IAS C

83 papers

YearTitle / Authors
2007A Framework for Design and Analysis of Asymmetric Fingerprinting Protocols.
Geong Sen Poh, Keith M. Martin
2007A New Data Hiding Scheme with Quality Control for Binary Images Using Block Parity.
M. Venkatesan, P. Meenakshi Devi, K. Duraiswamy, K. Thiagarajah
2007A Performance Comparison of Wireless Ad Hoc Network Routing Protocols under Security Attack.
Su Mon Bo, Hannan Xiao, Aderemi Adereti, James A. Malcolm, Bruce Christianson
2007A Purpose-Based Access Control Model.
Naikuo Yang, Howard Barringer, Ning Zhang
2007A Secure Authenticated Key Agreement Protocol Based on Elliptic Curve Cryptography.
Pierre E. Abi-Char, Abdallah Mhamed, Bachar El-Hassan
2007A Secure Authenticated Key Agreement Protocol For Wireless Security.
Pierre E. Abi-Char, Abdallah Mhamed, Bachar El-Hassan
2007A Secure Storage Service for the gLite Middleware.
Diego Scardaci, Giordano Scuderi
2007A Security Model for Detecting Suspicious Patterns in Physical Environment.
Simon Fong, Zhuang Yan
2007A Theoretical Security Model for Access Control and Security Assurance.
Bo-Chao Cheng, Huan Chen, Ryh-Yuh Tseng
2007A Weighted Stego Image Detector for Sequential LSB Replacement.
Andrew D. Ker
2007A novel anti-collusion coding scheme tailored to track linear collusions.
Kannan Karthik, Dimitrios Hatzinakos
2007Accurate Application-Specific Sandboxing for Win32/Intel Binaries.
Wei Li, Lap-Chung Lam, Tzi-cker Chiueh
2007Addressing privacy issues in CardSpace.
Waleed A. Alrodhan, Chris J. Mitchell
2007An Analysis of Database Watermarking Security.
Julien Lafaye
2007An Architecture for Privacy Preserving Collaborative Filtering on Web Portals.
Waseem Ahmad, Ashfaq A. Khokhar
2007An Authentication Scheme Using Non-Commutative Semigroups.
M. M. Chowdhury
2007An Effective and Secure Buyer-Seller Watermarking Protocol.
Ibrahim Mostafa Ibrahim, Sherif Hazem Nour El-Din, Abdel Fatah A. Hegazy
2007An LSB Data Hiding Technique Using Prime Numbers.
Sandipan Dey, Ajith Abraham, Sugata Sanyal
2007Analysing the Security Threats against Network Convergence Architectures.
Patroklos G. Argyroudis, Robert McAdoo, Stephen Toner, Linda Doyle, Donal O'Mahony
2007Application of Language Models to Suspect Prioritisation and Suspect Likelihood in Serial Crimes.
Richard Bache, Fabio Crestani, David Canter, Donna Youngs
2007Applying Secure Data Aggregation techniques for a Structure and Density Independent Group Based Key Management Protocol.
Kashif Kifayat, Madjid Merabti, Qi Shi, David Llewellyn-Jones
2007Automatic Patch Generation for Buffer Overflow Attacks.
Alexey Smirnov, Tzi-cker Chiueh
2007Binding Update Authentication Scheme for Mobile IPv6.
Irfan Ahmed, Usman Tariq, Shoaib Mukhtar, Kyung-suk Lhee, S. W. Yoo, Piao Yanji, Manpyo Hong
2007Building Trustworthy Intrusion Detection through VM Introspection.
Fabrizio Baiardi, Daniele Sgandurra
2007CCARCH: Architecting Common Criteria Security Requirements.
Jose Romero-Mariona, Hadar Ziv, Debra J. Richardson
2007Certified Email Delivery with Offline TTP.
Hao Wang, Yuyi Ou, Jie Ling, Lu Liang, Xiang Xu
2007Comparing the Trust and Security Models of Mobile Agents.
Michail Fragkakis, Nikos Alexandris
2007Computational Forensics: Towards Hybrid-Intelligent Crime Investigation.
Katrin Franke, Sargur N. Srihari
2007Craniofacial Superimposition in Forensic Identification using Genetic Algorithms.
Lucia Ballerini, Oscar Cordón, Sergio Damas, José Santamaría, Inmaculada Alemán, Miguel Botella
2007Cyber Threat Trend Analysis Model Using HMM.
Do-Hoon Kim, Taek Lee, Sung-Oh David Jung, Hoh Peter In, Heejo Lee
2007DIPS: A Framework for Distributed Intrusion Prediction and Prevention Using Hidden Markov Models and Online Fuzzy Risk Assessment.
Kjetil Haslum, Ajith Abraham, Svein J. Knapskog
2007Detection and Honeypot Based Redirection to Counter DDoS Attacks in ISP Domain.
Anjali Sardana, Krishan Kumar, Ramesh Chandra Joshi
2007Detection of Hidden Information in Webpages Based on Randomness.
Junwei Huang, Xingming Sun, Huajun Huang, Gang Luo
2007Detection of Web Defacements by means of Genetic Programming.
Eric Medvet, Cyril De Fillon, Alberto Bartoli
2007Dynamic Risk Mitigation in Computing Infrastructures.
Reiko Ann Miura-Ko, Nicholas Bambos
2007Early DoS Attack Detection using Smoothened Time-Series andWavelet Analysis.
Pravin Shinde, Srinivas Guntupalli
2007Enforcing Privacy by Means of an Ontology Driven XACML Framework.
Dhiah el Diehn I. Abou-Tair, Stefan Berlik, Udo Kelter
2007Enhanced Availability and Security by Rate Control Using Extended Policy Framework in SELinux.
Pravin Shinde, Priyanka Sharma, Srinivas Guntupalli
2007Enhancing Role-Based Access Control Model through Fuzzy Relations.
Hassan Takabi, Morteza Amini, Rasool Jalili
2007FPGA/ASIC based Cryptographic Object Store System.
Dan Feng, Lanxiang Chen, Lingfang Zeng, Zhongying Niu
2007Function-Based Authorization Constraints Specification and Enforcement.
Wei Zhou, Christoph Meinel
2007Fuzzy Key Extraction from Fingerprint Biometrics based on Dynamic Quantization Mechanism.
Thian Song Ong, Andrew Beng Jin Teoh
2007Generative Models for Fingerprint Individuality using Ridge Types.
Gang Fang, Sargur N. Srihari, Harish Srinivasan
2007HPRS: A Hybrid P2P Reputation System using File and Peer Rating.
Srinivasan T., Varun Ramachandran, Arun Vedachalam, S. K. Ghosh
2007Hierarchical Multi-Party Key Agreement for Wireless Networks.
Sigurd Eskeland, Vladimir A. Oleshchuk
2007IP protection: Detecting Email based breaches of confidence.
Neil Cooke, Lee Gillam, Ahmet M. Kondoz
2007Improving the Efficiency of Digital Forensic Search by Means of the Constrained Edit Distance.
Slobodan Petrovic, Katrin Franke
2007Inclusion of a Montgomery Multiplier Unit into an Embedded Processor's Datapath to Speed-up Elliptic Curve Cryptography.
Sandro Bartolini, Cinzia Castagnini, Enrico Martinelli
2007Information-theoretical comparison of likelihood ratio methods of forensic evidence evaluation.
Daniel Ramos, Joaquin Gonzalez-Rodriguez, Grzegorz Zadora, Janina Zieba-Palus, Colin Aitken
2007Integrating Multi-Modal Circuit Features within an Efficient Encryption System.
Evangelos Papoutsis, Gareth Howells, Andrew B. T. Hopkins, Klaus D. McDonald-Maier
2007Levels of Authentication Assurance: an Investigation.
Aleksandra Nenadic, Ning Zhang, Li Yao, Terry Morrow
2007Low-cost Anonymous Timed-Release Encryption.
Dimitrios Hristu-Varsakelis, Konstantinos Chalkias, George Stephanides
2007Managing Behaviour Trust in Grids Using Statistical Methods of Quality Assurance.
Elvis Papalilo, Bernd Freisleben
2007Metrics-based Evaluation of Slicing Obfuscations.
Anirban Majumdar, Stephen Drape, Clark D. Thomborson
2007Modeling Security Protocols as Games.
Mohamed Mostafa Saleh, Mourad Debbabi
2007Modelling Quality of Protection in Outsourced Business Processes.
Fabio Massacci, Artsiom Yautsiukhin
2007Non-Stationary Markov Models and Anomaly Propagation Analysis in IDS.
Arnur G. Tokhtabayev, Victor A. Skormin
2007On Detecting Packets Droppers in MANET: A Novel Low Cost Approach.
Tarag Fahad, Djamel Djenouri, Robert Askwith
2007On Periodic Properties of Interpolation and Their Application To Image Authentication.
Babak Mahdian, Stanislav Saic
2007On the Definition and Policies of Confidentiality.
Johs Hansen Hammer, Gerardo Schneider
2007Operational risk: acceptability criteria.
Daniel Gideon Dresner, J. Robert (Bob) G. Wood
2007Organized Anonymous Agents.
Martijn Warnier, Frances M. T. Brazier
2007Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007, August 29-31, 2007, Manchester, United Kingdom
Ning Zhang, Ajith Abraham
2007Program Fragmentation as a Metamorphic Software Protection.
Bobby D. Birrer, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Robert W. Bennington
2007Protecting IP Multimedia Subsystem (IMS) Service Delivery Platform from Time Independent Attacks.
Muhammad Sher, Thomas Magedanz
2007Protection of Mammograms Using Blind Steganography and Watermarking.
Yue Li, Chang-Tsun Li, Chia-Hung Wei
2007Research on Steganalysis for Text Steganography Based on Font Format.
Lingyun Xiang, Xingming Sun, Gang Luo, Can Gan
2007Resource Classification Based Negotiation in Web Services.
Diala Abi Haidar, Nora Cuppens-Boulahia, Frédéric Cuppens, Hervé Debar
2007Risk management in coalition networks.
Wim Mees
2007SARBAC07: A Scoped Administration Model for RBAC with Hybrid Hierarchy.
Yue Zhang, James B. D. Joshi
2007Second-LSB-Dependent Robust Watermarking for Relational Database.
Xiangrong Xiao, Xingming Sun, Minggang Chen
2007Secure E-Commerce Protocol for Purchase of e-Goods - Using Smart Card.
Satish Devane, Madhumita Chatterjee, Deepak B. Phatak
2007Secure M-commerce Transactions: A Third Party Based Signature Protocol.
Li-Sha He, Ning Zhang, Li-Rong He, Ian Rogers
2007Separation of Duty in Role-Based Access Control Model through Fuzzy Relations.
Hassan Takabi, Morteza Amini, Rasool Jalili
2007Shoeprint Image Retrieval Based on Local Image Features.
Danny Crookes, Hongjiang Su, Ahmed Bouridane, Mourad Gueham
2007Statistical Disk Cluster Classification for File Carving.
Cor J. Veenman
2007Structural Digital Signature and Semi-Fragile Fingerprinting for Image Authentication in Wavelet Domain.
Yan Zhu, Chang-Tsun Li, Hong-Jia Zhao
2007Study of structural features of handwritten grapheme 'th' for writer identification.
Vladimir Pervouchine, Graham Leedham
2007Team Edit Automata for Testing Security Property.
Zhenrong Yang, Aiman Hanna, Mourad Debbabi
2007The Influence of Frame Length on Speaker Identification Performance.
Donato Impedovo, Mario Refice
2007Threshold SKI Protocol for ID-based Cryptosystems.
Ashutosh Saxena
2007Towards an Autonomic Security System for Mobile Ad Hoc Networks.
Mohamad Aljnidi, Jean Leneutre
2007Vulnerability Assessment by Learning Attack Specifications in Graphs.
Virginia N. L. Franqueira, Raul H. C. Lopes