici University Mehmet CAGLAYAN, Bogazi�i U., Turkey |
Information assurance* Security in information systems Autonomous and adaptive security |
40 | An Integrated Approach to detect phishing mail attacks A Case Study |
Kannan Saravanan*, VITU Arunkumar Thangavelu, VIT R Suriya, VIT |
Access control and intrusion detection* Security tools and development platforms |
41 | A Semantic-based Access Control Mechanism Using Semantic Technologies |
Moussa Ehsan*, Sharif Network Security Center Morteza Amini, Sharif Network Security Center Rasool Jalili, Sharif Network Security Center |
Access control and intrusion detection Security ontology, models, protocols & policies* Secure ontology-based systems |
42 | Digital sound card identification based on recording path imperfections |
Dmitry Rublev*, Federal University of South Russia, Russia Oleg Makarevich, Federal University of South Russia, Russia Anatolij Chumachenko, Federal University of South Russia, Russia Vladimir Fedorov, TI SFU |
Security in information systems* Security tools and development platforms |
44 | Extended Electronic Signature Policies |
Jorge Hernandez-Ardieta*, Univ. Carlos III of Madrid Ana Isabel FERRERES, Universidad Carlos III de Madrid, Spain Benjamin Ramos, Univ. Carlos III of Madrid Arturo Ribagorda, University Carlos III of Madrid |
Security in information systems Security ontology, models, protocols & policies Standards, guidelines and certification* |
46 | A Secure Architecture for P2PSIP-based Communication Systems |
Xianghan Zheng*, UIA Vladimir Oleshchuk, |
Security ontology, models, protocols & policies* Secure ontology-based systems |
47 | TrueIP: Prevention of IP Spoofing Attacks Using Identity-Based Cryptography |
Christian Schridde*, University of Marburg Matthew Smith, University of Marburg Bernd Freisleben, University of Marburg |
Cryptographic techniques and key management Network security and protocols* |
48 | Hill Cipher Modification Based on Eigenvalues HCM-EE |
Ahmed Mahmoud*, EMU, CMPE Alexander CHEFRANOV, Eastern Mediterranean U., TRNC |
Cryptographic techniques and key management* Security in information systems |
50 | Improving Risk Assessment Methodology: A Statistical Design of Experiments Approach |
Anand Singh*, Target Corporation David Lilja, University of Minnesota |
Information assurance* Security in information systems |
51 | Functional model of information security management |
Irina Mashkina*, USATU Vera Mordovina, USATU |
Security in information systems* |
52 | Modeling Network Security Competence for Certification |
Tomi Kelo*, Tampere University of Tech. Jukka Koskinen, Tampere University of Technology |
Network security and protocols Security ontology, models, protocols & policies Standards, guidelines and certification* |
55 | Securing Web Database by Using Cryptographic Protocol | Om Prakash*, NIT Rourkela,Orissa |
Network security and protocols Security ontology, models, protocols & policies* |
56 | Fortifying the Dali' Attack on Digital Signature |
Francesco Buccafurri*, University of Reggio Calabria Gianluca Lax, University of Reggio Calabria Gianluca Caminiti, University of Reggio Calabria |
Information assurance* Standards, guidelines and certification |
57 | Pure E-Learning Course in Information Security |
Tomi Kelo*, Tampere University of Tech. Jukka Koskinen, Tampere University of Technology |
None of the above* Information assurance Security in information systems Security tools and development platforms |
60 | An Approach to the Implementation of the Anti-Phishing Tool for Phishing Websites Detection (APTIPWD) |
Abdullah Alnajim*, Durham University Malcolm Munro, Durham University |
Access control and intrusion detection* Security in information systems |
67 | XML-Based Policy Specification Framework for Spatiotemporal Access Control |
SAMRAT MONDAL, IIT KHARAGPUR SHAMIK SURAL*, IIT KHARAGPUR |
Access control and intrusion detection* Security ontology, models, protocols & policies |
74 | Robust Damage Assessment for Corrupted Database Systems Based on Inter-Transaction Dependencies |
Ge Fu*, Computer school of HUST Yingjiu Li, |
Access control and intrusion detection Security tools and development platforms Security ontology, models, protocols & policies* |
75 | ARTIFICIAL IMMUNE SYSTEMS BASED INTRUSION DETECTION SYSTEM |
Vadim Kotov*, USATU (Ufa) Vladimir VASILYEV, Ural State Aviation Technology University, Russia |
Access control and intrusion detection* Security in information systems Autonomous and adaptive security |
76 | Compatibility Infrastructure for Bridging IT Security Evaluation and Options Theory | Haider Abbas*, KTH |
Information assurance Standards, guidelines and certification* |
78 | A Scalable Multi-Core Aware Software Architecture for High-Performance Network Monitoring |
Mahdi Dashtbozorgi*, IUST Mohammad Abdollahi Azgomi, IUST |
Access control and intrusion detection Security in information systems Security tools and development platforms* |
79 | An efficient and secure protocol for DTV broadcasts | Ashutosh SAXENA*, Infosys Technologies, India |
Network security and protocols* Security ontology, models, protocols & policies |
84 | Danger Theory Based SYN Flood Attack Detection in Autonomic Network |
Sanjay Rawat*, Infosys Technologies Ltd. Ashutosh SAXENA, Infosys Technologies, India |
Network security and protocols Security in information systems Autonomous and adaptive security* |
86 | A Vulnerability Metric for Design Phase of Object Oriented Software | Alka Agrawal*, B.B.A. University,Lucknow |
Information assurance Security in information systems Security tools and development platforms* |
88 | Efficient, Secure, and Isolated Execution of Cryptographic Algorithms on a Cryptographic Unit |
Erkay SAVAS*, Sabanci University, Turkey Kazim Yumbul, GYTE |
Cryptographic techniques and key management* |
89 | Turkish National Electronic Identity Card |
Mücahit Mutlugün*, TÜBİTAK UEKAE Oktay Adalıer, TÜBİTAK UEKAE |
Cryptographic techniques and key management Security in information systems* |
90 | An Information Security Ontology Incorporating Human-Behavioural Implications |
Simon Parkin*, Newcastle University Aad Van Moorsel, Newcastle University |
Security ontology, models, protocols & policies* Secure ontology-based systems Standards, guidelines and certification |
91 | Spam Filter Rationality Based on Signal Detection Theory |
Kuldeep Singh*, UNIK Audun Jøsang, UNIK Md. Sadek Ferdous, UNIK Ravishankar Borgaonkar, UNIK |
Security tools and development platforms* |
93 | Weakening The Dolev-Yao Model Through Probability |
Riccardo Bresciani*, Trinity College Dublin Andrew Butterfield, Trinity College Dublin |
Cryptographic techniques and key management Network security and protocols* |
94 | Trust Based Traffic Monitoring Approach for Preventing Denial of Service Attacks |
Jayashree Padmanabhan*, Anna University, MIT Easwarakumar K S, Anna University Gokul B, Harishankar S, |
Access control and intrusion detection* Network security and protocols |
95 | Security against DoS Attack in Mobile IP Communication | Sazia Parvin*, University of Dhaka |
Network security and protocols* Security ontology, models, protocols & policies |
96 | Static CFG Analyser for Metamorphic Malware Code |
Vinod P, MNIT, Jaipur, India V Laxmi, MNIT, Jaipur, India M Gaur*, MNIT GVSS Phani Kumar, MNIT, Jaipur, India |
Security tools and development platforms* Autonomous and adaptive security |
97 | Buyer-Seller Watermarking Protocol for Digital Rights Management |
Mudassar Khan, MNIT, Jaipur, India Sarath Kumar, MNIT, Jaipur, India V Laxmi, MNIT, Jaipur, India M Gaur*, MNIT |
Information assurance Security ontology, models, protocols & policies* Standards, guidelines and certification |
99 | A LONGITUDINAL STUDY ON e-BANK TRUST | Pedro Cruz*, ISG Business School |
None of the above* Security in information systems |
100 | AWGN based Seed for Random Noise Generator in ParseKey+ |
Atilla ELCI, Eastern Mediterranean Univ. Behnam Rahnama*, Eastern Mediterranean Univ. |
Access control and intrusion detection Cryptographic techniques and key management* Network security and protocols |
101 | BEAN - A Lightweight Stream Cipher |
Kritika Jain*, DU Sangeeta Lal, DU |
Cryptographic techniques and key management* |
103 | Application of Artificial Neural Network in Detection of DOS Attacks |
Iftikhar Ahmad*, UTP Azween Abdullah, Petronas Abdullah Alghamdi |
Access control and intrusion detection* Network security and protocols Security in information systems |
105 | Resiliency of Open-Source Firewalls against Remote Discovery of Last-Matching Rules |
Khaled SALAH*, KFUPM, Saudi Arabia K. SATTAR, KFUPM, Saudi Arabia Z. BAIG, KFUPM, Saudi Arabia P. CALYAM, The Ohio State University |
Access control and intrusion detection Network security and protocols* |
106 | DESIGN OF A ZIGBEE-BASED RFID NETWORK FOR INDUSTRY APPLICATIONS |
Sumi HARIKRISHNAN, University of Calicut,India Rahim RAJAN, Babha Atomic Research Centre, India Ebrahim SOUJERI*, European University of Lefke A. HARIKRISHNAN, University of Calicut,India |
None of the above* |
107 | Privacy Preservation in k-Means Clustering by Cluster Rotation |
S.S.Shivaji Dhiraj*, NIT Warangal,India Ameer Asif Khan, Wajhiulla Khan, Ajay Challagalla |
Information assurance* Security in information systems |