Communication, Network, and Information Security    (CNIS 2006)

October 9 – 11, 2006
Cambridge, MA, USA
Editor(s): Sanguthevar Rajasekaran
229 pages
Other Years:

Abstracts may contain minor errors and formatting inconsistencies.
Please contact us if you have any concerns or questions.

Track Information Security FreeSubscription
547-015 A Grey-Level Image Watermarking Method based on Block DCT and Statistic Correlation Adjustment
C. Obimbo and J. Ni (Canada)
Abstract
547-023 An Efficient Authentication Scheme for Contactless Smartcards using Elliptic Curve Cryptography
D.D. Kastanis, I.G. Askoxylakis, and A.P. Traganitis (Greece)
Abstract
547-028 Proactive, Content-Aware, Sensitive Data Protection Framework for Enterprises
Y. Zhang, R.J. Enbody, and J.R. Lloyd (USA)
Abstract
547-063 Slantlet Transform-based Image Fingerprints
L. Yu and S. Sun (PRC)
Abstract
547-071 A Multi-Bit Watermark Generation Algorithm with Properties of Error Correction
B. Salami and C. Obimbo (Canada)
Abstract
547-072 ProTemp-Z: An XML based Authorization System with Provisional Authorization and Temporal Certification Support
V.V. Singh (USA)
Abstract
547-078 A Robust Image Watermarking Method to Geometric Attacks
K. Okada and S. Wada (Japan)
Abstract
547-091 Covert Timing Channel Capacity of Rate Monotonic Real-Time Scheduling Algorithm in MLS Systems
J. Son and J. Alves-Foss (USA)
Abstract
547-093 Security Analysis of a Large-Scale Voting Scheme
S. Eskeland (Norway)
Abstract
Track Communication Security FreeSubscription
547-022 Elliptic Curve and Password based Dynamic Key Agreement in Wireless Ad-Hoc Networks
I.G. Askoxylakis, D.D. Kastanis, and A.P. Traganitis (Greece)
Abstract
547-034 A Petri Net based XML Firewall Security Model for Web Services Invocation
M.M. Ayachit and H. Xu (USA)
Abstract
547-042 A Method for Deriving Paths Across a Distributed Web of Trust
P. Tipper and C. Edwards (UK)
Abstract
547-043 Designing SSL/TLS Protocol for Resource Constrained Devices
A.M. Ali (USA)
Abstract
547-053 Security Framework for Supervisory Control and Data Acquisition, Automation Systems, and Networks
C. Obimbo, F. Haji, L. Lindsay, and D. Patel (Canada)
Abstract
547-067 Object Authentication in Closed Containers by Ultra-Wideband Multipath Profile Examination: An Application to National Security
S. Sobolewski and M. Buehrer (USA)
Abstract
547-089 Self-Organising Quorum Systems for Ad Hoc Networks
G. Owen and M. Adda (UK)
Abstract
547-092 Access Control by Secure Multi-Party EPR Decryption in the Medical Scenario
S. Eskeland (Norway)
Abstract
547-096 The Lightweight Key Management Protocol (LKMP)
J. Trostle (USA)
Abstract
Track Communication, Network, and Information Security FreeSubscription
547-048 Artificial Immune using Multi-Level Negative Selection Approach to Anomaly Detection
A.A.A. Youssif, A.Z. Ghalwash, and S.A. Mohamed (Egypt)
Abstract
547-085 Reinforcement of Privacy in 802.16 MAC Common Part Sublayer using the Principle of Circularity
R. Bhakthavathsalam (India)
Abstract
547-094 An MSLS-EMM for Enforcing Confidentiality in Malicious Environments
B. Wang and J. Alves-Foss (USA)
Abstract
547-095 A Classification of Security Patterns for the Transactions Between a Requester, an Intermediary, and a Web-Service
J. Muñoz Arteaga, R. Mendoza González, F.J. Álvarez (Mexico), and M. Vargas Martín (Canada)
Abstract
547-097 Security Vulnerability Categories in Major Software Systems
O.H. Alhazmi, S.-W. Woo, and Y.K. Malaiya (USA)
Abstract
547-802 ARP and ICMP Weaknesses: Impact and Network Performance Analysis of a Novel Attack Strategy
A. Anand, R. Rishi, and M. Kumar (India)
Abstract
547-803 STRBAC - An Approach Towards Spatio-Temporal Role-based Access Control
M. Kumar and R.E. Newman (USA)
Abstract
547-804 Experimental Evaluation of Network Security Through a Hierarchical Quantitative Metrics Model
F. El-Hassan, A. Matrawy, N. Seddigh, and B. Nandy (Canada)
Abstract
547-805 Securing a Linux-based Multi-User Web Server
M. Prandini (Italy)
Abstract
Track Network Security FreeSubscription
547-020 Performance Studies of the Server-Side Access Control for SYN-Flooding Distributed Denial of Service Attacks using Real Systems
H. Fujinoki and R.K. Boyapati (USA)
Abstract
547-021 A Scalable Approach to IP Anycast Security
A. Pathak and D. Sanghi (India)
Abstract
547-027 An Efficient Hybrid Algorithm for Multidimensional Packet Classification
Y. Qi and J. Li (PRC)
Abstract
547-030 Introducing Trusted EAP Module for Security Enhancement in WLANs and VPNs
P. Urien (France), M. Dandjinou (Burkina Faso), and M. Badra (France)
Abstract
547-031 Optimizing Multi-Thread String Matching for Network Processor based Intrusion Management System
J. Yu, Q. Huang, and Y. Xue (PRC)
Abstract
547-033 Dynamically Blocking Access to Web Pages for Spammers' Harvesters
T. Eggendorfer and J. Keller (Germany)
Abstract
547-045 Design of a Virtual Computer Security Lab
J. Keller and R. Naues (Germany)
Abstract
547-058 Towards Effective Packet Classification
Y. Qi and J. Li (PRC)
Abstract
547-059 Access Control Platform for Submitted Jobs in Computational Grid Environment
L. Mattes and J.A. Zuffo (Brazil)
Abstract
Abstracts may contain minor errors and formatting inconsistencies.
Please contact us if you have any concerns or questions.

What are Digital Object Identifers?


Rates (USD):   N/A (Hardcopy) ;  $64.80 (Online) ;  $82.80 (CD)

(The Hardcopy and CD proceedings also include the Online version)

For complete proceedings please choose one of the following:

   

Online Edition $64.80
CD Edition $82.80
Individual Articles (Online): $40.00  
Hard Copy Subscriptions are not available for CNIS 2006
ISSN: N/A ;
ISBN: N/A ;
ISSN (CD): N/A ;
ISBN (CD): 0-88986-636-8 ;
ISSN (Online): N/A ;

The topics of interest include, but are not limited to: Communication Security - Access control; Authentication; Cryptographic Protocols and Applications; Digital Signatures; Disaster Protocols ; Hash Functions; Warning Systems; Network Security - Computer/Network Disaster Recovery; Global Security Architectures and Infrastructures; Hacking and Intrusion Detection; Secure Deletion; Secure Email; Spam Viruses and Worms; Web Security; WiFi Spying/Sniffing; Wireless Privacy; Wireless Security; Virtual Private Networks; Information Security - Biometrics; Digital Rights Management; Digitally Embedded Signatures; DNA, Fingerprint, Iris, and Retina Scanning; Identify Theft; Information Hiding; Legal and Regulatory Issues in Communication; Operating System Security; Plagiarism; Privacy and Confidentiality; Software Security; Spyware; Standards; and Watermarking.

Loading Information

Go Back