Paper ID | Title | Primary Contact Author | Status |
---|---|---|---|
1 | Collusion Resistant Fingerprinting of Digital Audio | Tirkel, Andrew | Regular paper |
2 | Using Decision Trees for Generating Adaptive SPIT Signatures | Nassar, Mohamed | Regular paper |
9 | Cryptanalysis of the Stream Cipher BEAN | Ågren, Martin | Regular paper |
10 | Corporate networks security evaluation based on attack graphs | ABRAMOV, Evgeny | Regular paper |
14 | Echo Hiding Based Stereo Audio Watermarking Against Pitch-Scaling Attacks | Natgunanathan, Iynkaran | Regular paper |
15 | The Optimal Linear Multi-Secret Sharing Scheme for Non-Threshold Access Structure(Student Contribution) | Tang, Chunming | Regular paper |
17 | Rational distance-bounding protocols over noisy channels | Nguyen, Long | Regular paper |
24 | Algebraic analysis of GOST encryption algorithm | Maro, Ekaterina | Regular paper |
26 | Fault Attack to the Elliptic Curve Digital Signature Algorithm with Multiple Bit Faults | Pelosi, Gerardo | Regular paper |
27 | Trust based Fusion over Noisy Channels through Anomaly Detection in Cognitive Radio Networks | Bhattacharjee, Shameek | Regular paper |
31 | On Automatic Detection of SQL Injection Attacks by the Feature Extraction of the Single Character | Sonoda, Michio | Regular paper |
33 | Logic Based Authorization Program and Its implementation | Ruan, Chun | Regular paper |
35 | Algebraic Attacks on BEAN a lightweight Stream Cipher | Pillai, Rajesh | Regular paper |
36 | Security Analysis of a Femtocell device | Borgaonkar, Ravishankar | Regular paper |
37 | Deploying secure satellite networks | Fritsche, Wolfgang | Regular paper |
40 | Dynamic Rule and Rule-Field optimization for Improving Firewall Performance and Security | Trabelsi, Zouheir | Regular paper |
42 | A Model-Based Attack Injection Approach for Security Validation | Morais, Anderson | Regular paper |
44 | Detection of Neighbor Solicitation and Advertisement Spoofing in IPv6 Neighbor Discovery Protocol | Biswas, Santosh | Regular paper |
45 | Counteracting DDoS Attacks in WLAN | Tupakula, Udaya | Regular paper |
49 | A Secure and Anonymous Cooperative Sensing Protocol for Cognitive Radio Networks | Rifa-Pous, Helena | Regular paper |
60 | A HTTP Cookie Covert Channel | Yuan, Bo | Regular paper |
62 | Detour Attack In OLSR | Gaur, Manoj | Regular paper |
64 | Exploration of a Hand-based Graphical Password Scheme | Gao, Haichang | Regular paper |
65 | A Sybil Attack Detection Approach using Neighboring Vehicles in VANET | Laxmi, Vijay | Regular paper |
66 | Model checking security policy model using both UML static and dynamic diagrams | Cheng, Liang | Regular paper |
70 | TW-KEAP: An Efficient Four-Party Key Exchange Protocol for End-to-End Communications | Chiang, Wei-Kuo | Regular paper |
71 | Secure Random Number Generation in Wireless Sensor Networks | Milazzo, Fabrizio | Regular paper |
91 | Improving Operation Time Bounded Mission Critical Systems’ Attack-Survivability through Controlled Source-Code Transformation | Vignaux, Alban | Regular paper |
97 | A different algebraic analysis on ZUC stream cipher | ALMashrafi, Mufeed | Regular paper |
20 | On the Security and Practicality of a Buyer Seller Watermarking Protocol for DRM | Poh, Geong Sen | Fast Abstract |
25 | Proposal and Implementation of Enhanced Authentication that Enables Self-Wipe | Guo, Zhaogong | Fast Abstract |
48 | piMANET - A Policy Integrated Security Framework for Mobile Ad Hoc Network | Ghosh, Soumya | Fast Abstract |
98 | Microcontroller-Based Implementation of parseKey+ for Limited Resources Embedded Applications | Rahnama, Behnam | Fast Abstract |
4 | DIFFERENT MODELS OF INFORMATION PROTECTION SYSTEM, BASED ON THE FUNCTIONAL KNAPSACK | Osipyan, Valeriy | Position Paper |
102 | Obscurity of Network Security Course Curriculum | Kondakci, Suleyman | Position Paper |
106 | Counterfactually Reasoning About Security | Peralta, Manuel | Position Paper |
5 | Improved Joint Perceptual Encryption and Watermarking Scheme (IJPEW) For JPEG Images | KHAN, Muhammad Imran | Short Paper |
12 | A Proposed Watermarking Technique in Transform Domain | Hasija, Mansi | Short Paper |
28 | Acceleration of Packet Filtering using GPGPU | Gaur, Manoj | Short Paper |
39 | Formal Analysis of Usage Control Policies. | OUCHENNE, Boulares | Short Paper |
41 | Multilevel Early Packet Filtering Technique based on Traffic Statistics and Splay trees for Firewall Performance Improvement | Trabelsi, Zouheir | Short Paper |
56 | Extending the scope of CardSpace | Al-Sinani, Haitham | Short Paper |
61 | Towards Hiding Federated Digital Identity: Stop-Dissemination Mechanism in Content Centric Internetworking | Abidi, Amine | Short Paper |
94 | WinSEND: Windows SEcure Neighbor Discovery | Alsa'deh, Ahmad | Short Paper |
105 | Towards Intelligent Systems Capable of Information Assurance and Security Related Risk Management | Marbukh, Vladimir | Short Paper |
109 | Research on Survivability Metrics Based on Survivable Process of Network System | Ming, Liang | Short Paper |
18 | Algebraic analysis of the SSS stream cipher | ALMashrafi, Mufeed | Student Paper |
54 | An approach to enhance the security of remote health monitoring systems | Elkhodr, Mahmoud | Student Paper |
96 | On the Impacts of Join and Leave on the Propagation Ratio of Topology-Aware Active Worms (Student Contribution) | Abdollahi Azgomi, Mohammad | Student Paper |