Accepted Papers
| Paper ID | Paper Title | Author Names | Subject Areas | 
| 2 | LAP: A Lightweight Authentication Protocol for Smart Dust Wireless Sensor Networks | Saeid Pourroostaei Ardakani*, IUST Mohsen Sharifi, iust Saeed Sedighian kashi, iust | Cryptographic techniques and key management Network security and protocols* | 
| 4 | Information Security Incident Management Process | Kostina Anna, The MEPhI (State University) Natalia Miloslavskaya*, The MEPhI (State University) Tolstoy Alexander, The MEPhI (State University) | Security in information systems Security ontology, models, protocols & policies Standards, guidelines and certification* | 
| 5 | Ensuring Information Security Controls for the Russian Banking Organizations | Kurilo Andrey, The Central Bank of Russia Natalia Miloslavskaya*, The MEPhI (State University) Tolstaya Svetlana, The Central Bank of Russia | Security in information systems Security ontology, models, protocols & policies Standards, guidelines and certification* | 
| 7 | Trace and Revoke Systems with Short Ciphertexts | Lie Liu*, Tsinghua University Chun Yuan, Tsinghua University | Cryptographic techniques and key management* Security in information systems | 
| 9 | Pushing the Limits of One-time Signatures | Kemal Bicakci*, TOBB ETU | Cryptographic techniques and key management* Network security and protocols | 
| 15 | The Hush Cryptosystem | Sari Haj Hussein*, Tishreen University | Cryptographic techniques and key management Security in information systems* | 
| 21 | Effective Pair-wise Key Establishment Scheme for Wireless Sensor Networks | Somanath Tripathy*, Indian institute of technology | Cryptographic techniques and key management* Network security and protocols Security in information systems | 
| 22 | A SIMPLE YET EFFECTIVE SPAM BLOCKING METHOD | GOKHAN DALKILIC*, Dokuz Eylul University Devrim Sipahi, Mehmet Ozcanhan, | None of the above* | 
| 23 | The method of interval estimation in risk-analysis system | Vladimir Shishkin*, SPIIRAS Sergey Savkov, SPbSUITMO | Information assurance Security in information systems* | 
| 25 | A model of mandatory access for current database management systems | Alexander Basan*, Southern Federal University Lyudmila BABENKO, Federal University of South Russia, Russia. Oleg Makarevich, Southern Federal University | Access control and intrusion detection* Security in information systems | 
| 26 | On The Untraceability of An Anonymous RFID Authentication Protocol with Constant Key-Lookup | Bing LIANG*, SIS, SMU,Singapore Changshe Ma, Tieyan Li, Yingjiu Li, Robert Deng, | Network security and protocols* | 
| 30 | A UML Profile for Role-Based Access Control | Çağdaş Cirit*, TUBITAK UEKAE Feza Buzluca, Istanbul Technical University | Access control and intrusion detection Security tools and development platforms* Security ontology, models, protocols & policies | 
| 34 | DFA-based and SIMD NFA-based Regular Expression Matching on Cell BE for Fast Network Traffic Filtering | Feodor Kulishov*, MEPhI | Access control and intrusion detection Network security and protocols* | 
| 35 | New approach to evaluate the effectiveness of the audio information protection for determining the identity of virtual speech images | Vladimir Kotenko, South Federal University Konstantin Rumjantsev, South Federal University Aleksey Evseev*, South Federal University Stas Kotenko, South Federal University | Access control and intrusion detection Cryptographic techniques and key management* Security in information systems Security tools and development platforms Security ontology, models, protocols & policies | 
| 37 | An Architectural Approach for Assessing System Trust Based on Security Policy Specifications and Security Mechanisms | Serif Bahtiyar*, Bogazici University Murat Cihan, Bogazici University Mehmet CAGLAYAN, Bogazi�i U., Turkey | Information assurance* Security in information systems Autonomous and adaptive security | 
| 40 | An Integrated Approach to detect phishing mail attacks A Case Study | Kannan Saravanan*, VITU Arunkumar Thangavelu, VIT R Suriya, VIT | Access control and intrusion detection* Security tools and development platforms | 
| 41 | A Semantic-based Access Control Mechanism Using Semantic Technologies | Moussa Ehsan*, Sharif Network Security Center Morteza Amini, Sharif Network Security Center Rasool Jalili, Sharif Network Security Center | Access control and intrusion detection Security ontology, models, protocols & policies* Secure ontology-based systems | 
| 42 | Digital sound card identification based on recording path imperfections | Dmitry Rublev*, Federal University of South Russia, Russia Oleg Makarevich, Federal University of South Russia, Russia Anatolij Chumachenko, Federal University of South Russia, Russia Vladimir Fedorov, TI SFU | Security in information systems* Security tools and development platforms | 
| 44 | Extended Electronic Signature Policies | Jorge Hernandez-Ardieta*, Univ. Carlos III of Madrid Ana Isabel FERRERES, Universidad Carlos III de Madrid, Spain Benjamin Ramos, Univ. Carlos III of Madrid Arturo Ribagorda, University Carlos III of Madrid | Security in information systems Security ontology, models, protocols & policies Standards, guidelines and certification* | 
| 46 | A Secure Architecture for P2PSIP-based Communication Systems | Xianghan Zheng*, UIA Vladimir Oleshchuk, | Security ontology, models, protocols & policies* Secure ontology-based systems | 
| 47 | TrueIP: Prevention of IP Spoofing Attacks Using Identity-Based Cryptography | Christian Schridde*, University of Marburg Matthew Smith, University of Marburg Bernd Freisleben, University of Marburg | Cryptographic techniques and key management Network security and protocols* | 
| 48 | Hill Cipher Modification Based on Eigenvalues HCM-EE | Ahmed Mahmoud*, EMU, CMPE Alexander CHEFRANOV, Eastern Mediterranean U., TRNC | Cryptographic techniques and key management* Security in information systems | 
| 50 | Improving Risk Assessment Methodology: A Statistical Design of Experiments Approach | Anand Singh*, Target Corporation David Lilja, University of Minnesota | Information assurance* Security in information systems | 
| 51 | Functional model of information security management | Irina Mashkina*, USATU Vera Mordovina, USATU | Security in information systems* | 
| 52 | Modeling Network Security Competence for Certification | Tomi Kelo*, Tampere University of Tech. Jukka Koskinen, Tampere University of Technology | Network security and protocols Security ontology, models, protocols & policies Standards, guidelines and certification* | 
| 55 | Securing Web Database by Using Cryptographic Protocol | Om Prakash*, NIT Rourkela,Orissa | Network security and protocols Security ontology, models, protocols & policies* | 
| 56 | Fortifying the Dali' Attack on Digital Signature | Francesco Buccafurri*, University of Reggio Calabria Gianluca Lax, University of Reggio Calabria Gianluca Caminiti, University of Reggio Calabria | Information assurance* Standards, guidelines and certification | 
| 57 | Pure E-Learning Course in Information Security | Tomi Kelo*, Tampere University of Tech. Jukka Koskinen, Tampere University of Technology | None of the above* Information assurance Security in information systems Security tools and development platforms | 
| 60 | An Approach to the Implementation of the Anti-Phishing Tool for Phishing Websites Detection (APTIPWD) | Abdullah Alnajim*, Durham University Malcolm Munro, Durham University | Access control and intrusion detection* Security in information systems | 
| 67 | XML-Based Policy Specification Framework for Spatiotemporal Access Control | SAMRAT MONDAL, IIT KHARAGPUR SHAMIK SURAL*, IIT KHARAGPUR | Access control and intrusion detection* Security ontology, models, protocols & policies | 
| 74 | Robust Damage Assessment for Corrupted Database Systems Based on Inter-Transaction Dependencies | Ge Fu*, Computer school of HUST Yingjiu Li, | Access control and intrusion detection Security tools and development platforms Security ontology, models, protocols & policies* | 
| 75 | ARTIFICIAL IMMUNE SYSTEMS BASED INTRUSION DETECTION SYSTEM | Vadim Kotov*, USATU (Ufa) Vladimir VASILYEV, Ural State Aviation Technology University, Russia | Access control and intrusion detection* Security in information systems Autonomous and adaptive security | 
| 76 | Compatibility Infrastructure for Bridging IT Security Evaluation and Options Theory | Haider Abbas*, KTH | Information assurance Standards, guidelines and certification* | 
| 78 | A Scalable Multi-Core Aware Software Architecture for High-Performance Network Monitoring | Mahdi Dashtbozorgi*, IUST Mohammad Abdollahi Azgomi, IUST | Access control and intrusion detection Security in information systems Security tools and development platforms* | 
| 79 | An efficient and secure protocol for DTV broadcasts | Ashutosh SAXENA*, Infosys Technologies, India | Network security and protocols* Security ontology, models, protocols & policies | 
| 84 | Danger Theory Based SYN Flood Attack Detection in Autonomic Network | Sanjay Rawat*, Infosys Technologies Ltd. Ashutosh SAXENA, Infosys Technologies, India | Network security and protocols Security in information systems Autonomous and adaptive security* | 
| 86 | A Vulnerability Metric for Design Phase of Object Oriented Software | Alka Agrawal*, B.B.A. University,Lucknow | Information assurance Security in information systems Security tools and development platforms* | 
| 88 | Efficient, Secure, and Isolated Execution of Cryptographic Algorithms on a Cryptographic Unit | Erkay  SAVAS*, Sabanci University, Turkey Kazim Yumbul, GYTE | Cryptographic techniques and key management* | 
| 89 | Turkish National Electronic Identity Card | Mücahit Mutlugün*, TÜBİTAK UEKAE Oktay Adalıer, TÜBİTAK UEKAE | Cryptographic techniques and key management Security in information systems* | 
| 90 | An Information Security Ontology Incorporating Human-Behavioural Implications | Simon Parkin*, Newcastle University Aad Van Moorsel, Newcastle University | Security ontology, models, protocols & policies* Secure ontology-based systems Standards, guidelines and certification | 
| 91 | Spam Filter Rationality Based on Signal Detection Theory | Kuldeep Singh*, UNIK Audun Jøsang, UNIK Md. Sadek Ferdous, UNIK Ravishankar Borgaonkar, UNIK | Security tools and development platforms* | 
| 93 | Weakening The Dolev-Yao Model Through Probability | Riccardo Bresciani*, Trinity College Dublin Andrew Butterfield, Trinity College Dublin | Cryptographic techniques and key management Network security and protocols* | 
| 94 | Trust Based Traffic Monitoring Approach for Preventing Denial of Service Attacks | Jayashree Padmanabhan*, Anna University, MIT Easwarakumar K S, Anna University Gokul B, Harishankar S, | Access control and intrusion detection* Network security and protocols | 
| 95 | Security against DoS Attack in Mobile IP Communication | Sazia Parvin*, University of Dhaka | Network security and protocols* Security ontology, models, protocols & policies | 
| 96 | Static CFG Analyser for Metamorphic Malware Code | Vinod P, MNIT, Jaipur, India V Laxmi, MNIT, Jaipur, India M Gaur*, MNIT GVSS Phani Kumar, MNIT, Jaipur, India | Security tools and development platforms* Autonomous and adaptive security | 
| 97 | Buyer-Seller Watermarking Protocol for Digital Rights Management | Mudassar Khan, MNIT, Jaipur, India Sarath Kumar, MNIT, Jaipur, India V Laxmi, MNIT, Jaipur, India M Gaur*, MNIT | Information assurance Security ontology, models, protocols & policies* Standards, guidelines and certification | 
| 99 | A LONGITUDINAL STUDY ON e-BANK TRUST | Pedro Cruz*, ISG Business School | None of the above* Security in information systems | 
| 100 | AWGN based Seed for Random Noise Generator in ParseKey+ | Atilla ELCI, Eastern Mediterranean Univ. Behnam Rahnama*, Eastern Mediterranean Univ. | Access control and intrusion detection Cryptographic techniques and key management* Network security and protocols | 
| 101 | BEAN - A Lightweight Stream Cipher | Kritika Jain*, DU Sangeeta Lal, DU | Cryptographic techniques and key management* | 
| 103 | Application of Artificial Neural Network in Detection of DOS Attacks | Iftikhar Ahmad*, UTP Azween Abdullah, Petronas Abdullah Alghamdi | Access control and intrusion detection* Network security and protocols Security in information systems | 
| 105 | Resiliency of Open-Source Firewalls against Remote Discovery of Last-Matching Rules | Khaled SALAH*, KFUPM, Saudi Arabia K. SATTAR, KFUPM, Saudi Arabia Z. BAIG, KFUPM, Saudi Arabia P. CALYAM, The Ohio State University | Access control and intrusion detection Network security and protocols* | 
| 106 | DESIGN OF A ZIGBEE-BASED RFID NETWORK FOR INDUSTRY APPLICATIONS | Sumi HARIKRISHNAN, University of Calicut,India Rahim RAJAN, Babha Atomic Research Centre, India Ebrahim SOUJERI*, European University of Lefke A. HARIKRISHNAN, University of Calicut,India | None of the above* | 
| 107 | Privacy Preservation in k-Means Clustering by Cluster Rotation | S.S.Shivaji Dhiraj*, NIT Warangal,India Ameer Asif Khan, Wajhiulla Khan, Ajay Challagalla | Information assurance* Security in information systems | 
