Communication, Network, and Information Security    (CNIS 2005)

November 14 – 16, 2005
Phoenix, AZ, USA
Editor(s): M.H. Hamza
Other Years:

Abstracts may contain minor errors and formatting inconsistencies.
Please contact us if you have any concerns or questions.

Track Authentication FreeSubscription
499-021 The Achilles' Heel of JPEG-based Image Authentication
M. Schlauweg, T. Palfner, D, Pröfrock, and E. Müller (Germany)
Abstract
499-042 Modelling a Biometric Authentication Protocol for 3G Mobile Systems using CSP
S.A. Shaikh (UK) and C.K. Dimitriadis (Greece)
Abstract
499-053 Two Practical Attacks against Bluetooth Security using New Enhanced Implementations of Security Analysis Tools
K.M.J. Haataja (Finland)
Abstract
499-071 Anonymous Communications on the Internet
Y. Wang and P. Dasgupta (USA)
Abstract
499-093 Mobility Management for UMTS-WLAN Seamless Handover; WITHIN the Framework of Subscriber Authentication
H. Kwon, K. Rho, A. Park, and J. Ryou (Korea)
Abstract
499-813 A New Authentication Protocol for Revocable Anonymity in Ad-Hoc Networks
A. Wierzbicki, A. Zwierko, and Z. Kotulski (Poland)
Abstract
Track Spam and Intrusion Detection FreeSubscription
499-014 Discovering Attack Structures using Behavior Driven Alert Correlation with Dynamic Visualization of Network Intrusions
A.Z. Rana, M.L. Huang, and T. Hintz (Australia)
Abstract
499-017 Token Buckets for Outgoing Spam Prevention
W.N. Gansterer, H. Hlavacs, M. Ilger, P. Lechner, and J. Strauβ (Austria)
Abstract
499-023 Preventing Information Leaks in Xwindows
V. Diwakara, V. Rajegowda, and P. Uppuluri (USA)
Abstract
499-030 Preventing Spam by Dynamically Obfuscating Email-Addresses
T. Eggendorfer and J. Keller (Germany)
Abstract
499-063 Characterizing and Estimating Network Fluctuation for Detecting Interactive Stepping-Stone Intrusion
J.H. Yang and S.-H.S. Huang (USA)
Abstract
499-069 LOHIT: An Online Detection & Control System for Cellular SMS Spam
S. Dixit, S. Gupta, and C.V. Ravishankar (USA)
Abstract
499-078 A Novel Service-Oriented and User-Centric Intrusion Detection System for Ubiquitous Networks
B. Zhou, Q. Shi, and M. Merabti (UK)
Abstract
499-801 Anomaly Detection in a Distributed Environment using Neural Networks on a Cluster
N. Srinivasan and V. Vaidehi (India)
Abstract
499-804 A Hierarchical Approach for Detecting System Intrusions through Event Correlation
G.W. Rice and T.E. Daniels (USA)
Abstract
Track Cryptographic Protocols FreeSubscription
499-022 Efficient Hierarchical Conference Key Establishment in Wireless Networks
S. Eskeland (Norway)
Abstract
499-034 Extending Constraint Solving for Cryptographic Protocol Analysis with Non-Standard Attacker Inference Rules
S. Malladi and S.J. Rosenberg (USA)
Abstract
499-086 A PKI-based Secure Audit Web Service
W. Xu, D. Chadwick, and S. Otenko (UK)
Abstract
499-088 A Compact and Low-Power Implementation of the Montgomery Algorithm for a Public-Key Cryptosystem
J. Rejeb, C. Madaboosi, and T.T. Le (USA)
Abstract
499-091 An LSB-based Watermarking Algorithm for Grayscale Images
C. Obimbo and Y. Zhang (Canada)
Abstract
499-803 Design and Implementation of a New Public-Key Certificate Status Handling Scheme
E. Faldella and M. Prandini (Italy)
Abstract
Track Access Control FreeSubscription
499-033 SH: A Simple Distributed Bandwidth Broker for Source-Routed Loss-Less Networks
G. Horn and T. Sødring (Norway)
Abstract
499-037 Data Structures for Constraint Enforcement in Role-based Systems
J. Crampton and H. Khambhammettu (UK)
Abstract
499-039 A Multi-Platform Toolkit for the Configuration of Packet-Filtering Firewalls
M. Prandini (Italy)
Abstract
499-065 Detection and Removal of Firewall Misconfiguration
F. Cuppens, N. Cuppens-Boulahia (France), and J. García-Alfaro (Spain)
Abstract
499-089 Cached Guaranteed-Timer Random Drop against TCP SYN-Flood Attacks and Flash Crowds
H. Fujinoki (USA)
Abstract
Track Network and Information Security FreeSubscription
499-032 Data Protection and Rapid Recovery from Attack with a Virtual Private File Server and Virtual Machine Applicances
J.N. Matthews, J.J. Herne, T.M. Deshane, P.A. Jablonski, L.R. Cherian, and M.T. McCabe (USA)
Abstract
499-036 Multiple Access Covert Channel
I.S. Moskowitz and R.E. Newman (USA)
Abstract
499-079 Packet-Level Simulations of the Flash Worm and the Compact Flash Worm
M. Abdelhafez and G.F. Riley (USA)
Abstract
499-080 A Hybrid Method of Defense against Buffer Overflow Attacks
A. Dasari and P. Dasgupta (USA)
Abstract
499-081 Government Network and Information Security MCDM Framework for the Selection of Security Mechanisms
L.A. Chemane (Sweden/Mozambique), L. Ekenberg, O. Popov (Sweden), and S. Carrilho (Mozambique)
Abstract
499-810 A Provable Scheme for Homomorphic Obfuscations in Software Security
and C. Thomborson (New Zealand)
Abstract
Abstracts may contain minor errors and formatting inconsistencies.
Please contact us if you have any concerns or questions.

What are Digital Object Identifers?


Rates (USD):   $94.20 (Hardcopy) ;  $88.20 (Online) ;  $94.20 (CD)

(The Hardcopy and CD proceedings also include the Online version)

For complete proceedings please choose one of the following:

   

Hard Copy $94.20
Online Edition $88.20
CD Edition $94.20
Individual Articles (Online): $40.00  
ISSN: N/A ;
ISBN: 0-88986-537-X ;
ISSN (CD): N/A ;
ISBN (CD): 0-88986-539-6 ;
ISSN (Online): N/A ;

This publication covers the following topics: Authentication; Spam and Intrusion Detection; Cryptographic Protocols; Access Control; and Network and Information Security.

Loading Information

Go Back