Default Cover Image

2008 International Conference on Information Security and Assurance (ISA '08)

April 24 2008 to April 26 2008

Busan

Table of Contents

[Title page i]Freely available from IEEE.
[Title page iii]Freely available from IEEE.
[Copyright notice]Freely available from IEEE.
Papers
Title Page iFreely available from IEEE.pp. i
Papers
Title Page iiiFreely available from IEEE.pp. iii
Papers
Copyright PageFreely available from IEEE.pp. iv
Papers
Table of ContentsFreely available from IEEE.pp. v-xi
Papers
Welcome Message from the General ChairsFreely available from IEEE.pp. xii
Papers
Welcome Message from the Program ChairsFreely available from IEEE.pp. xiii-xiv
Conference organizationFreely available from IEEE.pp. xv-xix
Papers
Secure Deniable Authenticated Key Establishment for Internet ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. 3-6
Papers
An Intrusion Detection System in Mobile AdHoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 7-14
Papers
IDEA: A New Intrusion Detection Data SourceFull-text access may be available. Sign in or learn about subscription options.pp. 15-19
Papers
A Security Protocol Compiler Generating C Source CodesFull-text access may be available. Sign in or learn about subscription options.pp. 20-25
Papers
Incident-Driven Memory Snapshot for Full-Virtualized OS Using Interruptive Debugging TechniquesFull-text access may be available. Sign in or learn about subscription options.pp. 26-31
Papers
SCV: Structure and Constant Value based Binary DiffingFull-text access may be available. Sign in or learn about subscription options.pp. 32-35
Papers
Secure Deniable Authentication Protocol Based on ElGamal CryptographyFull-text access may be available. Sign in or learn about subscription options.pp. 36-39
Papers
Design and Evaluation of a Bayesian-filter-based Image Spam Filtering MethodFull-text access may be available. Sign in or learn about subscription options.pp. 46-51
Papers
Collaborative Privacy Management SystemFull-text access may be available. Sign in or learn about subscription options.pp. 52-56
Papers
Biometric Handshake Protocol on Telebiometric System Mechanism for National InfrastructureFull-text access may be available. Sign in or learn about subscription options.pp. 57-60
Papers
Use of LFSR for Sensor Network Security: A New ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 61-66
Papers
A3RP : Anonymous and Authenticated Ad Hoc Routing ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 67-72
Papers
Implementation and Analysis of New Lightweight Cryptographic Algorithm Suitable for Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 73-76
Papers
Integrating Trust and Role for Secure Interoperation in Multi-Domain EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 77-82
Papers
Breaking a Smart Card based Secure Password Authentication SchemeFull-text access may be available. Sign in or learn about subscription options.pp. 83-86
Papers
Improvement of a Fingerprint-Based Remote User Authentication SchemeFull-text access may be available. Sign in or learn about subscription options.pp. 87-92
Papers
SSDR - Reconfigurable Firewall: Reconfiguration Model ImpactFull-text access may be available. Sign in or learn about subscription options.pp. 93-97
Papers
Information Leakage via Electromagnetic Emanation and Effectiveness of Averaging TechniqueFull-text access may be available. Sign in or learn about subscription options.pp. 98-101
Papers
Experimental Evaluation of Different Intensity Distributions for Palmprint IdentificationFull-text access may be available. Sign in or learn about subscription options.pp. 102-105
Papers
A Forward-Secure Signature with Backward-Secure DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 106-110
Papers
A Survey for Open Shortest Path First Weight Setting (OSPFWS) ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 111-116
Papers
Secure Delegation Model based on SAML in Ubiquitous EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 117-121
Papers
Fine Granularity Access Rights for Information Flow Control in Object Oriented SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 122-128
A Contemporary Technique to Guarantee Quality of Service (QoS) for Heterogeneous Data TrafficFull-text access may be available. Sign in or learn about subscription options.pp. 210-213
Papers
Improved Impossible Differential Cryptanalysis of ARIAFull-text access may be available. Sign in or learn about subscription options.pp. 129-132
Papers
A Static Java Birthmark Based on Operand Stack BehaviorsFull-text access may be available. Sign in or learn about subscription options.pp. 133-136
Papers
Design and Implementation for EPC System Method to Authentication and CryptographyFull-text access may be available. Sign in or learn about subscription options.pp. 137-141
Papers
A Unified Threat Model for Assessing Threat in Web ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 142-145
Papers
Smart Card-Based Three-Party Key Exchange without Server's AssisitanceFull-text access may be available. Sign in or learn about subscription options.pp. 146-149
Papers
Implicit Detection of Hidden Processes with a Local-Booted Virtual MachineFull-text access may be available. Sign in or learn about subscription options.pp. 150-155
Papers
Cryptographic Key Management for SCADA Systems-Issues and PerspectivesFull-text access may be available. Sign in or learn about subscription options.pp. 156-161
Papers
Anonymous and Traceable Authentication Scheme using Smart CardsFull-text access may be available. Sign in or learn about subscription options.pp. 162-165
Papers
Anomaly Detection Using LibSVM Training ToolsFull-text access may be available. Sign in or learn about subscription options.pp. 166-171
Papers
Maximizing Return on Security Safeguard Investment with Constraint SatisfactionFull-text access may be available. Sign in or learn about subscription options.pp. 172-175
Papers
E-commerce and E-commerce Fraud in Saudi Arabia: A Case StudyFull-text access may be available. Sign in or learn about subscription options.pp. 176-180
Papers
Implementation and Automatic Testing for Security Enhancement of Linux Based on Least PrivilegeFull-text access may be available. Sign in or learn about subscription options.pp. 181-186
Papers
S3PR: Secure Serverless Search Protocols for RFIDFull-text access may be available. Sign in or learn about subscription options.pp. 187-192
Papers
Cyber Criminal Activity Analysis Models using Markov Chain for Digital ForensicsFull-text access may be available. Sign in or learn about subscription options.pp. 193-198
Papers
A New Electronic Communication Technology - VT Position Code Communication Technology and Its ImplementationFull-text access may be available. Sign in or learn about subscription options.pp. 199-205
CPOP: Cryptography Process Offloading Proxy for Resource Constrained DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 289-294
Papers
Research on Software Dependability Testing Profile in Internet EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 206-209
Papers
Correlating Multi-Step Attack and Constructing Attack Scenarios Based on Attack Pattern ModelingFull-text access may be available. Sign in or learn about subscription options.pp. 214-219
Papers
An Approach to Mitigate Wormhole Attack in Wireless Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 220-225
Papers
CRYPTEX Model for Software Source CodeFull-text access may be available. Sign in or learn about subscription options.pp. 226-230
Papers
Live Forensic Analysis of a Compromised Linux System Using LECT (Linux Evidence Collection Tool)Full-text access may be available. Sign in or learn about subscription options.pp. 231-236
Papers
A New Approach for Hiding Policy and Checking Policy ConsistencyFull-text access may be available. Sign in or learn about subscription options.pp. 237-242
Papers
Password Generation of OTP System using Fingerprint FeaturesFull-text access may be available. Sign in or learn about subscription options.pp. 243-247
Papers
Detection of Hidden Information in Forensic ToolsFull-text access may be available. Sign in or learn about subscription options.pp. 248-252
Papers
A Novel Reputation Computing Model for Mobile Agent-Based E-Commerce SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 253-260
Papers
Cryptanalysis and Improvement on a Digital Signature Scheme without using One-way Hash and Message RedundancyFull-text access may be available. Sign in or learn about subscription options.pp. 266-269
Papers
Deciding Optimal Entropic Thresholds to Calibrate the Detection Mechanism for Variable Rate DDoS Attacks in ISP DomainFull-text access may be available. Sign in or learn about subscription options.pp. 270-275
Papers
A Group Rekeying Scheme for Location-aware Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 276-279
Papers
Revision of Security Proof on f-OAEPFull-text access may be available. Sign in or learn about subscription options.pp. 280-284
Papers
Authenticated Group Key Distribution for Unreliable Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 285-288
Papers
Towards Optimal Software Rejuvenation in Wireless Sensor Networks using Self-Regenerative ComponentsFull-text access may be available. Sign in or learn about subscription options.pp. 295-300
Papers
A Hypertension Management System with Emergency MonitoringFull-text access may be available. Sign in or learn about subscription options.pp. 301-306
Papers
Foot Step Based Person Identification Using Histogram Similarity and Wavelet DecompositionFull-text access may be available. Sign in or learn about subscription options.pp. 307-311
Papers
Memory-Efficient Fuzzy Fingerprint Vault based on the Geometric HashingFull-text access may be available. Sign in or learn about subscription options.pp. 312-315
Papers
Detection SYN Flooding Attacks Using Fuzzy LogicFull-text access may be available. Sign in or learn about subscription options.pp. 321-325
Papers
Integrated Wireless Rogue Access Point Detection and Counterattack SystemFull-text access may be available. Sign in or learn about subscription options.pp. 326-331
Papers
A Model of Sharing Based Multi-Agent to Support Adaptive Service in Ubiquitous EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 332-337
Papers
Positioning using Acceleration and Moving DirectionFull-text access may be available. Sign in or learn about subscription options.pp. 338-341
Papers
A Comparative Study of RFID Solutions for Security and Privacy: POP vs. Previous SolutionsFull-text access may be available. Sign in or learn about subscription options.pp. 342-349
Papers
Towards Reliable Trust Management based on Structural Trust Scopes of Distributed RolesFull-text access may be available. Sign in or learn about subscription options.pp. 355-359
Papers
An Inter-Classes Obfuscation Method for Java ProgramFull-text access may be available. Sign in or learn about subscription options.pp. 360-365
Papers
Secure Authentication on WiMAX with Neural CryptographyFull-text access may be available. Sign in or learn about subscription options.pp. 366-369
Papers
Security Research on WiMAX with Neural CryptographyFull-text access may be available. Sign in or learn about subscription options.pp. 370-373
Papers
Towards a Security CockpitFull-text access may be available. Sign in or learn about subscription options.pp. 374-379
Papers
Sufficient Conditions for Secrecy under Any Equational TheoriesFull-text access may be available. Sign in or learn about subscription options.pp. 380-383
Papers
Why MSN Lost to QQ in China Market? Different Privacy Protection DesignFull-text access may be available. Sign in or learn about subscription options.pp. 384-388
Papers
Teaching Computer Security using Xen in a Virtual EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 389-392
Papers
Windows Registry and Hiding Suspects' Secret in RegistryFull-text access may be available. Sign in or learn about subscription options.pp. 393-398
Papers
A New Forensic Image Format for High Capacity Disk StorageFull-text access may be available. Sign in or learn about subscription options.pp. 399-402
Papers
A Parallel GNFS Algorithm with the Improved Linbox Montgomery Block Lanczos Method for Integer FactorizationFull-text access may be available. Sign in or learn about subscription options.pp. 403-409
Papers
A Study on the Compound Communication Network over the High Voltage Power Line for Distribution Automation SystemFull-text access may be available. Sign in or learn about subscription options.pp. 410-414
Papers
Security Policy Pre-evaluation towards Risk AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 415-420
Papers
Exploring Security Countermeasures along the Attack SequenceFull-text access may be available. Sign in or learn about subscription options.pp. 427-432
Papers
Methodology for Evaluating Information Security Countermeasures of a SystemFull-text access may be available. Sign in or learn about subscription options.pp. 433-438
Papers
Liveness Detection for Biometric Systems Based on Papillary LinesFull-text access may be available. Sign in or learn about subscription options.pp. 439-444
Papers
Automated Spyware Detection Using End User License AgreementsFull-text access may be available. Sign in or learn about subscription options.pp. 445-452
Papers
A Web Metering Scheme for Fair Advertisement TransactionsFull-text access may be available. Sign in or learn about subscription options.pp. 453-456
Papers
An Organizational Framework for Building Secure SoftwareFull-text access may be available. Sign in or learn about subscription options.pp. 457-460
Papers
Strategic Planning for Information Security and AssuranceFull-text access may be available. Sign in or learn about subscription options.pp. 466-471
Showing 100 out of 121