| 1 |
Collusion Resistant Fingerprinting of Digital Audio |
Tirkel, Andrew |
Regular paper |
| 2 |
Using Decision Trees for Generating Adaptive SPIT Signatures |
Nassar, Mohamed |
Regular paper |
| 9 |
Cryptanalysis of the Stream Cipher BEAN |
Ågren, Martin |
Regular paper |
| 10 |
Corporate networks security evaluation based on attack graphs |
ABRAMOV, Evgeny |
Regular paper |
| 14 |
Echo Hiding Based Stereo Audio Watermarking Against Pitch-Scaling Attacks |
Natgunanathan, Iynkaran |
Regular paper |
| 15 |
The Optimal Linear Multi-Secret Sharing Scheme for Non-Threshold Access Structure(Student Contribution) |
Tang, Chunming |
Regular paper |
| 17 |
Rational distance-bounding protocols over noisy channels |
Nguyen, Long |
Regular paper |
| 24 |
Algebraic analysis of GOST encryption algorithm |
Maro, Ekaterina |
Regular paper |
| 26 |
Fault Attack to the Elliptic Curve Digital Signature Algorithm with Multiple Bit Faults |
Pelosi, Gerardo |
Regular paper |
| 27 |
Trust based Fusion over Noisy Channels through Anomaly Detection in Cognitive Radio Networks |
Bhattacharjee, Shameek |
Regular paper |
| 31 |
On Automatic Detection of SQL Injection Attacks by the Feature Extraction of the Single Character |
Sonoda, Michio |
Regular paper |
| 33 |
Logic Based Authorization Program and Its implementation |
Ruan, Chun |
Regular paper |
| 35 |
Algebraic Attacks on BEAN a lightweight Stream Cipher |
Pillai, Rajesh |
Regular paper |
| 36 |
Security Analysis of a Femtocell device |
Borgaonkar, Ravishankar |
Regular paper |
| 37 |
Deploying secure satellite networks |
Fritsche, Wolfgang |
Regular paper |
| 40 |
Dynamic Rule and Rule-Field optimization for Improving Firewall Performance and Security |
Trabelsi, Zouheir |
Regular paper |
| 42 |
A Model-Based Attack Injection Approach for Security Validation |
Morais, Anderson |
Regular paper |
| 44 |
Detection of Neighbor Solicitation and Advertisement Spoofing in IPv6 Neighbor Discovery Protocol |
Biswas, Santosh |
Regular paper |
| 45 |
Counteracting DDoS Attacks in WLAN |
Tupakula, Udaya |
Regular paper |
| 49 |
A Secure and Anonymous Cooperative Sensing Protocol for Cognitive Radio Networks |
Rifa-Pous, Helena |
Regular paper |
| 60 |
A HTTP Cookie Covert Channel |
Yuan, Bo |
Regular paper |
| 62 |
Detour Attack In OLSR |
Gaur, Manoj |
Regular paper |
| 64 |
Exploration of a Hand-based Graphical Password Scheme |
Gao, Haichang |
Regular paper |
| 65 |
A Sybil Attack Detection Approach using Neighboring Vehicles in VANET |
Laxmi, Vijay |
Regular paper |
| 66 |
Model checking security policy model using both UML static and dynamic diagrams |
Cheng, Liang |
Regular paper |
| 70 |
TW-KEAP: An Efficient Four-Party Key Exchange Protocol for End-to-End Communications |
Chiang, Wei-Kuo |
Regular paper |
| 71 |
Secure Random Number Generation in Wireless Sensor Networks |
Milazzo, Fabrizio |
Regular paper |
| 91 |
Improving Operation Time Bounded Mission Critical Systems’ Attack-Survivability through Controlled Source-Code Transformation |
Vignaux, Alban |
Regular paper |
| 97 |
A different algebraic analysis on ZUC stream cipher |
ALMashrafi, Mufeed |
Regular paper |
| 20 |
On the Security and Practicality of a Buyer Seller Watermarking Protocol for DRM |
Poh, Geong Sen |
Fast Abstract |
| 25 |
Proposal and Implementation of Enhanced Authentication that Enables Self-Wipe |
Guo, Zhaogong |
Fast Abstract |
| 48 |
piMANET - A Policy Integrated Security Framework for Mobile Ad Hoc Network |
Ghosh, Soumya |
Fast Abstract |
| 98 |
Microcontroller-Based Implementation of parseKey+ for Limited Resources Embedded Applications |
Rahnama, Behnam |
Fast Abstract |
| 4 |
DIFFERENT MODELS OF INFORMATION PROTECTION SYSTEM, BASED ON THE FUNCTIONAL KNAPSACK |
Osipyan, Valeriy |
Position Paper |
| 102 |
Obscurity of Network Security Course Curriculum |
Kondakci, Suleyman |
Position Paper |
| 106 |
Counterfactually Reasoning About Security |
Peralta, Manuel |
Position Paper |
| 5 |
Improved Joint Perceptual Encryption and Watermarking Scheme (IJPEW) For JPEG Images |
KHAN, Muhammad Imran |
Short Paper |
| 12 |
A Proposed Watermarking Technique in Transform Domain |
Hasija, Mansi |
Short Paper |
| 28 |
Acceleration of Packet Filtering using GPGPU |
Gaur, Manoj |
Short Paper |
| 39 |
Formal Analysis of Usage Control Policies. |
OUCHENNE, Boulares |
Short Paper |
| 41 |
Multilevel Early Packet Filtering Technique based on Traffic Statistics and Splay trees for Firewall Performance Improvement |
Trabelsi, Zouheir |
Short Paper |
| 56 |
Extending the scope of CardSpace |
Al-Sinani, Haitham |
Short Paper |
| 61 |
Towards Hiding Federated Digital Identity: Stop-Dissemination Mechanism in Content Centric Internetworking |
Abidi, Amine |
Short Paper |
| 94 |
WinSEND: Windows SEcure Neighbor Discovery |
Alsa'deh, Ahmad |
Short Paper |
| 105 |
Towards Intelligent Systems Capable of Information Assurance and Security Related Risk Management |
Marbukh, Vladimir |
Short Paper |
| 109 |
Research on Survivability Metrics Based on Survivable Process of Network System |
Ming, Liang |
Short Paper |
| 18 |
Algebraic analysis of the SSS stream cipher |
ALMashrafi, Mufeed |
Student Paper |
| 54 |
An approach to enhance the security of remote health monitoring systems |
Elkhodr, Mahmoud |
Student Paper |
| 96 |
On the Impacts of Join and Leave on the Propagation Ratio of Topology-Aware Active Worms (Student Contribution) |
Abdollahi Azgomi, Mohammad |
Student Paper |