Communication, Network, and Information Security    (CNIS 2007)

September 24 – 17, 2007
Berkeley, California, USA
Editor(s): P. Dasgupta
143 pages
Other Years:

Abstracts may contain minor errors and formatting inconsistencies.
Please contact us if you have any concerns or questions.

Track Cryptography and Information Security FreeSubscription
589-037 Linear Feedback Shift Register based Stream Ciphers
D.S. John, P.P. Deepthi, and P.S. Sathidevi (India)
Abstract
589-038 J2: Refinement of a Topological Image Steganographic Method
R.E. Newman, I.S. Moskowitz, and M. Kumar (USA)
Abstract
589-039 Algorithm Level Evaluation of Cryptosystem Resistance to Second-Order DPA
A. Sasaki and K. Abe (Japan)
Abstract
589-066 Distributed Signcryption Scheme on Hyperelliptic Curve
I. Gupta, N.R. Pillai, and P.K. Saxena (India)
Abstract
589-080 Architecture of an IKEv2 Protocol Implementation
S. Gro and V. Glavinić (Croatia)
Abstract
589-081 Period Lengths of Chaotic Pseudo-Random Number Generators
J. Keller and H. Wiese (Germany)
Abstract
589-084 Collusion-Resistant Threshold Decryption
S. Eskeland and V. Oleshchuk (Norway)
Abstract
Track Authentication and Security Management FreeSubscription
589-041 Multi-Agent based Security Assurance Monitoring System for Telecommunication Infrastructures
E. Bulut (France), D. Khadraoui (Luxembourg), and B. Marquet (France)
Abstract
589-046 An Efficient Algorithm for the Implementation of Fingerprint Authentication on Smartcards
M. Govan and T. Buggy (UK)
Abstract
589-047 Integration of a Secure Mobile Payment System in a GSM/UMTS SIM Smart Card
I.G. Askoxylakis, M. Pramateftakis, D.D. Kastanis, and A.P. Traganitis (Greece)
Abstract
589-053 Security, Privacy, and Usability: A High Common Ground
H.K. Lu and A.M. Ali (USA)
Abstract
589-055 High Level Specification of Non-Interference Security Policies in Partitioned MLS Systems
J. Son and J. Alves-Foss (USA)
Abstract
589-073 Prevention of SPIT using the Concept of Access Number (AN)
A.H. Khalil and D.J. Parish (UK)
Abstract
589-078 FEDERACY: An Extensible Federated Identity and Access Management Framework Considering Legacy Systems
S.-C. Cha, H.-P. Lin, M.-G. Wang, and C.-W. Huang (Taiwan)
Abstract
589-079 A Dynamic Fusion Approach for Security Situation Assessment
A. Siraj and R.B. Vaughn (USA)
Abstract
Track Network Security FreeSubscription
589-020 Running a Port Forwarding Firewall System on a Bridge
T. Eggendorfer and D. Weber (Germany)
Abstract
589-031 Security Enhancement Over Ad-Hoc AODV Routing Protocol
Z. Zhou (PRC)
Abstract
589-034 New Practical Attack against Bluetooth Security using Efficient Implementations of Security Analysis Tools
K.M.J. Haataja (Finland)
Abstract
589-043 DoS Detection in Cluster-based Sensor Networks
G.-H. Lai, C.-M. Chen, and B. Jeng (Taiwan)
Abstract
589-060 The SMTP Tar Pit Simulator Compared to OpenBSD's SpamD
T. Eggendorfer (Germany)
Abstract
589-062 Three Practical Bluetooth Security Attacks using New Efficient Implementations of Security Analysis Tools
K.M.J. Haataja (Finland)
Abstract
589-071 A Novel Packet Header Visualization Methodology for Network Anomaly Detection
S. Tehsin and S.A. Khan (Pakistan)
Abstract
Abstracts may contain minor errors and formatting inconsistencies.
Please contact us if you have any concerns or questions.

What are Digital Object Identifers?


Rates (USD):   $52.20 (Hardcopy) ;  $44.37 (Online) ;  $52.20 (CD)

(The Hardcopy and CD proceedings also include the Online version)

For complete proceedings please choose one of the following:

   

Hard Copy $52.20
Online Edition $44.37
CD Edition $52.20
Individual Articles (Online): $40.00  
ISSN: N/A ;
ISBN: 978-0-88986-698-0 ;
ISSN (CD): N/A ;
ISBN (CD): 978-0-88986-697-3 ;
ISSN (Online): N/A ;

The relevant topics for this conference include, but are not limited to: Communication Security * Access control * Authentication * Cryptographic Protocols and Applications * Digital Signatures * Disaster Protocols * Hash Functions * Warning Systems Network Security * Computer/Network Disaster Recovery * Global Security Architectures and Infrastructures * Hacking and Intrusion Detection * Secure Deletion * Secure Email * Spam * Viruses and Worms * Web Security * WiFi Spying/Sniffing * Wireless Privacy * Wireless Security * Virtual Private Networks Information Security * Biometrics * Digital Rights Management * Digitally Embedded Signatures * DNA, Fingerprint, Iris, and Retina Scanning * Identify Theft * Information Hiding * Legal and Regulatory Issues in Communication * Operating System Security * Plagiarism * Privacy and Confidentiality * Software Security * Spyware * Standards * Watermarking.

Loading Information

Go Back