Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ISA
ISA 2008
Generate Citations
2008 International Conference on Information Security and Assurance (ISA '08)
April 24 2008 to April 26 2008
Busan
Table of Contents
[Title page i]
Freely available from IEEE.
[Title page iii]
Freely available from IEEE.
[Copyright notice]
Freely available from IEEE.
Papers
Title Page i
Freely available from IEEE.
pp. i
Papers
Title Page iii
Freely available from IEEE.
pp. iii
Papers
Copyright Page
Freely available from IEEE.
pp. iv
Papers
Table of Contents
Freely available from IEEE.
pp. v-xi
Papers
Welcome Message from the General Chairs
Freely available from IEEE.
pp. xii
Papers
Welcome Message from the Program Chairs
Freely available from IEEE.
pp. xiii-xiv
Conference organization
Freely available from IEEE.
pp. xv-xix
Papers
Secure Deniable Authenticated Key Establishment for Internet Protocols
Full-text access may be available. Sign in or learn about subscription options.
pp. 3-6
by
Meng-Hui Lim
,
SangGon Lee
,
Youngho Park
,
Sangjae Moon
Papers
An Intrusion Detection System in Mobile AdHoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 7-14
by
SaniKommu Madhavi
Papers
IDEA: A New Intrusion Detection Data Source
Full-text access may be available. Sign in or learn about subscription options.
pp. 15-19
by
William Mahoney
,
William Sousan
Papers
A Security Protocol Compiler Generating C Source Codes
Full-text access may be available. Sign in or learn about subscription options.
pp. 20-25
by
Shinsaku Kiyomoto
,
Haruki Ota
,
Toshiaki Tanaka
Papers
Incident-Driven Memory Snapshot for Full-Virtualized OS Using Interruptive Debugging Techniques
Full-text access may be available. Sign in or learn about subscription options.
pp. 26-31
by
Ruo Ando
,
Youki Kadobayashi
,
Youichi Shinoda
Papers
SCV: Structure and Constant Value based Binary Diffing
Full-text access may be available. Sign in or learn about subscription options.
pp. 32-35
by
Heewan Park
,
Seokwoo Choi
,
Sunae Seo
,
Taisook Han
Papers
Secure Deniable Authentication Protocol Based on ElGamal Cryptography
Full-text access may be available. Sign in or learn about subscription options.
pp. 36-39
by
Eun-Jun Yoon
,
Kee-Young Yoo
Papers
Integrated Access Permission: Secure and Simple Policy Description by Integration of File Access Vector Permission
Full-text access may be available. Sign in or learn about subscription options.
pp. 40-45
by
Takuto Yamaguchi
,
Yuichi Nakamura
,
Toshihiro Tabata
Papers
Design and Evaluation of a Bayesian-filter-based Image Spam Filtering Method
Full-text access may be available. Sign in or learn about subscription options.
pp. 46-51
by
Masahiro Uemura
,
Toshihiro Tabata
Papers
Collaborative Privacy Management System
Full-text access may be available. Sign in or learn about subscription options.
pp. 52-56
by
In Joo Jang
,
Wenbo Shi
,
Hyeong Seon Yoo
Papers
Biometric Handshake Protocol on Telebiometric System Mechanism for National Infrastructure
Full-text access may be available. Sign in or learn about subscription options.
pp. 57-60
by
Yong-Nyuo Shin
,
Yong-Jun Lee
,
Woochang Shin
,
Jin-Young Choi
Papers
Use of LFSR for Sensor Network Security: A New Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 61-66
by
Kalpana Sharma
,
Vikash Varun
,
U. Maulick
,
Rohit Kumar
,
Vikrant Jain
Papers
A3RP : Anonymous and Authenticated Ad Hoc Routing Protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 67-72
by
Jung Ha Paik
,
Bum Han Kim
,
Dong Hoon Lee
Papers
Implementation and Analysis of New Lightweight Cryptographic Algorithm Suitable for Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 73-76
by
Woo Kwon Koo
,
Hwaseong Lee
,
Yong Ho Kim
,
Dong Hoon Lee
Papers
Integrating Trust and Role for Secure Interoperation in Multi-Domain Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 77-82
by
Jianfeng Lu
,
Ruixuan Li
,
Zhengding Lu
,
Bing Li
Papers
Breaking a Smart Card based Secure Password Authentication Scheme
Full-text access may be available. Sign in or learn about subscription options.
pp. 83-86
by
Eun-Jun Yoon
,
Kee-Young Yoo
Papers
Improvement of a Fingerprint-Based Remote User Authentication Scheme
Full-text access may be available. Sign in or learn about subscription options.
pp. 87-92
by
Jing Xu
,
Wen-Tao Zhu
,
Deng-Guo Feng
Papers
SSDR - Reconfigurable Firewall: Reconfiguration Model Impact
Full-text access may be available. Sign in or learn about subscription options.
pp. 93-97
by
Fabio Dacencio Pereira
,
Edward David Moreno Ordonez
Papers
Information Leakage via Electromagnetic Emanation and Effectiveness of Averaging Technique
Full-text access may be available. Sign in or learn about subscription options.
pp. 98-101
by
Hidema Tanaka
Papers
Experimental Evaluation of Different Intensity Distributions for Palmprint Identification
Full-text access may be available. Sign in or learn about subscription options.
pp. 102-105
by
Yanqiang Zhang
,
Zhengding Qiu
,
Dongmei Sun
Papers
A Forward-Secure Signature with Backward-Secure Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 106-110
by
D.J. Guan
,
Dai-Rui Lin
,
Chih-I Wang
Papers
A Survey for Open Shortest Path First Weight Setting (OSPFWS) Problem
Full-text access may be available. Sign in or learn about subscription options.
pp. 111-116
by
Ahmed Abo Ghazala
,
Ayman El-Sayed
,
Mervat Mousa
Papers
Secure Delegation Model based on SAML in Ubiquitous Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 117-121
by
Kyu Il Kim
,
Hae Kyung Lee
,
Ung Mo Kim
Papers
Fine Granularity Access Rights for Information Flow Control in Object Oriented Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 122-128
by
Allaoua Maamir
,
Abdelaziz Fellah
,
Lina A. Salem
A Contemporary Technique to Guarantee Quality of Service (QoS) for Heterogeneous Data Traffic
Full-text access may be available. Sign in or learn about subscription options.
pp. 210-213
by
Calduwel P. Newton
Papers
Improved Impossible Differential Cryptanalysis of ARIA
Full-text access may be available. Sign in or learn about subscription options.
pp. 129-132
by
Shenhua Li
,
Chunyan Song
Papers
A Static Java Birthmark Based on Operand Stack Behaviors
Full-text access may be available. Sign in or learn about subscription options.
pp. 133-136
by
Heewan Park
,
Hyun-il Lim
,
Seokwoo Choi
,
Taisook Han
Papers
Design and Implementation for EPC System Method to Authentication and Cryptography
Full-text access may be available. Sign in or learn about subscription options.
pp. 137-141
by
Dae-Jung Kim
,
Jeong-Jai Kim
,
Seung-Min Lee
,
Moon-Seog Jun
Papers
A Unified Threat Model for Assessing Threat in Web Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 142-145
by
Xiaohong Li
,
Ke He
Papers
Smart Card-Based Three-Party Key Exchange without Server's Assisitance
Full-text access may be available. Sign in or learn about subscription options.
pp. 146-149
by
Yong Hun Kim
,
Taek Young Youn
,
Young Ho Park
,
Seok Hee Hong
Papers
Implicit Detection of Hidden Processes with a Local-Booted Virtual Machine
Full-text access may be available. Sign in or learn about subscription options.
pp. 150-155
by
Yan Wen
,
Jinjing Zhao
,
Huaimin Wang
Papers
Cryptographic Key Management for SCADA Systems-Issues and Perspectives
Full-text access may be available. Sign in or learn about subscription options.
pp. 156-161
by
Ludovic Pi?tre-Cambac?d?
,
Pascal Sitbon
Papers
Anonymous and Traceable Authentication Scheme using Smart Cards
Full-text access may be available. Sign in or learn about subscription options.
pp. 162-165
by
Seil Kim
,
Hyun Sook Rhee
,
Ji Young Chun
,
Dong Hoon Lee
Papers
Anomaly Detection Using LibSVM Training Tools
Full-text access may be available. Sign in or learn about subscription options.
pp. 166-171
by
Chu-Hsing Lin
,
Jung-Chun Liu
,
Chia-Han Ho
Papers
Maximizing Return on Security Safeguard Investment with Constraint Satisfaction
Full-text access may be available. Sign in or learn about subscription options.
pp. 172-175
by
Taek Lee
,
Dohoon Kim
,
Hoh Peter In
Papers
E-commerce and E-commerce Fraud in Saudi Arabia: A Case Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 176-180
by
Saleh Alfuraih
Papers
Implementation and Automatic Testing for Security Enhancement of Linux Based on Least Privilege
Full-text access may be available. Sign in or learn about subscription options.
pp. 181-186
by
Gaoshou Zhai
,
Jie Zeng
,
Miaoxia Ma
,
Liang Zhang
Papers
S3PR: Secure Serverless Search Protocols for RFID
Full-text access may be available. Sign in or learn about subscription options.
pp. 187-192
by
Sheikh I. Ahamed
,
Farzana Rahman
,
Endadul Hoque
,
Fahim Kawsar
,
Tatsuo Nakajima
Papers
Cyber Criminal Activity Analysis Models using Markov Chain for Digital Forensics
Full-text access may be available. Sign in or learn about subscription options.
pp. 193-198
by
Do Hoon Kim
,
Hoh Peter In
Papers
A New Electronic Communication Technology - VT Position Code Communication Technology and Its Implementation
Full-text access may be available. Sign in or learn about subscription options.
pp. 199-205
by
Shi Ying Zhou
,
Gui He Qin
,
Yu Bo Jin
CPOP: Cryptography Process Offloading Proxy for Resource Constrained Devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 289-294
by
Yu-Shu They
,
Seong-Yee Phang
,
Sanggon Lee
,
Hoon Jae Lee
,
Hyotaek Lim
Papers
Research on Software Dependability Testing Profile in Internet Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 206-209
by
Changjie Ma
,
Jing Zhao
,
Guochang Gu
,
Xiaoyun Ma
Papers
Correlating Multi-Step Attack and Constructing Attack Scenarios Based on Attack Pattern Modeling
Full-text access may be available. Sign in or learn about subscription options.
pp. 214-219
by
Zhijie Liu
,
Chongjun Wang
,
Shifu Chen
Papers
An Approach to Mitigate Wormhole Attack in Wireless Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 220-225
by
Gunhee Lee
,
Jungtaek Seo
,
Dong-kyoo Kim
Papers
CRYPTEX Model for Software Source Code
Full-text access may be available. Sign in or learn about subscription options.
pp. 226-230
by
ByungRae Cha
Papers
Live Forensic Analysis of a Compromised Linux System Using LECT (Linux Evidence Collection Tool)
Full-text access may be available. Sign in or learn about subscription options.
pp. 231-236
by
Joonho Choi
,
Antonio Savoldi
,
Paolo Gubian
,
Seokhee Lee
,
Sangjin Lee
Papers
A New Approach for Hiding Policy and Checking Policy Consistency
Full-text access may be available. Sign in or learn about subscription options.
pp. 237-242
by
Deqing Zou
,
Zhensong Liao
Papers
Password Generation of OTP System using Fingerprint Features
Full-text access may be available. Sign in or learn about subscription options.
pp. 243-247
by
ByungRae Cha
,
ChulWon Kim
Papers
Detection of Hidden Information in Forensic Tools
Full-text access may be available. Sign in or learn about subscription options.
pp. 248-252
by
Yeog Kim
,
Jewan Bang
,
Sangjin Lee
,
Jongin Lim
Papers
A Novel Reputation Computing Model for Mobile Agent-Based E-Commerce Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 253-260
by
Zaobin Gan
,
Yijie Li
,
Guoqiang Xiao
,
Dengwen Wei
Papers
A Rapid and Efficient Pre-deployment Key Scheme for Secure Data Transmissions in Sensor Networks Using Lagrange Interpolation Polynomial
Full-text access may be available. Sign in or learn about subscription options.
pp. 261-265
by
Hua-Yi Lin
,
De-Jun Pan
,
Xin-Xiang Zhao
,
Zhi-Ren Qiu
Papers
Cryptanalysis and Improvement on a Digital Signature Scheme without using One-way Hash and Message Redundancy
Full-text access may be available. Sign in or learn about subscription options.
pp. 266-269
by
Jie Liu
,
Jianhua Li
Papers
Deciding Optimal Entropic Thresholds to Calibrate the Detection Mechanism for Variable Rate DDoS Attacks in ISP Domain
Full-text access may be available. Sign in or learn about subscription options.
pp. 270-275
by
Anjali Sardana
,
Ramesh Joshi
,
Tai-hoon Kim
Papers
A Group Rekeying Scheme for Location-aware Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 276-279
by
Subir Biswas
,
Syed Rehan Afzal
,
Gunhee Lee
,
Dong-kyoo Kim
Papers
Revision of Security Proof on f-OAEP
Full-text access may be available. Sign in or learn about subscription options.
pp. 280-284
by
Jie Liu
,
Gongliang Chen
,
Jianhua Li
Papers
Authenticated Group Key Distribution for Unreliable Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 285-288
by
Hwaseong Lee
,
Yon Ho Kim
,
Dong Hoon Lee
Papers
Towards Optimal Software Rejuvenation in Wireless Sensor Networks using Self-Regenerative Components
Full-text access may be available. Sign in or learn about subscription options.
pp. 295-300
by
Sazia Parvin
,
Dong Seong Kim
,
Jong Sou Park
Papers
A Hypertension Management System with Emergency Monitoring
Full-text access may be available. Sign in or learn about subscription options.
pp. 301-306
by
Eungyeong Kim
,
Hyogun Yoon
,
Yupeng Zhang
,
Malrey Lee
,
Jaewan Lee
Papers
Foot Step Based Person Identification Using Histogram Similarity and Wavelet Decomposition
Full-text access may be available. Sign in or learn about subscription options.
pp. 307-311
by
Ahmed Mostayed
,
Sikyung Kim
,
Mohammad Mynuddin Gani Mazumder
,
Se Jin Park
Papers
Memory-Efficient Fuzzy Fingerprint Vault based on the Geometric Hashing
Full-text access may be available. Sign in or learn about subscription options.
pp. 312-315
by
Sungju Lee
,
Daesung Moon
,
Hanna Choi
,
Yongwha Chung
Papers
Analyzing the Secure and Energy Efficient Transmissions of Compressed Fingerprint Images using Encryption and Watermarking
Full-text access may be available. Sign in or learn about subscription options.
pp. 316-320
by
Seungwoo Hong
,
Hakjae Kim
,
Sungju Lee
,
Yongwha Chung
Papers
Detection SYN Flooding Attacks Using Fuzzy Logic
Full-text access may be available. Sign in or learn about subscription options.
pp. 321-325
by
Taner Tuncer
,
Yetkin Tatar
Papers
Integrated Wireless Rogue Access Point Detection and Counterattack System
Full-text access may be available. Sign in or learn about subscription options.
pp. 326-331
by
Songrit Srilasak
,
Kitti Wongthavarawat
,
Anan Phonphoem
Papers
A Model of Sharing Based Multi-Agent to Support Adaptive Service in Ubiquitous Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 332-337
by
Hyogun Yoon
,
Eungyeong Kim
,
Malrey Lee
,
Jeawan Lee
,
Thomas Gatton
Papers
Positioning using Acceleration and Moving Direction
Full-text access may be available. Sign in or learn about subscription options.
pp. 338-341
by
Bongeun Gu
,
Yunsik Kwak
Papers
A Comparative Study of RFID Solutions for Security and Privacy: POP vs. Previous Solutions
Full-text access may be available. Sign in or learn about subscription options.
pp. 342-349
by
Krishan Sabaragamu Koralalage
,
Jingde Cheng
Papers
A Security Engineering Environment Based on ISO/IEC Standards: Providing Standard, Formal, and Consistent Supports for Design, Development, Operation, and Maintenance of Secure Information Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 350-354
by
Jingde Cheng
,
Yuichi Goto
,
Shoichi Morimoto
,
Daisuke Horie
Papers
Towards Reliable Trust Management based on Structural Trust Scopes of Distributed Roles
Full-text access may be available. Sign in or learn about subscription options.
pp. 355-359
by
Gang Yin
,
Ning Zhou
,
Huaimin Wang
Papers
An Inter-Classes Obfuscation Method for Java Program
Full-text access may be available. Sign in or learn about subscription options.
pp. 360-365
by
Xuesong Zhang
,
Fengling He
,
Wanli Zuo
Papers
Secure Authentication on WiMAX with Neural Cryptography
Full-text access may be available. Sign in or learn about subscription options.
pp. 366-369
by
Dong Hu
,
YuYan Wang
Papers
Security Research on WiMAX with Neural Cryptography
Full-text access may be available. Sign in or learn about subscription options.
pp. 370-373
by
Dong Hu
,
YuYan Wang
Papers
Towards a Security Cockpit
Full-text access may be available. Sign in or learn about subscription options.
pp. 374-379
by
Nguyen Pham
,
Loic Baud
,
Patrick Bellot
,
Michel Riguidel
Papers
Sufficient Conditions for Secrecy under Any Equational Theories
Full-text access may be available. Sign in or learn about subscription options.
pp. 380-383
by
Hanane Houmani
,
Mohamed Mejri
Papers
Why MSN Lost to QQ in China Market? Different Privacy Protection Design
Full-text access may be available. Sign in or learn about subscription options.
pp. 384-388
by
Zhaoli Meng
,
Meiyun Zuo
Papers
Teaching Computer Security using Xen in a Virtual Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 389-392
by
Dong Hu
,
YuYan Wang
Papers
Windows Registry and Hiding Suspects' Secret in Registry
Full-text access may be available. Sign in or learn about subscription options.
pp. 393-398
by
Youngsoo Kim
,
Dowon Hong
Papers
A New Forensic Image Format for High Capacity Disk Storage
Full-text access may be available. Sign in or learn about subscription options.
pp. 399-402
by
Sang Su Lee
,
Tae-Sik Park
,
Sang-Uk Shin
,
Sung-Kyong Un
,
Do-Won Hong
Simple and Flexible Random Key Predistribution Schemes for Wireless Sensor Networks Using Deployment Knowledge
Full-text access may be available. Sign in or learn about subscription options.
pp. 488-494
by
Sinan Emre Tasci
,
Ersoy Bayramoglu
,
Albert Levi
Papers
A Parallel GNFS Algorithm with the Improved Linbox Montgomery Block Lanczos Method for Integer Factorization
Full-text access may be available. Sign in or learn about subscription options.
pp. 403-409
by
Laurence Tianruo Yang
,
Li Xu
,
Jong Hyuk Park
Papers
A Study on the Compound Communication Network over the High Voltage Power Line for Distribution Automation System
Full-text access may be available. Sign in or learn about subscription options.
pp. 410-414
by
Duckhwa Hyun
,
Younghun Lee
Papers
Security Policy Pre-evaluation towards Risk Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 415-420
by
Yi Han
,
Yoshiaki Hori
,
Kouichi Sakurai
Papers
A Secure Virtualized Logging Scheme for Digital Forensics in Comparison with Kernel Module Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 421-426
by
Bin-Hui Chou
,
Kohei Tatara
,
Taketoshi Sakuraba
,
Yoshiaki Hori
,
Kouichi Sakurai
Papers
Exploring Security Countermeasures along the Attack Sequence
Full-text access may be available. Sign in or learn about subscription options.
pp. 427-432
by
Taketoshi Sakuraba
,
Bin-Hui Chou
,
Seiichi Domyo
,
Kouichi Sakurai
Papers
Methodology for Evaluating Information Security Countermeasures of a System
Full-text access may be available. Sign in or learn about subscription options.
pp. 433-438
by
Takaaki Shigematsu
,
Bin-Hui Chou
,
Yoshiaki Hori
,
Kouichi Sakurai
Papers
Liveness Detection for Biometric Systems Based on Papillary Lines
Full-text access may be available. Sign in or learn about subscription options.
pp. 439-444
by
Martin Drahansky
,
Dana Lodrova
Papers
Automated Spyware Detection Using End User License Agreements
Full-text access may be available. Sign in or learn about subscription options.
pp. 445-452
by
Martin Boldt
,
Andreas Jacobsson
,
Niklas Lavesson
,
Paul Davidsson
Papers
A Web Metering Scheme for Fair Advertisement Transactions
Full-text access may be available. Sign in or learn about subscription options.
pp. 453-456
by
Ren-Chiun Wang
,
Wen-Shenq Juang
,
Chin-Laung Lei
Papers
An Organizational Framework for Building Secure Software
Full-text access may be available. Sign in or learn about subscription options.
pp. 457-460
by
Abdelwahab Hamou-Lhadj
,
AbdelKrim Hamou-Lhadj
Papers
Catalog of Metrics for Assessing Security Risks of Software throughout the Software Development Life Cycle
Full-text access may be available. Sign in or learn about subscription options.
pp. 461-465
by
Khalid Sultan
,
Abdeslam En-Nouaary
,
Abdelwahab Hamou-Lhadj
Papers
Strategic Planning for Information Security and Assurance
Full-text access may be available. Sign in or learn about subscription options.
pp. 466-471
by
Daniel Port
,
Rick Kazman
,
Ann Takenaka
Showing 100 out of 121
Load More
Load All