Program
| 
					
					
					S | SIN 2009 | |
| 
					
					
					Program for the 2nd International Conference on 
					Security of Information and Networks 
					
					
					Intelligent Systems for  | ||
| 2nd International Conference on Security of Information and Networks | ||
| 
 6 – 10 October 2009 
					
					
					 | In cooperation with 
					 | |
| 
 | ORGANIZED BY | 
 | 
| 
						 | 
						 | 
						 | 
| 
						
						Dept. of Computer Engineering | Dept. of Security of Information Technologies, South-Russian Regional Scientific-Educational Center for Information Security Problems, Southern Federal University, Taganrog, Rostov, Russia | 
						
						Information and Networked Systems Security (INSS) & The 
						Intelligent Systems Group ( ISG), Dept. of Computing | 
| 
 | 
 | 
 | 
| 
 | HOSTED BY | 
 | 
| 
 | 
						 | 
						 | 
| 
 | 
						
						Dept. of Computer Engineering | 
						
						Internet Technologies Research Center (ITRC) | 
			
			FUTURE CONFERENCES IN THE SERIES
			SECURITY OF INFORMATION AND NETWORKS 
SIN 2010: Taganrog, Rostov, Russia
SIN 2011: NSW, Australia
Visit www.sinconf.org for information
			
			
			
			
			
			
			Wednesday, October 7, 2009
Salamis Bay Conti Resort Hotel
9:00 – 13:00
			
			
			Tutorial: Security of Next Generation Networks
			Tutor: 
			Serap Atay 
			(IPSC, Joint Research Center, Italy)
			Location: St. Barnabas
			Coffee break at 10:30
			
 
13:30 – 18:00
Parallel sessions, coffee break at 15:00
			
			
			Tutorial: Statistical Approaches for Network Anomaly Detection
			Tutor: 
			Christian Callegari (University of Pisa, Pisa, Italy) 
			Location: St. Barnabas
			
			
			Tutorial: Secrets of Reverse Engineering Software
			Tutor: 
			Khaled H. Salah (King Fahd University of Petroleum and Minerals (KFUPM), 
			Dhahran, Saudi Arabia)
			Location: Kantara
			
 
19:00 – 21:00
			
			
			Session: Technopark Reception
			Session 
			Chair: Suha Bayindir 
			(GMTGB Gazimagusa 
			Technopark, North Cyprus)
			
			Location: Amphi @GMTGB Teknopark
Invited Talks:
			
			·       
			
			
			Research and Education Activities of the Department of Security of 
			Information Technologies of Taganrog Institute of Technology of the 
			Southern Federal University in the Field of Information Security
			Oleg 
			Makarevich, 
			Lyudmila 
			Babenko (Southern Federal University, Russia)
			
			·       
			
			
			Security challenges for an education, training and experimentation 
			cloud
			Erdal 
			Çayırcı (NATO Joint Warfare Center & University of 
			Stavanger)
			
			Performance by Eliz 
			Fellahoğlu
 
Thursday, October 8, 2009
9:30 – 11:00
Opening Session
Presenter: Duygu Çelik (Eastern Mediterranean University, North Cyprus)
Location: Ball Room
Conference welcome: Atilla Elçi (Eastern Mediterranean University, North Cyprus)
Welcome remarks: Oleg Makarevich (Southern Federal University, Russia)
Welcome remarks: Mehmet Orgun (Macquarie University, Australia)
Opening remarks: Elisa Bertino (Chair, ACM SIGSAC, USA)
Inaugural speech: Ülker Vancı Osam (Rector, Eastern Mediterranean University, North Cyprus)
Musical performance: Aleksandr Zabolotkov (Eastern Mediterranean University, North Cyprus)
Keynote Speach:
Session Chair: Alexander Chefranov (Eastern Mediterranean University, North Cyprus)
			
			
			Assured Information Sharing — Concepts and Issues
			Elisa 
			Bertino (Purdue University, USA)
11:00 – 11:30 AM Break
11:30 – 13:00 Parallel Sessions
			
			
			Session SA.1: Security Assessment, Policies, and Educational 
			Programs
			Session 
			Chair: Yiltan Bitirim 
			(Eastern 
			Mediterranean University, North Cyprus)
			
Location: St. Barnabas
			
			·       
			
			
			The Method of Interval Estimation in Risk-Analysis System
			
			Vladimir M. 
			Shishkin (Russian Academy of Sciences), Sergey V. Savkov 
			(Saint-Petersburg State University)
			
			·       
			
			
			Pure E-Learning Course in Information Security
			Jukka 
			A. 
			Koskinen (Tampere University of Technology), Tomi O. Kelo 
			(Tampere University of Technology)
			
			·       
			
			
			Turkish National Electronic Identity Card
			Mücahit 
			Mutlugün, 
			Oktay Adalier 
			(TÜBİTAK UEKAE)
			
			Session SI.1: Security and Integrity Management and Models
			Session 
			Chair: Zeki Bayram 
			(Eastern 
			Mediterranean University, North Cyprus) 
Location: Kantara
			
			·       
			
			
			Ensuring Information Security Controls for the Russian Banking 
			Organizations
			Andrey 
			Kurilo (The Central Bank of Russia), 
			Natalia Miloslavskaya 
			(State University Moscow),
			
			Svetlana Tolstaya 
			(The Central Bank of Russia)
			
			·       
			
			
			Trace and Revoke Systems with Short Ciphertexts
			Lie Liu, Chun 
			Yuan (Tsinghua 
			University)
			
			·       
			
			
			A Model of Mandatory Access for Current Database Management Systems
			
			Alexandr S. 
			Basan, Lyudmila K. Babenko, Oleg B. Makarevich 
			(Southern Federal University, Russia)
			
			·       
			
			
			An Architectural Approach for Assessing System Trust Based on 
			Security Policy Specifications and Security Mechanisms
			Şerif 
			Bahtiyar, 
			Murat Cihan,
			
			Mehmet Ufuk 
			Çağlayan (Boğaziçi University)
13:45 – 14:45 Parallel Sessions
			
			
			Session SA.2: Security Assessment, Policies, and Educational 
			Programs
			Session 
			Chair: Christian Callegari 
			(University of 
			Pisa, Italy)
			
			Location: St. Barnabas
			
			·       
			
			
			Improving Risk Assessment Methodology: A Statistical Design of 
			Experiments Approach
			Anand 
			Singh, 
			David Lilja 
			(University of Minnesota)
			
			·       
			
			
			Modeling Network Security Competence for Certification
			Tomi O. 
			Kelo, Jukka A. Koskinen (Tampere University of Technology)
			
			
			Session SI.2: Security and Integrity Management and Models
			Session 
			Chair: Erden Başar 
			(Eastern 
			Mediterranean University, North Cyprus)
			Location: Kantara
			
			·       
			
			
			A Secure Architecture for P2PSIP-based Communication Systems
			
			Xianghan Zheng, 
			Vladimir 
			Oleshchuk 
			(University of Agder)
			
			·       
			
			
			A UML Profile for Role-Based Access Control
			Çağdaş 
			Cirit (National Research Institute of Electronics and 
			Cryptology),
			
			Feza Buzluca 
			(Istanbul Technical University)
14:45 – 15:15 PM Break
15:15 – 16:45 Parallel Sessions
			
			
			Session SA.3: Security Assessment, Policies, and Educational 
			Programs
			Session 
			Chair: Elisa Bertino 
			(Purdue 
			University, USA)
			
			Location: St. Barnabas
			
			·       
			
			
			Adaptability Infrastructure for Bridging IT Security Evaluation and 
			Options Theory
			Haider 
			Abbas (Royal Institute of Technology, Sweden), 
			Louise Yngström 
			(Stockholm University),
			
			Ahmed Hemani 
			(Royal Institute of Technology, Sweden)
			
			·       
			
			
			An Information Security Ontology Incorporating Human-Behavioural 
			Implications
			Simon 
			E. Parkin,
			Aad van Moorsel (Newcastle University), Robert Coles 
			(Merrill Lynch Europe Limited)
			
			
			Session SI.3: Security and Integrity Management and Models
			Session 
			Chair: Jukka Koskinen 
			(Tampere 
			University of Technology, Finland)
			
			Location: Kantara
			
			·       
			
			
			Information Security Incident Management Process
			Anna 
			Kostina, 
			Natalia 
			Miloslavskaya, 
			Alexander Tolstoy
			
			(The Moscow Engineering Physics Institute (State University))
			
			·       
			
			
			XML-Based Policy Specification Framework for Spatiotemporal Access 
			Control
			Samrat 
			Mondal, 
			Shamik Sural 
			(Indian Institute of Technology, Kharagpur)
			
			·       
			
			
			Falcovis: Data Security in Communication 
			
			Nurhak Kaya (Falcovis, North Cyprus)
17:00 – 18:00
SIN 2010 Organization Meeting
Location: St. Barnabas
All are welcome.
19:00 – 21:00
			
			
			Conference Reception
			
			Location: Turkuaz, Salamis Bay Conti Resort Hotel
			
			Folk dance 
			performance
Friday, October 9, 2009
8:30 – 9:30
			
			
			Keynote 2 Session
			Session 
			Chair: Oleg Makarevich 
			(Southern Federal 
			University, Russia)
			
			Location: Ball Room
			
			·       
			
			
			Deployed Sensor Networks and Their Security Challenges in Practice
			Erdal 
			Çayırcı (NATO Joint Warfare Center & University of 
			Stavanger)
9:30 – 10:30 Parallel Sessions
			
			
			Session CS.1: Cryptography, Security, and Networks
			Session 
			Chair: Erdal Çayırcı 
			(NATO JWC & 
			University of Stavanger, Norway)
			
			Location: St. Barnabas
			
			·       
			
			
			The Hush Cryptosystem
			Sari 
			Haj Hussein (Chalmers University of Technology)
			
			·       
			
			
			Design of a Zigbee-Based RFID Network for Industry Applications
			Sumi M (University of Calicut - India), 
			Ebrahim A. Soujeri (European University of Lefke), 
			Rahim Rajan (Babha Atomic Research Centre), Harikrishnan A. I 
			(University of Calicut)
			
			·       
			
			
			A Scalable Multi-Core Aware Software Architecture for 
			High-Performance Network Monitoring
			Mahdi 
			Dashtbozorgi,
			
			Mohammad Abdollahi Azgomi (Iran University of Science and Technology)
			
			
			Session AI.1: Attacks and Intrusion Detection
			Session 
			Chair: Vadim Kotov 
			(Ural State 
			Aviation Technology University, Russia)
			
			Location: Kantara
			
			·       
			
			
			A Simple Yet Effective Spam Blocking Method
			Gokhan 
			Dalkilic, 
			Devrim Sipahi,
			
			Mehmet Hilal 
			Ozcanhan (Dokuz Eylul University)
			
			·       
			
			
			Resiliency of Open-Source Firewalls against Remote Discovery of 
			Last-Matching Rules
			Khaled 
			Salah (King Fahd University of Petroleum and Engineering),
			
			Karim Sattar 
			(King Fahd University of Petroleum and Minerals),
			
			Zubair Baig (King Fahd University of Petroleum and 
			Engineering),
			
			Mohammed Sqalli 
			(King Fahd University of Petroleum and Minerals), 
			Prasad Calyam (The Ohio State University)
			
			
			Session AC.1: Access Control and Security Assurance
			Session 
			Chair: Ahmet Ünveren 
			(Eastern 
			Mediterranean University, North Cyprus)
			
			Location: Akkule
			
			·       
			
			
			New Approach to Evaluate the Effectiveness of the Audio Information 
			Protection for Determining the Identity of Virtual Speech Images
			
			Vladimir Kotenko, 
			Alexey Evseev,
			
			Stas Kotenko, 
			Konstantin Rumjantsev 
			(South Federal University, Russia)
			
			·       
			
			
			Digital Sound Card Identification Based on Recording Path 
			Imperfections
			Dmitry 
			Rublev, 
			Vladimir 
			Fedorov,
			
			Oleg Makarevich, 
			Anatolij Chumachenko
			
			(Southern Federal University, Russia)
			
			·       
			
			
			AWGN Based Seed for Random Noise Generator in ParseKey+
			Atilla 
			Elçi, 
			Behnam Rahnama 
			(Eastern Mediterranean University)
			
			
			
			
			10:30 – 11:00  AM Break
11:00 – 12:00 Parallel Sessions
			
			
			Session CS.2: Cryptography, Security, and Networks
			Session 
			Chair: Sorin A. Huss 
			(Darmstadt 
			University, Germany)
			
			Location: St. Barnabas
			
			·       
			
			
			DFA-based and SIMD NFA-based Regular Expression Matching on Cell BE 
			for Fast Network Traffic Filtering
			Feodor 
			Kulishov (Moscow Engineering Physics Institute (State 
			University))
			
			·       
			
			
			TrueIP: Prevention of IP Spoofing Attacks Using Identity-Based 
			Cryptography
			
			Christian Schridde, 
			Matthew Smith,
			
			Bernd Freisleben (University of Marburg)
			
			
			Session AI.2: Attacks and Intrusion Detection
			Session 
			Chair: Lyudmila Babenko 
			(Southern Federal 
			University, Russia)
			
			Location: Kantara
			
			·       
			
			
			An Integrated Approach to Detect Phishing Mail Attacks: A Case Study
			R. 
			Suriya, K. 
			Saravanan,
			
			Arunkumar Thangavelu (VIT University)
			
			·       
			
			
			Trust Based Traffic Monitoring Approach for Preventing Denial of 
			Service Attacks
			
			Jayashree Padmanabhan, 
			Easwarakumar 
			K. S, Gokul 
			B,
			
			Harishankar S (Anna University Chennai)
			
			
			Session AC.2: Access Control and Security Assurance
			Session 
			Chair: Xianghan Zheng 
			(University of 
			Agder, Norway)
			
			Location: Akkule
			
			·       
			
			
			Pushing the Limits of One-time Signatures
			Kemal 
			Bicakci (TOBB University of Economics and Technology)
			
			·       
			
			
			A Semantic-based Access Control Mechanism Using Semantic 
			Technologies
			Moussa 
			Amir Ehsan,
			Morteza Amini, Rasool Jalili (Sharif University of 
			Technology)
12:00 – 13:00
			
			
			Keynote 3 Session
			Session 
			Chair: Derviş Deniz 
			(Eastern 
			Mediterranean University, North Cyprus)
			
			Location: Ball Room
			
			·       
			
			
			Embedded Systems for IT Security Applications: Properties and Design 
			Considerations
			Sorin 
			Alexander 
			Huss (Center for Advanced Security Research Darmstadt)
13:00 – 13:45 Lunch
13:45 – 14:45 Parallel Sessions
			
			
			Session CS.3: Cryptography, Security, and Networks
			Session 
			Chair: Feodor Kulishov 
			(Moscow 
			Engineering Physics Institute, Russia)
			
			Location: St. Barnabas
			
			·       
			
			
			Efficient, Secure, and Isolated Execution of Cryptographic 
			Algorithms on a Cryptographic Unit
			Kazim 
			Yumbul (Gebze Institute of Technology), 
			Erkay Savaş 
			(Sabanci University)
			
			·       
			
			
			Security Against DoS Attack in Mobile IP Communication
			Sazia 
			Parvin, 
			Shohrab Ali 
			(University of Dhaka), 
			Song Han,
			
			Tharam Dillon (Curtin University of Technology)
			
			
			Session AI.3: Attacks and Intrusion Detection
			Session 
			Chair: Kuldeep Singh 
			(UNIK, India)
			
			Location: Kantara
			
			·       
			
			
			Artificial Immune System Based Intrusion Detection System
			Vadim 
			D. Kotov,
			Vladimir I. Vasilyev (Ufa State Aviation Technical 
			University)
			
			·       
			
			
			Danger Theory Based SYN Flood Attack Detection in Autonomic Network
			Sanjay 
			Rawat, 
			Ashutosh 
			Saxena 
			(Infosys Technologies Ltd.)
			
			
			Session AC.3: Access Control and Security Assurance
			Session 
			Chair: Serap Atay 
			(IPSC, Joint 
			Research Center, Italy)
			
			Location: Akkule
			
			·       
			
			
			Extended Electronic Signature Policies
			Jorge 
			L. 
			Hernandez-Ardieta, Ana I. Gonzalez-Tablas, Benjamin 
			Ramos, Arturo Ribagorda 
			(University Carlos III of Madrid)
			
			·       
			
			
			Fortifying the Dalì Attack on Digital Signature
			
			Francesco Buccafurri, 
			Gianluca 
			Caminiti, 
			Gianluca Lax 
			(University of Reggio Calabria)
14:45 – 15:15 PM Break
15:15 – 17:00 Parallel Sessions
			
			
			Session CS.4: Cryptography, Security, and Networks
			Session 
			Chair: Muhammed Salamah 
			(Eastern 
			Mediterranean University, North Cyprus)
			
			Location: St. Barnabas
			
			·       
			
			
			Effective Pair-wise Key Establishment Scheme for Wireless Sensor 
			Networks
			
			Somanath Tripathy (Indian Institute of Technology Patna)
			
			·       
			
			
			Hill Cipher Modification Based on Eigenvalues HCM-EE
			Ahmed 
			Y. Mahmoud,
			Alexander G. Chefranov (Eastern Mediterranean University)
			
			·       
			
			
			BEAN - A Lightweight Stream Cipher
			Naveen 
			Kumar (University of Delhi), 
			ShriKant Ojha (Metcalfe House Delhi),
			
			Kritika Jain,
			
			Sangeeta Lal (University of Delhi)
			
			·       
			
			
			Secure Many to Many Routing for Wireless Sensor and Actuator 
			Networks
			Erdal 
			Cayirci, 
			Son T. Nguyen, Chunming Rong (University of 
			Stavanger)
			
			
			Session AI.4: Attacks and Intrusion Detection
			Session 
			Chair: Sanjay Rawat 
			(Infosys 
			Technologies, India)
			
			Location: Kantara
			
			·       
			
			
			Spam Filter Optimality Based on Signal Detection Theory
			Singh 
			Kuldeep (University Graduate Center (UNIK) & NTNU, Norway, 
			HUT, Finland),
			
			Jøsang Audun 
			(University Graduate Center (UNIK), Norway; University of Oslo, 
			Norway & QUT, Australia),
			Md. 
			Sadek Ferdous (University Graduate Center (UNIK) Norway; NTNU, Norway & University of 
			Tartu, Estonia), 
			Ravishankar Borgaonkar (University Graduate Center (UNIK), Norway; HUT, Finland; KTH, Sweden)
			
			·       
			
			
			Static CFG Analyzer for Metamorphic Malware Code
			Vinod 
			P., 
			Vijay Laxmi,
			
			Manoj S. 
			Gaur, G. V. S. S. Phani Kumar, Yadvendra S. Chundawat
			
			(Malaviaya National Institute of Technology)
			
			·       
			
			
			Application of Artificial Neural Network in Detection of DOS Attacks
			
			Iftikhar Ahmad, 
			Azween B. Abdullah (Universiti Teknologi Petronas), 
			Abdullah S. Alghamdi (King Saud University)
			
			
			Session AC.4: Access Control and Security Assurance
			Session 
			Chair: Khaled Salah 
			(KFUPM, Saudi 
			Arabia)
			
			Location: Akkule
			
			·       
			
			
			An Efficient and Secure Protocol for DTV Broadcasts
			
			Ashutosh Saxena (Infosys Technologies Ltd.)
			
			·       
			
			
			Weakening the Dolev-Yao Model Through Probability
			
			Riccardo Bresciani, 
			Andrew 
			Butterfield (Trinity College Dublin)
			
			·       
			
			
			Buyer Seller Watermarking Protocol for Digital Rights Management
			Vijay 
			Laxmi, 
			Mudassar N. Khan, Sarath S. Kumar, Manoj Singh Gaur
			
			(Malaviaya National Institute of Technology)
19:00 – 21:00
			
			
			Banquet (Microsoft TR), Awards, Closing
			Location: Salamis Bay Conti Resort Hotel
SIN 2009 Conference Organization
Conference Chair: Atilla Elci (Eastern Mediterranean U, North Cyprus)
Conference Co-Chair: Mehmet Orgun (Macquarie U, Australia)
Conference Co-Chair: Oleg Makarevich (SFU, Russia)
			Steering Committee Members:
Alexander Ivanovich SUKHINOV (Southern Federal U, Russia)
Bülent Örencik (TUBITAK Marmara Research Center, Turkey)
Bart Preneel (Katholieke U Leuven, Belgium)
Hasan Kömürcügil (Eastern Mediterranean U, North Cyprus)
Elisa Bertino (Purdue U, & ACM SIGSAC, USA)
Suha Bayindir (Eastern Mediterranean U, and Teknopark, North Cyprus)
Dervis Deniz (Eastern Mediterranean U, North Cyprus)
Program Chair: Alexander Chefranov (Eastern Mediterranean U, North Cyprus)
Program Co-Chair: Josef Pieprzyk (Macquarie U, Australia)
Program Co-Chair: Yuri Anatolievich BRYUKHOMITSKY (SFU, Russia)
Program Co-Chair: Siddika Berna Ors (ITU, Turkey)
Tutorials Chair: Ahmet Unveren (Eastern Mediterranean U, North Cyprus)
Tutorials Co-Chair: Christophe Doche (Macquarie U, Australia)
Tutorials Co-Chair: Anatoly Malyuk (MEPhI, Russia)
Workshops Chair: Ahmet Hasan Koltuksuz (IIT, Turkey)
Workshops Co-Chair: Alexander Yurievich DOBRODEEV (Sistemprom,Russia)
Workshops Co-Chair: Rajan Shankaran (Macquarie U, Australia)
Workshops Co-Chair: Duygu Çelik (Eastern Mediterranean U, North Cyprus)
Treasurer: Muhammad Salamah (Eastern Mediterranean U, North Cyprus)
Finance Co-Chair: Michael Hitchens (Macquarie U, Australia)
Registration Chair: Zafer Erenel (Eastern Mediterranean U, North Cyprus)
Registration Chair: Alev Elçi (Eastern Mediterranean U, North Cyprus)
Registration Onsite Team (Minas Turizm, North Cyprus)
Local Arrangements Chair: Yiltan Bitirim (Eastern Mediterranean U, North Cyprus)
e-Presence Chair: Behnam Rahnama (Eastern Mediterranean U, North Cyprus)
Volunteers Team: ACM & IEEE CS EMU Student Chapters, Computer Club, Robotics Club (Eastern Mediterranean U, North Cyprus)
Promotion Chair: Zeki Bayram (Eastern Mediterranean U, North Cyprus)
Promotion Co-Chair: Yi Mu (U of Wollongong, Australia)
Promotion Co-Chair: Evgeny Panchenko (Kordon Ltd, Russia)
Promotion Co-Chair: Ahmed Y. Mahmoud (Eastern Mediterranean U, North Cyprus)
International Program Committee
Khalil A. ABUOSBA, University of Ontario Institute of Technology (UOIT), Canada
Sheikh Iqbal AHAMED, Marquette U., USA
Ersan AKYILDIZ, METU, Turkey
Fatih ALAGÖZ, Bogazici University, Turkey
Taner ALTINOK, Defense Sciences Institute, Military Academy, Turkey
Kubilay ATASU, IBM Zürich Research Laboratory, Switzerland
Serap ATAY, Izmir Institute of Technology, Turkey
Lyudmila Klimentyevna BABENKO, Federal U. of South Russia, Russia
Yuri Vladimirovich BORODAKIY, Sistemprom, Moscow, Russia
Arkadiy B. BARSKIY, Moscow State U. of Transport Ways, Russia
Suha BAYINDIR, Eastern Mediterranean U., North Cyprus
Zeki BAYRAM, Eastern Mediterranean U., North Cyprus
Ayşe BENER, Bogazici U., Turkey
Jun BI, Tsinghua U., China
Müslim BOZYİĞİT, Middle East Technical U., Turkey
Mehmet Ufuk ÇAĞLAYAN, Bogazici U., Turkey
Jan CAPPAERT, Katholieke Universiteit Leuven, Belgium
Alexander CHEFRANOV, Eastern Mediterranean U. & ITRC, North Cyprus
Anton CHUVAKIN, LogLogic, USA
Danny De COCK, Katholieke U. Leuven, Belgium
Mina DENG, Katholieke Universiteit Leuven, Belgium
Tharam S. DILLON, U. of Technology, Sydney (UTS), Australia
Atilla ELÇİ, Eastern Mediterranean U., North Cyprus
Şaban EREN, Yasar U., Turkey
Rüyal ERGÜL, METU, Turkey
Ana Isabel Gonzlez-Tablas FERRERES, Universidad Carlos III de Madrid, Spain
Johann GROSCHDL, Graz University of Technology, Austria
Song HAN, Curtin U. of Technology, Australia
Selim HENDRICKSON, Izmir Institute of Technology, Turkey
Emmanuel HOOPER (Harvard-MIT-Yale University of London)
Edward HUMPHREYS, XiSEC and ISO/IEC SC27, UK
Sorin HUSS, Techniche U. Darmstadt, Germany
David HWANG, University of California, Los Angeles, USA
Zhen JIANG, West Chester University of Pennsylvania, USA
Hai JIN, Huazhong U. of Science and Technology, China
Tai-hoon KIM, Security Engineering Research Group (SERC), Korea
Il Seok KO, Dongguk U., Korea
Çetin Kaya KOÇ, Istanbul Commerce U., Turkey, & Oregon State U., USA
Ahmet Hasan KOLTUKSUZ, Izmir Institute of Technology, Turkey
Özgül KÜÇÜK, Katholieke U. Leuven, Belgium
Sefer KURNAZ, ASTIN- Air Force Academy, Turkey
Klaus KURSAWE, Phillips, The Nederlands
Geuk LEE, Hannam U. & SERC, Korea
Tiberiu S. LETIA, Technical U. of Cluj-Napoca, Romania
Albert LEVI, Sabanci U., Turkey
Chuchang LIU, DSTO, Australia
Robert MAIER, Katholieke Universiteit Leuven, Belgium
Oleg Borisovich MAKAREVICH, Federal U. of South Russia, Russia
Nele MENTENS, Katholieke Universiteit Leuven, Belgium
Jorge NAKAHARA, Universidade Catolica de Santos, Brazil
Svetla NIKOVA, Katholieke Universiteit Leuven, Belgium
Jose Antonio ONIEVA, U. de Málaga, Spain
Bülent ÖRENCİK, TUBITAK MAM, Turkey
Mehmet A. ORGUN, Macquarie U., Australia
Valeriy O. OSIPYAN, Kuban State U., Russia
Elisabeth OSWALD, Graz University of Technology, Austria
Attila ÖZGİT, Middle East Tech U., Turkey
Pascal PAILLIER, Gemalto, France
Josef PIEPRZYK, Macquarie U., Australia
Guangzhi QU, Oakland U., USA
Behnam RAHNAMA, Eastern Mediterranean University, North ,Cyprus
Vasant H. RAVAL, Creighton U., USA
Mesut RAZBONYALI, Maltepe U., Turkey
Alfonso Rodríguez RIOS, Universidad del Bío-Bío, Chile
Şeref SAĞIROĞLU, Gazi U., Turkey
Khaled SALAH, KFUPM, Saudi Arabia
Muhammed SALAMAH, Eastern Mediterranean U., North Cyprus
Erkay SAVAŞ, Sabanci University, Turkey
Ashutosh SAXENA, Infosys Technologies, India
Bruce SCHNEIER, BT Counterpane, USA
Siraj SHAIKH, United Nations U., Macau SAR China
Sushil K. SHARMA, Ball State University, USA
Dave SINGELEE, Katholieke U. Leuven, Belgium
Gennadiy Viasilyevich SLYUSAREV, North Caucasus State Technical U., Russia
Boris V. SOBOL, Don State Technical U., Russia
Eugene H. SPAFFORD, Purdue U., USA
Kaile SU, Sun Yat-Sen University, China
Cengiz TAVUKCUOĞLU, Defense Sciences Institute, Military Academy, Turkey
Dongvu TONIEN, CIS, TITRI, U. of Wollongong, Australia
Carmela TRONCOSO, Katholieke Universiteit Leuven, Belgium
Tuğkan TUĞLULAR, Izmir Institute of Technology, Turkey
Ion TUTANESCU, U. of Pitesti, Romania
Ahmet ÜNVEREN, Eastern Mediterranean U., North Cyprus
Vladimir I. VASILYEV, Ural State Aviation Technology U., Russia
Huaxiong WANG, Nanyang Technological U., Singapore
Dai WATANABE, Hitachi, Japan
Edgar WEIPPL, Security Research, Austria
Carlos Becker WESTPHALL, Federal University of Santa Catarina, Brasil
Thomas WOLLINGER, escrypt GmbH - Embedded Security, Germany
Karel WOUTERS, Katholieke Universiteit Leuven, Belgium
Shaoen WU, ADTRAN Inc., USA
Brecht WYSEUR, Katholieke Universiteit Leuven, Belgium
Sıddıka Berna Örs YALÇIN, Istanbul Technical U., Turkey
Wei YAN, Trend Micro, USA
Mohammad ZULKERNINE, Queens U., Canada
			
 
| 
 | SPONSORS | 
 | 
| 
						 | 
						 | 
						 | 
| 
						
						 | 
						 | 
						 | 
| 
						 | 
 | 
						 | 
| 
 | 
 | 
 | 
| 
 | IN COOPERATION WITH: | 
						 | 
| 
 | 
 | 
 | 
| 
 | SUPPORTERS | 
 | 
| 
						
						 | 
						
						 | 
						
						 | 
| 
						
						 | 
						
						 | 
						
						 | 
| 
						
						 | 
 | 
						
						 | 
| 
 | Design and cover picture by Atilla Elçi | 

















