• I
  • IAS
  • 2007
  • 2007 The Third International Symposium on Information Assurance and Security
Advanced Search 
2007 The Third International Symposium on Information Assurance and Security
Manchester, United Kingdom
August 29-August 31
ISBN: 0-7695-2876-7
Table of Contents
Introduction
E-Commerce Security
Lisha He, University of Mancester, UK
Ning Zhang, University of Mancester, UK
Lirong He, University of Mancester, UK
Ian Rogers, University of Mancester, UK
pp. 3-8
Satish Devane, Ramrao Adik Institute of Technology, India
Madhumita Chatterjee, Ramrao Adik Institute of Technology, India
Deepak Phatak, Indian Institute of Technology, India
pp. 9-14
Hao Wang, Guangdong University of Technology, China
Yuyi Ou, Guangdong University of Technology, China
Jie Ling, Guangdong University of Technology, China
Lu Liang, Guangdong University of Technology, China
Xiang Xu, State University of New York at Stony Brook, USA
pp. 15-20
Ibrahim M. Ibrahim, Information Technology Industry Development Agency, Egypt
Sherif Hazem Nour El-Din, Information Technology Industry Development Agency, Egypt
Abdel Fatah A. Hegazy, Arab Academy for Science and Technology and Maritime Transportation, Egypt
pp. 21-28
Network Security
Pierre E. Abi-Char, GET/Institut National des Telecommunications, France
Abdallah Mhamed, GET/Institut National des Telecommunications, France
Bachar El-Hassan, Libanese University, Lebanon
pp. 33-38
Kashif Kifayat, Liverpool John Moores University, UK
Madjid Merabti, Liverpool John Moores University, UK
Qi Shi, Liverpool John Moores University, UK
David Llewellyn-Jones, Liverpool John Moores University, UK
pp. 44-49
Su Mon Bo, University of Hertfordshire, UK
Hannan Xiao, University of Hertfordshire, UK
Aderemi Adereti, University of Hertfordshire, UK
James A. Malcolm, University of Hertfordshire, UK
Bruce Christianson, University of Hertfordshire, UK
pp. 50-55
Tarag Fahad, Liverpool John Moores University, UK
Djamel Djenouri, CERIST, Algeria
Robert Askwith, Liverpool John Moores University, UK
pp. 56-64
Cryptographic Schemes and Applications
D. Hristu-Varsakelis, University of Macedonia, Greece
K. Chalkias, University of Macedonia, Greece
G. Stephanides, University of Macedonia, Greece
pp. 77-82
Pierre E. Abi-Char, GET/Institut National des Telecommunications, France
Abdallah Mhamed, GET/Institut National des Telecommunications, France
Bachar El-Hassan, Libanese University, Lebanon
pp. 89-94
S. Bartolini, Dipartimento di Ingegneria dell'Informazione, Italy
G. Castagnini, Dipartimento di Ingegneria dell'Informazione, Italy
E. Martinelli, Dipartimento di Ingegneria dell'Informazione, Italy
pp. 95-100
Sandipan Dey, Anshin Software Private Limited, India
Ajith Abraham, Norwegian University of Science and Technology, Norway
Sugata Sanyal, Tata Institute of Fundamental Research, India
pp. 101-108
Authentication and Access Control
Irfan Ahmed, Ajou University, Korea
Usman Tariq, Ajou University, Korea
Shoaib Mukhtar, Ajou University, Korea
Kyung-suk Lhee, Ajou University, Korea
S.W. Yoo, Ajou University, Korea
Piao Yanji, Ajou University, Korea
ManPyo Hong, Ajou University, Korea
pp. 109-114
Hassan Takabi, Sharif University of Technology, Iran
Morteza Amini, Sharif University of Technology, Iran
Rasool Jalili, Sharif University of Technology, Iran
pp. 125-130
Hassan Takabi, Sharif University of Technology, Iran
Morteza Amini, Sharif University of Technology, Iran
Rasool Jalili, Sharif University of Technology, Iran
pp. 131-136
Bo-Chao Cheng, National Chung-Cheng University, Taiwan
Huan Chen, National Chung-Cheng University, Taiwan
Ryh-Yuh Tseng, National Chung-Cheng University, Taiwan
pp. 137-142
Naikuo Yang, University of Manchester, UK
Howard Barringer, University of Manchester, UK
Ning Zhang, University of Manchester, UK
pp. 143-148
Aleksandra Nenadic, University of Manchester, UK
Ning Zhang, University of Manchester, UK
Li Yao, University of Manchester, UK
Terry Morrow, University of Manchester, UK
pp. 155-160
Intrusion Prevention
Do Hoon Kim, Korea University, Korea
Taek Lee, Korea University, Korea
Sung-Oh David Jung, Korea University, Korea
Hoh Peter In, Korea University, Korea
Hee Jo Lee, Korea University, Korea
pp. 177-182
Kjetil Haslum, Norwegian University of Science and Technology, Norway
Ajith Abraham, Norwegian University of Science and Technology, Norway
Svein Knapskog, Norwegian University of Science and Technology, Norway
pp. 183-190
Intrusion Detection
Anjali Sardana, Indian Institute of Technology, India
Krishan Kumar, Indian Institute of Technology, India
R. C. Joshi, Indian Institute of Technology, India
pp. 191-196
Neil Cooke, University of Surrey and CESG, GCHQ, UK
Lee Gillam, University of Surrey, UK
Ahmet Kondoz, University of Surrey, UK
pp. 197-202
Eric Medvet, University of Trieste, Italy
Cyril Fillon, University of Trieste, Italy
Alberto Bartoli, University of Trieste, Italy
pp. 227-234
Security Analysis
Zhenrong Yang, Concordia University, Canada
Aiman Hanna, Concordia University, Canada
Mourad Debbabi, Concordia University, Canada
pp. 235-240
Patroklos Argyroudis, University of Dublin, Ireland
Robert McAdoo, University of Dublin, Ireland
Stephen Toner, University of Dublin, Ireland
Linda Doyle, University of Dublin, Ireland
Donal O'Mahony, University of Dublin, Ireland
pp. 241-246
Mohamed Saleh, Concordia University, Canada
Mourad Debbabi, Concordia University, Canada
pp. 253-260
Data Security and Privacy
Diego Scardaci, INFN Catania, UNICO S.R.L., Italy
Giordano Scuderi, INFN Catania, UNICO S.R.L., Italy
pp. 261-266
Dan Feng, Huazhong University of Science and Technology, China
Lanxiang Chen, Huazhong University of Science and Technology, China
Lingfang Zeng, Huazhong University of Science and Technology, China
Zhongying Niu, Huazhong University of Science and Technology, China
pp. 267-272
Dhiah el Diehn I. Abou-Tair, University of Siegen, Germany
Stefan Berlik, University of Siegen, Germany
Udo Kelter, University of Siegen, Germany
pp. 279-284
Xiangrong Xiao, Hunan University, China
Xingming Sun, Hunan University, China
Minggang Chen, Hunan University, China
pp. 292-300
Risk and Trust Management
Daniel Gideon Dresner, The National Computing Centre, UK
J. Robert (Bob) G. Wood, University of Manchester, UK
pp. 301-306
Srinivasan T., Indian Institute of Technology Kharagpur, India
Varun Ramachandran, Sri Venkateswara College of Engineering, India
Arun Vedachalam, Sri Venkateswara College of Engineering, India
S. K. Ghosh, Indian Institute of Technology Kharagpur, India
pp. 307-312
Diala Abi Haidar, France Telecom R&D Caen, France; ENST Bretagne, France
Nora Cuppens, ENST Bretagne, France
Fr?d?ric Cuppens, ENST Bretagne, France
Herv? Debar, France Telecom R&D Caen, France
pp. 313-318
Security Requirements and Policies
Jose Romero-Mariona, University of California, Irvine, USA
Hadar Ziv, University of California, Irvine, USA
Debra J. Richardson, University of California, Irvine, USA
pp. 349-356
Agent and System Security
Martijn Warnier, VU University, The Netherlands
Frances Brazier, VU University, The Netherlands
pp. 357-362
Bobby D. Birrer, Air Force Institute of Technology
Richard A. Raines, Air Force Institute of Technology
Rusty O. Baldwin, Air Force Institute of Technology
Barry E. Mullins, Air Force Institute of Technology
Robert W. Bennington, Air Force Research Laboratory
pp. 369-374
Workshop on Computational Forensics
H. Su, D. Crookes, Queen's University Belfast, UK
A. Bouridane, Queen's University Belfast, UK
M. Gueham, Queen's University Belfast, UK
pp. 387-392
Cor J. Veenman, University of Amsterdam, the Netherlands; Netherlands Forensic Institute, Netherlands
pp. 393-398
Richard Bache, University of Strathclyde, UK
Fabio Crestani, University of Strathclyde, UK
David Canter, Centre for Investigative Psychology, UK
Donna Youngs, Centre for Investigative Psychology, UK
pp. 399-404
Daniel Ramos, Universidad Autonoma de Madrid, Spain
Joaquin Gonzalez-Rodriguez, Universidad Autonoma de Madrid, Spain
Grzegorz Zadora, Institute of Forensic Research, Poland
Janina Zieba-Palus, Institute of Forensic Research, Poland
Colin Aitken, University of Edinburgh, UK
pp. 411-416
Vladimir Pervouchine, University of New South Wales Asia, Singapore
Graham Leedham, University of New South Wales Asia, Singapore
pp. 417-422
Gang Fang, University at Buffalo, USA
Sargur N. Srihari, University at Buffalo, USA
Harish Srinivasan, University at Buffalo, USA
pp. 423-428
Lucia Ballerini, European Centre for Soft Computing, Spain
Oscar Cordon, European Centre for Soft Computing, Spain
Sergio Damas, European Centre for Soft Computing, Spain; University of Granada, Spain
Jose Santamar?a, University of Cadiz, Spain
Inmaculada Aleman, University of Granada, Spain
Miguel Botella, University of Granada, Spain
pp. 429-434
Babak Mahdian, Academy of Sciences of the Czech Republic
Stanislav Saic, Academy of Sciences of the Czech Republic
pp. 439-446
Workshop on Data Hiding for Information and Multimedia Security
Junwei Huang, Hunan University, China
Xingming Sun, Hunan University, China
Huajun Huang, Hunan University, China
Gang Luo, Hunan University, China
pp. 447-452
Julien Lafaye, Conservatoire National des Arts et Metiers, France
pp. 462-467
M. Venkatesan, K.S. Rangasamy College of Technology, India
P. Meenakshi Devi, K.S. Rangasamy College of Technology, India
K. Duraiswamy, K.S. Rangasamy College of Technology, India
K. Thiagarajah, PSNA College of Engg. & Technology, India
pp. 468-471
Anirban Majumdar, The University of Auckland, New Zealand
Stephen Drape, The University of Auckland, New Zealand
Clark Thomborson, The University of Auckland, New Zealand
pp. 472-477
Lingyun Xiang, Hunan University, China
Xingming Sun, Hunan University, China
Gang Luo, Hunan University, China
Can Gan, Hunan University, China
pp. 490-495
Yue Li, University of Warwick, UK
Chang-Tsun Li, University of Warwick, UK
Chia-Hung Wei, University of Warwick, UK
pp. 496-500
Author Index
Usage of this product signifies your acceptance of the Terms of Use.