The Community for Technology Leaders
RSS Icon
Subscribe
Information Assurance and Security, International Symposium on (2007)
Manchester, United Kingdom
Aug. 29, 2007 to Aug. 31, 2007
ISBN: 0-7695-2876-7
TABLE OF CONTENTS
Introduction
pp. xiii-xiv
pp. xv
E-Commerce Security
Lisha He , University of Mancester, UK
Ning Zhang , University of Mancester, UK
Lirong He , University of Mancester, UK
Ian Rogers , University of Mancester, UK
pp. 3-8
Satish Devane , Ramrao Adik Institute of Technology, India
Madhumita Chatterjee , Ramrao Adik Institute of Technology, India
Deepak Phatak , Indian Institute of Technology, India
pp. 9-14
Hao Wang , Guangdong University of Technology, China
Yuyi Ou , Guangdong University of Technology, China
Jie Ling , Guangdong University of Technology, China
Lu Liang , Guangdong University of Technology, China
Xiang Xu , State University of New York at Stony Brook, USA
pp. 15-20
Ibrahim M. Ibrahim , Information Technology Industry Development Agency, Egypt
Sherif Hazem Nour El-Din , Information Technology Industry Development Agency, Egypt
Abdel Fatah A. Hegazy , Arab Academy for Science and Technology and Maritime Transportation, Egypt
pp. 21-28
Network Security
Pierre E. Abi-Char , GET/Institut National des Telecommunications, France
Abdallah Mhamed , GET/Institut National des Telecommunications, France
Bachar El-Hassan , Libanese University, Lebanon
pp. 33-38
Sigurd Eskeland , Agder University College, Norway
Vladimir Oleshchuk , Agder University College, Norway
pp. 39-43
Kashif Kifayat , Liverpool John Moores University, UK
Madjid Merabti , Liverpool John Moores University, UK
Qi Shi , Liverpool John Moores University, UK
David Llewellyn-Jones , Liverpool John Moores University, UK
pp. 44-49
Su Mon Bo , University of Hertfordshire, UK
Hannan Xiao , University of Hertfordshire, UK
Aderemi Adereti , University of Hertfordshire, UK
James A. Malcolm , University of Hertfordshire, UK
Bruce Christianson , University of Hertfordshire, UK
pp. 50-55
Tarag Fahad , Liverpool John Moores University, UK
Djamel Djenouri , CERIST, Algeria
Robert Askwith , Liverpool John Moores University, UK
pp. 56-64
Cryptographic Schemes and Applications
Ashutosh Saxena , Infosys Technologies Ltd., India
pp. 65-70
Thian Song Ong , Multimedia University, Malaysia
Andrew Beng Jin Teoh , Multimedia University, Malaysia
pp. 71-76
D. Hristu-Varsakelis , University of Macedonia, Greece
K. Chalkias , University of Macedonia, Greece
G. Stephanides , University of Macedonia, Greece
pp. 77-82
Evangelos Papoutsis , University of Kent, UK
Gareth Howells , University of Kent, UK
Andrew Hopkins , University of Essex, UK
Klaus McDonald-Maier , University of Essex, UK
pp. 83-88
Pierre E. Abi-Char , GET/Institut National des Telecommunications, France
Abdallah Mhamed , GET/Institut National des Telecommunications, France
Bachar El-Hassan , Libanese University, Lebanon
pp. 89-94
S. Bartolini , Dipartimento di Ingegneria dell'Informazione, Italy
G. Castagnini , Dipartimento di Ingegneria dell'Informazione, Italy
E. Martinelli , Dipartimento di Ingegneria dell'Informazione, Italy
pp. 95-100
Sandipan Dey , Anshin Software Private Limited, India
Ajith Abraham , Norwegian University of Science and Technology, Norway
Sugata Sanyal , Tata Institute of Fundamental Research, India
pp. 101-108
Authentication and Access Control
Irfan Ahmed , Ajou University, Korea
Usman Tariq , Ajou University, Korea
Shoaib Mukhtar , Ajou University, Korea
Kyung-suk Lhee , Ajou University, Korea
S.W. Yoo , Ajou University, Korea
Piao Yanji , Ajou University, Korea
ManPyo Hong , Ajou University, Korea
pp. 109-114
M. M. Chowdhury , The University of Manchester, UK
pp. 115-118
Wei Zhou , University of Potsdam, Germany
Christoph Meinel , University of Potsdam, Germany
pp. 119-124
Hassan Takabi , Sharif University of Technology, Iran
Morteza Amini , Sharif University of Technology, Iran
Rasool Jalili , Sharif University of Technology, Iran
pp. 125-130
Hassan Takabi , Sharif University of Technology, Iran
Morteza Amini , Sharif University of Technology, Iran
Rasool Jalili , Sharif University of Technology, Iran
pp. 131-136
Bo-Chao Cheng , National Chung-Cheng University, Taiwan
Huan Chen , National Chung-Cheng University, Taiwan
Ryh-Yuh Tseng , National Chung-Cheng University, Taiwan
pp. 137-142
Naikuo Yang , University of Manchester, UK
Howard Barringer , University of Manchester, UK
Ning Zhang , University of Manchester, UK
pp. 143-148
Yue Zhang , University of Pittsburgh, USA
James B.D. Joshi , University of Pittsburgh, USA
pp. 149-154
Aleksandra Nenadic , University of Manchester, UK
Ning Zhang , University of Manchester, UK
Li Yao , University of Manchester, UK
Terry Morrow , University of Manchester, UK
pp. 155-160
Intrusion Prevention
Virginia N. L. Franqueira , University of Twente, The Netherlands
Raul H. C. Lopes , Brunel University, UK
pp. 161-164
Alexey Smirnov , Stony Brook University, USA
Tzi-cker Chiueh , Stony Brook University, USA
pp. 165-170
Muhammad Sher , Technical University Berlin, Germany
Thomas Magedanz , Technical University Berlin, Germany
pp. 171-176
Do Hoon Kim , Korea University, Korea
Taek Lee , Korea University, Korea
Sung-Oh David Jung , Korea University, Korea
Hoh Peter In , Korea University, Korea
Hee Jo Lee , Korea University, Korea
pp. 177-182
Kjetil Haslum , Norwegian University of Science and Technology, Norway
Ajith Abraham , Norwegian University of Science and Technology, Norway
Svein Knapskog , Norwegian University of Science and Technology, Norway
pp. 183-190
Intrusion Detection
Anjali Sardana , Indian Institute of Technology, India
Krishan Kumar , Indian Institute of Technology, India
R. C. Joshi , Indian Institute of Technology, India
pp. 191-196
Neil Cooke , University of Surrey and CESG, GCHQ, UK
Lee Gillam , University of Surrey, UK
Ahmet Kondoz , University of Surrey, UK
pp. 197-202
Arnur G. Tokhtabayev , Binghamton University
Victor A. Skormin , Binghamton University
pp. 203-208
Fabrizio Baiardi , Universita di Pisa, Italy
Daniele Sgandurra , Universita di Pisa, Italy
pp. 209-214
Simon Fong , University of Macau
Zhuang Yan , University of Macau
pp. 221-226
Eric Medvet , University of Trieste, Italy
Cyril Fillon , University of Trieste, Italy
Alberto Bartoli , University of Trieste, Italy
pp. 227-234
Security Analysis
Zhenrong Yang , Concordia University, Canada
Aiman Hanna , Concordia University, Canada
Mourad Debbabi , Concordia University, Canada
pp. 235-240
Patroklos Argyroudis , University of Dublin, Ireland
Robert McAdoo , University of Dublin, Ireland
Stephen Toner , University of Dublin, Ireland
Linda Doyle , University of Dublin, Ireland
Donal O'Mahony , University of Dublin, Ireland
pp. 241-246
Fabio Massacci , University of Trento, Italy
Artsiom Yautsiukhin , University of Trento, Italy
pp. 247-252
Mohamed Saleh , Concordia University, Canada
Mourad Debbabi , Concordia University, Canada
pp. 253-260
Data Security and Privacy
Diego Scardaci , INFN Catania, UNICO S.R.L., Italy
Giordano Scuderi , INFN Catania, UNICO S.R.L., Italy
pp. 261-266
Dan Feng , Huazhong University of Science and Technology, China
Lanxiang Chen , Huazhong University of Science and Technology, China
Lingfang Zeng , Huazhong University of Science and Technology, China
Zhongying Niu , Huazhong University of Science and Technology, China
pp. 267-272
Waseem Ahmad , University of Illinois, USA
Ashfaq Khokhar , University of Illinois, USA
pp. 273-278
Dhiah el Diehn I. Abou-Tair , University of Siegen, Germany
Stefan Berlik , University of Siegen, Germany
Udo Kelter , University of Siegen, Germany
pp. 279-284
Waleed A. Alrodhan , University of London, UK
Chris J. Mitchell , University of London, UK
pp. 285-291
Xiangrong Xiao , Hunan University, China
Xingming Sun , Hunan University, China
Minggang Chen , Hunan University, China
pp. 292-300
Risk and Trust Management
Daniel Gideon Dresner , The National Computing Centre, UK
J. Robert (Bob) G. Wood , University of Manchester, UK
pp. 301-306
Srinivasan T. , Indian Institute of Technology Kharagpur, India
Varun Ramachandran , Sri Venkateswara College of Engineering, India
Arun Vedachalam , Sri Venkateswara College of Engineering, India
S. K. Ghosh , Indian Institute of Technology Kharagpur, India
pp. 307-312
Diala Abi Haidar , France Telecom R&D Caen, France; ENST Bretagne, France
Nora Cuppens , ENST Bretagne, France
Fr?d?ric Cuppens , ENST Bretagne, France
Herv? Debar , France Telecom R&D Caen, France
pp. 313-318
Elvis Papalilo , University of Marburg, Germany
Bernd Freisleben , University of Marburg, Germany
pp. 319-324
R. Ann Miura-Ko , Stanford University, USA
Nicholas Bambos , Stanford University, USA
pp. 325-328
Wim Mees , Royal Military Academy, Belgium
pp. 329-336
Security Requirements and Policies
Johs Hansen Hammer , NAV, Norway
Gerardo Schneider , University of Oslo, Norway
pp. 337-342
Pravin Shinde , CDAC, Mumbai, India
Priyanka Sharma , CDAC, Mumbai, India
Srinivas Guntupalli , CDAC, Mumbai, India
pp. 343-348
Jose Romero-Mariona , University of California, Irvine, USA
Hadar Ziv , University of California, Irvine, USA
Debra J. Richardson , University of California, Irvine, USA
pp. 349-356
Agent and System Security
Martijn Warnier , VU University, The Netherlands
Frances Brazier , VU University, The Netherlands
pp. 357-362
Michail Fragkakis , University of Piraeus, Greece
Nikolaos Alexandris , University of Piraeus, Greece
pp. 363-368
Bobby D. Birrer , Air Force Institute of Technology
Richard A. Raines , Air Force Institute of Technology
Rusty O. Baldwin , Air Force Institute of Technology
Barry E. Mullins , Air Force Institute of Technology
Robert W. Bennington , Air Force Research Laboratory
pp. 369-374
Wei Li , Stony Brook University
Lap-chung Lam , Stony Brook University
Tzi-cker Chiueh , Stony Brook University
pp. 375-382
Workshop on Computational Forensics
Katrin Franke , Gjovik University College, Norway
Sargur N. Srihari , University at Buffalo, USA
pp. 383-386
H. Su, D. Crookes , Queen's University Belfast, UK
A. Bouridane , Queen's University Belfast, UK
M. Gueham , Queen's University Belfast, UK
pp. 387-392
Cor J. Veenman , University of Amsterdam, the Netherlands; Netherlands Forensic Institute, Netherlands
pp. 393-398
Richard Bache , University of Strathclyde, UK
Fabio Crestani , University of Strathclyde, UK
David Canter , Centre for Investigative Psychology, UK
Donna Youngs , Centre for Investigative Psychology, UK
pp. 399-404
Slobodan Petrovic , Gjovik University College, Norway
Katrin Franke , Gjovik University College, Norway
pp. 405-410
Daniel Ramos , Universidad Autonoma de Madrid, Spain
Joaquin Gonzalez-Rodriguez , Universidad Autonoma de Madrid, Spain
Grzegorz Zadora , Institute of Forensic Research, Poland
Janina Zieba-Palus , Institute of Forensic Research, Poland
Colin Aitken , University of Edinburgh, UK
pp. 411-416
Vladimir Pervouchine , University of New South Wales Asia, Singapore
Graham Leedham , University of New South Wales Asia, Singapore
pp. 417-422
Gang Fang , University at Buffalo, USA
Sargur N. Srihari , University at Buffalo, USA
Harish Srinivasan , University at Buffalo, USA
pp. 423-428
Lucia Ballerini , European Centre for Soft Computing, Spain
Oscar Cordon , European Centre for Soft Computing, Spain
Sergio Damas , European Centre for Soft Computing, Spain; University of Granada, Spain
Jose Santamar?a , University of Cadiz, Spain
Inmaculada Aleman , University of Granada, Spain
Miguel Botella , University of Granada, Spain
pp. 429-434
Donato Impedovo , Politecnico di Bari, Italy
Mario Refice , Politecnico di Bari, Italy
pp. 435-438
Babak Mahdian , Academy of Sciences of the Czech Republic
Stanislav Saic , Academy of Sciences of the Czech Republic
pp. 439-446
Workshop on Data Hiding for Information and Multimedia Security
Junwei Huang , Hunan University, China
Xingming Sun , Hunan University, China
Huajun Huang , Hunan University, China
Gang Luo , Hunan University, China
pp. 447-452
Andrew D. Ker , Oxford University Computing Laboratory, England
pp. 453-456
Geong Sen Poh , University of London, UK
Keith M. Martin , University of London, UK
pp. 457-461
Julien Lafaye , Conservatoire National des Arts et Metiers, France
pp. 462-467
M. Venkatesan , K.S. Rangasamy College of Technology, India
P. Meenakshi Devi , K.S. Rangasamy College of Technology, India
K. Duraiswamy , K.S. Rangasamy College of Technology, India
K. Thiagarajah , PSNA College of Engg. & Technology, India
pp. 468-471
Anirban Majumdar , The University of Auckland, New Zealand
Stephen Drape , The University of Auckland, New Zealand
Clark Thomborson , The University of Auckland, New Zealand
pp. 472-477
Yan Zhu , Peking University, China
Chang-Tsun Li , University of Warwick, UK
Hong-Jia Zhao , Peking University, China
pp. 478-483
Kannan Karthik , University of Toronto, Canada
Dimitrios Hatzinakos , University of Toronto, Canada
pp. 484-489
Lingyun Xiang , Hunan University, China
Xingming Sun , Hunan University, China
Gang Luo , Hunan University, China
Can Gan , Hunan University, China
pp. 490-495
Yue Li , University of Warwick, UK
Chang-Tsun Li , University of Warwick, UK
Chia-Hung Wei , University of Warwick, UK
pp. 496-500
Author Index
Author Index (PDF)
pp. 501
6 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool