The Community for Technology Leaders
Information Technology: Coding and Computing, International Conference on (2005)
Las Vegas, Nevada
Apr. 4, 2005 to Apr. 6, 2005
ISBN: 0-7695-2315-3
TABLE OF CONTENTS
Introduction

Committees (PDF)

pp. xiv-xv

Additional Referees (PDF)

pp. xvi-xvii
Bioinformatics

A New Phylogenetic Tree Model for Fuzzy Characters (Abstract)

Andy Auyeung , Oklahoma State University, Stillwater, Oklahoma
pp. 2-7

Parallel Multiple Sequence Alignment with Dynamic Scheduling (Abstract)

Jiancong Luo , The University of Texas at Arlington, TX
Munib Ahmed , The University of Texas at Arlington, TX
Ishfaq Ahmad , The University of Texas at Arlington, TX
Raymond Paul , Office of the Secretary of Defense, Washington D.C.
Raymond Paul , The University of Texas at Arlington, TX
pp. 8-13

Dihedral Angle based Dimensionality Reduction for Protein Structural Comparison (Abstract)

Sumeet Dua , Louisiana Tech University, Ruston, LA
Naveen Kandiraju , Louisiana Tech University, Ruston, LA
Steven A. Conrad , LSU Health Sciences Center, Shreveport, LA
pp. 14-19

Recognizing Transcription Start Site (TSS) of Plant Promoters (Abstract)

Raja Loganantharaj , University of Louisiana at Lafayette
pp. 20-25

Design and Implementation of a Unique Blood-Vessel Detection Algorithm towards Early Diagnosis of Diabetic Retinopathy (Abstract)

Naveen Kandiraju , Louisiana Tech University, Ruston, LA
Hilary W. Thompson , Louisiana State University Health Sciences Center, New Orleans, LA
Sumeet Dua , Louisiana Tech University, Ruston, LA
pp. 26-31

A Time-Series Biclustering Algorithm for Revealing Co-Regulated Genes (Abstract)

Ya Zhang , The Pennsylvania State University
Hongyuan Zha , The Pennsylvania State University
Chao-Hisen Chu , The Pennsylvania State University
pp. 32-37
Data Coding and Compression

An Adaptive Scalable Multiuser-OFDM System for Multimedia Transmission Over Fading Channels (Abstract)

Jianhua He , Huazhong University of Science and Technology, Wuhan, China
Ahmed Muthana M. Nadhim , Huazhong University of Science and Technology, Wuhan, China
Zongkai Yang , Huazhong University of Science and Technology, Wuhan, China
Jiangtao Xi , University of Wollongong, Australia
pp. 40-45

Hypergraph Lossless Image Compression (Abstract)

Alain Bretto , Universit? de Caen, France
Luc Gillibert , Universit? de Caen, France
pp. 46-50

A Scalable Generative Topographic Mapping for Sparse Data Sequences (Abstract)

Ata Kab? , The University of Birmingham, UK
pp. 51-56

Language Discrimination via PPM Model (Abstract)

Ebru Celikel , Ege University International Computer Institute, Turkey
pp. 57-62

Layered MPEG Video Transmission over IP DiffServ (Abstract)

Nirwan Ansari , New Jersey Institute of Technology, Newark, NJ
Yun Q. Shi , New Jersey Institute of Technology, Newark, NJ
Hong Zhao , Embry-Riddle Aeronautical University, Prescott AZ
pp. 63-67

Hybrid Coding for Animated Polygonal Meshes: Combining Delta and Octree (Abstract)

Charles B. Owen , Michigan State University, East Lansing
Jinghua Zhang , Michigan State University, East Lansing
pp. 68-73

Watermark Based Digital Rights Management (Abstract)

Shekhar Verma , Indian Institute of Information Technology and Management, Gwalior
Ashish Thakral , Indian Institute of Information Technology and Management, Gwalior
Piyali Mandal , Indian Institute of Information Technology and Management, Gwalior
pp. 74-78

A Parallel Scheme for Implementing Multialphabet Arithmetic Coding in High-Speed Programmable Hardware (Abstract)

Kuldeep Singh , Indian Institute of Technology, Kharagpur, India
S. Mahapatra , Indian Institute of Technology, Kharagpur, India
pp. 79-84

Multiple Description Coding Using Transforms and Data Fusion (Abstract)

Shumin Tian , Hisense Corporation, Qingdao, China
P. Karivaratha Rajan , Tennessee Tech University, Cookeville, TN
pp. 85-90

Multiple-Pattern Matching For LZW Compressed Files (Abstract)

Tao Tao , University of Central Florida
Amar Mukherjee , University of Central Florida
pp. 91-96

Orthogonal Hermite Pulses Used for UWB M-ary Communication (Abstract)

Wen Hu , Shanghai University, China
Guoxin Zheng , Shanghai University, China
pp. 97-101

A New Approach of Color Quantization Based On Ant Colony Clustering Algorithm (Abstract)

Xinrong Hu , HuaZhong Univ. of Science & Technology, WuHan
Dehua Li , HuaZhong Univ. of Science & Technology, WuHan
Tianzhen Wang , WuHan University of Technology
pp. 102-108

A Rate Control Algorithm for Wireless Video Transmission Using Perceptual Tuning (Abstract)

Jiancong Luo , Uni. of Texas at Arlington
Ishfaq Ahmad , Uni. of Texas at Arlington
Yu Sun , University of Central Arkansas
Dongdong Li , Uni. of Texas at Arlington
pp. 109-114
Data Mining

Packet- vs. Session-Based Modeling for Intrusion Detection Systems (Abstract)

Bruce D. Caulkins , University of Central Florida, Orlando
Joohan Lee , University of Central Florida, Orlando
Morgan Wang , University of Central Florida, Orlando
pp. 116-121

Text Data Mining: A Case Study (Abstract)

John R. Talburt , Acxiom Corporation, Little Rock, Arkansas
Hao Wu , University of Arkansas at Little Rock
Charles Wesley Ford , University of Arkansas at Little Rock
Radhika R. Chilka , University of Arkansas at Little Rock
Chia-Chu Chiang , University of Arkansas at Little Rock
pp. 122-127

A Classifier-based Text Mining Approach for Evaluating Semantic Relatedness Using Support Vector Machines (Abstract)

Chung-Hong Lee , National Kaohsiung University of Applied Sciences, Taiwan
Hsin-Chang Yang , Chang Jung University, Taiwan
pp. 128-133

On the Relation Between Dependence and Diversity in Multiple Classifier Systems (Abstract)

Dechang Chen , Uniformed Services University of the Health Sciences, Bethesda, MD
Xiaobin Ma , University of Minnesota, Minneapolis, MN
Dong Hua , The George Washington University, Washington, DC
Konstantinos Sirlantzis , University of Kent, Canterbury, UK
pp. 134-139

Quality-Oriented Software Architecture (Abstract)

Emanuel Grant , University of North Dakota
Hassan Reza , University of North Dakota
pp. 140-145

Mining p53 Binding Sites Using Profile Hidden Markov Model (Abstract)

Shijun Li , Indiana University Purdue University Indianapolis, Indiana, IN
Jeffrey Huang , Indiana University Purdue University Indianapolis, Indiana, IN
pp. 146-151

Arabic Stemming Without A Root Dictionary (Abstract)

Kazem Taghva , University of Nevada, Las Vegas
Rania Elkhoury , University of Nevada, Las Vegas
Jeffrey Coombs , University of Nevada, Las Vegas
pp. 152-157

A Stemming Algorithm for the Farsi Language (Abstract)

Russell Beckley , University of Nevada, Las Vegas
Kazem Taghva , University of Nevada, Las Vegas
Mohammad Sadeh , University of Nevada, Las Vegas
pp. 158-162

Mining Biomedical Images with Density-Based Clustering (Abstract)

M. Emre Celebi , University of Texas at Arlington
Paul R. Bergstresser , U. of Texas Southwestern Medical Center, Dallas, TX
Y. Alp Aslandogan , University of Texas at Arlington
pp. 163-168

Optimal Statistical Model for Forecasting Ozone (Abstract)

R. Foroughi , RMIT University, Melbourne Australia
M. Abdollahian , RMIT University, Melbourne Australia
pp. 169-173

Regression Analysis of Ozone Data (Abstract)

R. Foroughi , RMIT University Melbourne Australia
M. Abdollahian , RMIT University Melbourne Australia
pp. 174-178

XML Representation of Digital Videos for Visual Data Mining Applications (Abstract)

Mark Smith , Southern Methodist University
Alireza Khotanzad , Southern Methodist University
pp. 179-183

Dynamic Web Content Filtering based on User's Knowledge (Abstract)

B. H. Kang , University of Tasmania, Australia
Y. S. Kim , University of Tasmania, Australia
N. Churcharoenkrung , University of Tasmania, Australia
pp. 184-188

A Signature-Based Liver Cancer Predictive System (Abstract)

Alexander A. Tyler , University College Cork, Cork, Ireland
Joshua H. Early , Armstrong Atlantic State University, Savannah, Georgia
Mahmood Bahar , Teachers Training University, Tehran, Iran
John F. Young , National Center for Toxicological Research, Jefferson, Arkansas
Ray R. Hashemi , Armstrong Atlantic State University, Savannah, Georgia
pp. 195-199

Elimination of Redundant Information for Web Data Mining (Abstract)

Soon-Ja Yeom , University of Tasmania, Australia
Byeong-Ho Kang , University of Tasmania, Australia
Shakirah Mohd Taib , University of Tasmania, Australia
pp. 200-205

Mining Association Rules from the Star Schema on a Parallel NCR Teradata Database System (Abstract)

Murali Mangamuri , Wright State University, Dayton, Ohio
Soon M. Chung , Wright State University, Dayton, Ohio
pp. 206-212

A Web Recommendation System Based on Maximum Entropy (Abstract)

Yanzan Zhou , DePaul University, Chicago, Illinois
Bamshad Mobasher , DePaul University, Chicago, Illinois
Xin Jin , DePaul University, Chicago, Illinois
pp. 213-218
Database Technology

A Time Series Data Management Framework (Abstract)

Ric Jentzsch , University of Canberra, Australia
Abel Matus-Castillejos , University of Canberra, Australia
pp. 220-225

Design Theoretic Approach to Replicated Declustering (Abstract)

Ali Saman Tosun , University of Texas at San Antonio
pp. 226-231

Constrained Declustering (Abstract)

Ali Saman Tosun , University of Texas at San Antonio
pp. 232-237

Managing a Relational Database with Intelligent Agents (Abstract)

Dmitri Ogarodnikov , Mt Sinai School of Medicine
Ira Rudowsky , Brooklyn College of CUNY
Mikhail Kunin , Brooklyn College of CUNY
Theodore Raphan , Brooklyn College of CUNY; Mt Sinai School of Medicine
Olga Kulyba , Brooklyn College of CUNY
pp. 238-242

Impact Of External Security Measures On Data Access Implementation With Online Database Management System (Abstract)

Moses Garuba , Howard University, Washington, DC
Anteneh Girma , Howard University, Washington, DC
pp. 243-248

Performance Evaluation of Secure Concurrency Control Algorithm for Multilevel Secure Distributed Database Systems (Abstract)

Manoj Misra , Indian Institute of Technology Roorkee, India
A. K. Sarje , Indian Institute of Technology Roorkee, India
Rajwinder Singh , Indian Institute of Technology Roorkee, India
Navdeep Kaur , Indian Institute of Technology Roorkee, India
pp. 249-254

XML Schema Re-Engineering Using a Conceptual Schema Approach (Abstract)

Oviliani Yenty Yuliana , Assumption University, Thailand and Petra Christian University, Indonesia
Suphamit Chittayasothorn , King Mongkut's Institute of Technology, Ladkrabang, Bangkok, Thailand
pp. 255-260

Schemaless XML Document Management in Object-Oriented Databases (Abstract)

Soon M. Chung , Wright State University, Dayton, Ohio
Sheeya B. Jesurajaiah , Wright State University, Dayton, Ohio
pp. 261-266
Distributed and Grid Systems

EGRID Project: Experience Report on the Implementation of a Grid Infrastructure for the Analysis of Financial Data (Abstract)

Ezio Corso , The Abdus Salam ICTP, Italy
Riccardo Murri , The Abdus Salam ICTP, Italy
Angelo Leto , The Abdus Salam ICTP, Italy
Cristian Zoicas , The Abdus Salam ICTP, Italy
Alessio Terpin , The Abdus Salam ICTP, Italy
Stefano Cozzini , The Abdus Salam ICTP, Italy; Democritos-SISSA, Italy
pp. 268-273

Development of Concurrent Systems through Coordination (Abstract)

Chia-Chu Chiang , University of Arkansas at Little Rock
pp. 274-279

A New Generalized Particle Approach to Allot Resources And Jobs for Grid Computing (Abstract)

Rui Gong , East China University of Sci. and Tech., P.R. China
Dianxun Shuai , East China University of Sci. and Tech., P.R. China
Xing Wang , East China University of Sci. and Tech., P.R. China
Xiang Feng , East China University of Sci. and Tech., P.R. China
pp. 280-285

Computing Molecular Potential Energy Surface with DIET (Abstract)

Emmanuel Jeannot , LORIA - Universit? Henri Poincar?, France
G?rald Monard , LORIA - Universit? Henri Poincar?, France
pp. 286-291

Transaction Mechanism Design in Decentralized Computational Market (Abstract)

Yang Shoubao , University of Science and Technology of China, Hefei, China
Li Maosheng , University of Science and Technology of China, Hefei, China
Zhu Junmao , University of Science and Technology of China, Hefei, China
Fu Qianfei , University of Science and Technology of China, Hefei, China
pp. 292-297

A Grid-Enabled Web Map Server (Abstract)

Massimo Cafaro , University of Lecce, Italy
Gian Paolo Marra , Institute of Atmospheric Sciences and Climate of the Italian National Research Council via per Monteroni, Italy
Gianvito Quarta , University of Lecce, Italy
Dario Conte , Institute of Atmospheric Sciences and Climate of the Italian National Research Council via per Monteroni, Italy
Sandro Fiore , University of Lecce, Italy
Italo Epicoco , University of Lecce, Italy
Giovanni Aloisio , University of Lecce, Italy
pp. 298-303

The GSI Plug-in for gSOAP: Enhanced Security, Performance, and Reliability (Abstract)

Massimo Cafaro , University of Lecce, Italy
Giovanni Aloisio , University of Lecce, Italy
Daniele Lezzi , University of Lecce, Italy
Robert van Engelen , Florida State University, USA
Italo Epicoco , University of Lecce, Italy
pp. 304-309

Research on Grid Resource Reliability Model Based on Promise (Abstract)

Yang ShouBao , University of Science and Technology of China, Hefei, China
Li MaoSheng , University of Science and Technology of China, Hefei, China; Anhui University, China
Fu QianFei , University of Science and Technology of China, Hefei, China
Yang Jin , University of Science and Technology of China, Hefei, China
pp. 310-315

Metacomputing through the Enactment of a BPEL4WS Workflow in a Grid Environment (Abstract)

Eugenio Zimeo , RCOST - University of Sannio
Nadia Ranaldo , RCOST - University of Sannio
Michele Di Santo , RCOST - University of Sannio
pp. 316-321

Algorithms and Databases in Bioinformatics: Towards a Proteomic Ontology (Abstract)

Pietro Hiram Guzzi , University Magna Gr?cia of Catanzaro, Italy
Tommaso Mazza , University Magna Gr?cia of Catanzaro, Italy
Mario Cannataro , University Magna Gr?cia of Catanzaro, Italy
Pierangelo Veltri , University Magna Gr?cia of Catanzaro, Italy
Giuseppe Tradigo , University Magna Gr?cia of Catanzaro, Italy
pp. 322-328

High Throughput Web Services for Life Sciences (Abstract)

C. Warade , IBM Health Care and Life Sciences, Cambridge MA
M. Altunay , North Carolina State University, Raleigh NC
D. Colonnese , IBM Portals, Hartford CT
pp. 329-334

Grid-Based Collaboration in Interactive Data Language Applications (Abstract)

Marlon Pierce , Indiana University
Minjun Wang , Syracuse University, Indiana University
Geoffrey Fox , Indiana University
pp. 335-341

The BPEL Orchestrating Framework for Secured Grid Services (Abstract)

Pichet Amnuaykanjanasin , Chulalongkorn University, Thailand
Natawut Nupairoj , Chulalongkorn University, Thailand
pp. 348-353

Replica Placement in Data Grid: Considering Utility and Risk (Abstract)

Rashedur M. Rahman , University of Calgary, Canada
Reda Alhajj , University of Calgary, Canada
Ken Barker , University of Calgary, Canada
pp. 354-359

An Analysis of Reliable Delivery Specifications for Web Services (Abstract)

Geoffrey Fox , Indiana University
Sanmi Lee Pallickara , Indiana University
Shrideep Pallickara , Indiana University
pp. 360-365

Double Auction Protocols for Resource Allocation in Grids (Abstract)

Umesh Kant , Wayne State University, Detroit, MI
Daniel Grosu , Wayne State University, Detroit, MI
pp. 366-371
E-Commerce

A New Electronic Cash Model (Abstract)

Chik How Tan , Nanyang Technological University, Singapore
Xiaosong Hou , Nanyang Technological University, Singapore
pp. 374-379

Automatic Agent and Data Mining for e-Commerce (Abstract)

Charles C. Willow , Monmouth University, West Long Branch, NJ
pp. 380-384

A Methodology for Evaluating Agent Toolkits (Abstract)

Elhadi Shakshuki , Acadia University, Canada
pp. 391-396

Exploring Price and Product Information Search Behavior in e-Market (Abstract)

Taedong Han , University of Nevada Las Vegas
pp. 397-402
E-Commerce

The Interoperability between Different e-Business Specifications (Abstract)

Bing Li , Wuhan University, P.R. China
Jin Liu , Wuhan University, P.R. China
Keqing He , Wuhan University, P.R. China
Peng Liang , Wuhan University, P.R. China
pp. 409-413

A Semantic Interoperability Extension Model to the ebXML Registry (Abstract)

Wudong Liu , Wuhan University
Keqing He , Wuhan University
Jing Liu , Wuhan University
Lulu He , Wuhan University
pp. 414-419

An Exchange Protocol for Alternative Currencies (Abstract)

Yiyao Hao , Department of Computer Science California State University, San Bernardino, CA
Daniel M. Havey , Department of Computer Science California State University, San Bernardino, CA
David A. Turner , Department of Computer Science California State University, San Bernardino, CA
pp. 420-424

IPS - Secure Internet Payment System (Abstract)

Zoran Djuric , University of Banjaluka, Bosnia and Herzegovina
pp. 425-430
Education

A Framework and Process for Curricular Integration and Innovation Using Project Based Interdisciplinary Teams (Abstract)

Mitchell A. Thornton , Southern Methodist University, Dallas TX
Frank P. Coyle , Southern Methodist University, Dallas TX
pp. 432-435

An Integrated Course Based on Educational Games (Abstract)

Hye Sun Kim , Cheju National University, Korea
Seong Baeg Kim , Cheju National University, Korea
pp. 436-441

Constructing Different Learning Paths Through e-Learning (Abstract)

Seong Baeg Kim , Cheju National University, Korea
Kyoung Mi Yang , Cheju National University, Korea
Rockford J. Ross , Montana State University, USA
pp. 447-452

An E-learning tool for Database Administration (Abstract)

Paul Douglas , University of Westminster, London, UK
Steve Barker , King's College, London, UK
pp. 453-458

Synthetic Exercises on the Web (Abstract)

Pavel Azalov , Pennsylvania State University
pp. 459-464

Integration of Digital Rights Management into Learning Content Management System (Abstract)

Jing Jin , Central China Normal University, Wuhan, China
Kun Yan , Central China Normal University, Wuhan, China
Zongkai Yang , Huazhong University of Science & Technology, Wuhan, China
Qingtang Liu , Huazhong University of Science & Technology, Wuhan, China; Central China Normal University, Wuhan, China
Wanting Deng , Central China Normal University, Wuhan, China
pp. 465-469

Comparison of Information Technology Adoption Rates across Laggards, Innovators and Others (Abstract)

Henry Hexmoor , University of Arkansas, Fayetteville
Shravan Kumar Sogani , University of Arkansas, Fayetteville
Rukmini Reddy Muduganti , University of Arkansas, Fayetteville
pp. 470-475

A Specialization in Information and Knowledge Management Systems for the Undergraduate Computer Science Curriculum (Abstract)

O. Frieder , Illinois Institute of Technology, Chicago, IL
N. Goharian , Illinois Institute of Technology, Chicago, IL
S. Argamon , Illinois Institute of Technology, Chicago, IL
D. Grossman , Illinois Institute of Technology, Chicago, IL
N. Raju , Illinois Institute of Technology, Chicago, IL
pp. 476-481

An Intelligent Tutoring System for Program Semantics (Abstract)

Paul Douglas , University of Westminster, London, UK
Steve Barker , King's College, London, UK
pp. 482-487

Adaptive Book: Teaching and Learning Environment for Programming Education (Abstract)

Victor Adamchik , Carnegie Mellon University, Pittsburgh, PA
Ananda Gunawardena , Carnegie Mellon University, Pittsburgh, PA
pp. 488-492
E-Gaming

Digital Chips for an On-Line Casino (Abstract)

J. Garc? , UAB, Spain
J. A. Ortega-Ruiz , UAB, Spain
G. Navarro , UAB, Spain
J. Castell?-Roca , ETSE-URV, Spain
pp. 494-499

Protecting On-Line Casinos against Fraudulent Player Drop-Out (Abstract)

Joaqu? Garc? , UCCD-UAB, Spain
Fabien Autrel , ONERA-CERT, France
Jordi Castell?-Roca , ETSE-URV, Spain
Fr?d?ric Cuppens , GET-ENST-Bretagne, France
Jose A. Ortega-Ruiz , UCCD-UAB, Spain
Guillermo Navarro , UCCD-UAB, Spain
Joan Borrell , UCCD-UAB, Spain
pp. 500-505

Dealing Cards in Poker Games (Abstract)

Philippe Golle , Palo Alto Research Center
pp. 506-511

Online Gaming Cheating and Security Issue (Abstract)

Larry Korba , National Research Council Canada
Ronggong Song , National Research Council Canada
Ying-Chieh Chen , National Chiao-Tung University, Taiwan
George Yee , National Research Council Canada
Jing-Jang Hwang , Chang-Gung University, Taiwan
pp. 518-523
Embedded Cryptographic Systems

Fast Parallel Table Lookups to Accelerate Symmetric-Key Cryptography (Abstract)

A. Murat Fiskiran , Princeton University
Ruby B. Lee , Princeton University
pp. 526-531

ASIC-Hardware-Focused Comparison for Hash Functions MD5, RIPEMD-160, and SHS (Abstract)

Tadanobu Inoue , IBM Research, Tokyo Research Laboratory
Akashi Satoh , IBM Research, Tokyo Research Laboratory
pp. 532-537

A Scalable and High Performance Elliptic Curve Processor with Resistance to Timing Attacks (Abstract)

David D. Hwang , University of California, Los Angeles
Alireza Hodjat , University of California, Los Angeles
Ingrid Verbauwhede , University of California, Los Angeles; Katholieke Universiteit Leuven
pp. 538-543

A Countermeasure for EM Attack of a Wireless PDA (Abstract)

C. H. Gebotys , University of Waterloo, Canada
C. C. Tiu , University of Waterloo, Canada
X. Chen , University of Waterloo, Canada
pp. 544-549

Quadrinomial Modular Arithmetic using Modified Polynomial Basis (Abstract)

Christophe Negre , LIRMM - University Montpellier II, France
pp. 550-555

FPGA Implementations of the ICEBERG Block Cipher (Abstract)

Fran?ois-Xavier Standaert , UCL Crypto Group, Belgium
Jean-Jacques Quisquater , UCL Crypto Group, Belgium
Gilles Piret , UCL Crypto Group, Belgium
Gael Rouvroy , UCL Crypto Group, Belgium
pp. 556-561

On the Masking Countermeasure and Higher-Order Power Analysis Attacks (Abstract)

Eric Peeters , UCL Crypto Group, Belgium
Fran?ois-Xavier Standaert , UCL Crypto Group, Belgium
Jean-Jacques Quisquater , UCL Crypto Group, Belgium
pp. 562-567

A Scalable Dual Mode Arithmetic Unit for Public Key Cryptosystems (Abstract)

Francis Crowe , University College Cork, Ireland
Alan Daly , University College Cork, Ireland
William Marnane , University College Cork, Ireland
pp. 568-573

A Fast Implementation of Multiplicative Inversion Over GF(2^m ) (Abstract)

Nareli Cruz-Cort? , Centro de Investigaci?n y de Estudios Avanzados del IPN, M?xico
Francisco Rodr?guez-Henr?quez , Centro de Investigaci?n y de Estudios Avanzados del IPN, M?xico
Nazar A. Saqib , Centro de Investigaci?n y de Estudios Avanzados del IPN, M?xico
pp. 574-579

ASIC Implementation of a Unified Hardware Architecture for Non-Key Based Cryptographic Hash Primitives (Abstract)

T. S. B. Sudarshan , Birla Institute of Technology & Science; Pilani, Rajasthan, India
T. S. Ganesh , Iowa State University, Ames, Iowa, USA
pp. 580-585

AES Power Attack Based on Induced Cache Miss and Countermeasure (Abstract)

Matteo Monchiero , Politecnico di Milano, Italy
Guido Bertoni , STMicroelectronics, Milano, Italy
Gianluca Palermo , Politecnico di Milano, Italy
Luca Breveglieri , Politecnico di Milano, Italy
Vittorio Zaccaria , STMicroelectronics, Milano, Italy
pp. 586-591

XScale Hardware Acceleration on Cryptographic Algorithms for IPSec Applications (Abstract)

Hung-Ching Chang , Huafan University
Chun-Chin Chen , Huafan University
Chih-Feng Lin , Huafan University
pp. 592-597

Modified Radix-2 Montgomery Modular Multiplication to Make It Faster and Simpler (Abstract)

Kooroush Manochehri , Amirkabir University of Technology, Tehran, Iran
Saadat Pourmozafari , Amirkabir University of Technology, Tehran, Iran
pp. 598-602

Reconfigurable Hardware for Addition Chains Based Modular Exponentiation (Abstract)

Luiza de Macedo Mourelle , State University of Rio de Janeiro, Brazil
Nadia Nedjah , State University of Rio de Janeiro, Brazil
pp. 603-607

Verifiable Threshold Sharing of a Large Secret Safe-Prime (Abstract)

Maged Hamada Ibrahim , Helwan University, Cairo, Egypt
pp. 608-613

Pareto-Optimal Hardware for Substitution Boxes (Abstract)

Nadia Nedjah , State University of Rio de Janeiro, Brazil
Luiza de Macedo Mourelle , State University of Rio de Janeiro, Brazil
pp. 614-619

Applications of The Montgomery Exponent (Abstract)

Shay Gueron , University of Haifa, Israel; Discretix Technologies, Israel
Or Zuk , Weizmann Institute of Science, Israel; Discretix Technologies, Israel
pp. 620-625

A Parallelized Design for an Elliptic Curve Cryptosystem Coprocessor (Abstract)

Guido Bertoni , STMicroelectronics
Fabio Sozzani , STMicroelectronics
Luca Breveglieri , Politecnico di Milano
Stefano Turcato , Politecnico di Milano
pp. 626-630

A Proposal of Short Proxy Signature using Pairing (Abstract)

Atsuo Inomata , Japan Science and Technology Agency, Japan
Takeshi Okamoto , University of Tsukuba, Japan
Eiji Okamoto , University of Tsukuba, Japan
pp. 631-635

Improved Routing-Based Linear Algebra for the Number Field Sieve (Abstract)

Rainer Steinwandt , Universit?t Karlsruhe, Germany
Willi Geiselmann , Universit?t Karlsruhe, Germany
Eran Tromer , Weizmann Institute of Science, Israel
Hubert K?pfer , Universit?t Karlsruhe, Germany
pp. 636-641

Inversion-Free Arithmetic on Genus 3 Hyperelliptic Curves and Its Implementations (Abstract)

Yumin Wang , Ruhr-Universit?et Bochum, Germany
Thomas Wollinger , Xidian University, Xi'an, P.R. China
Xinxin Fan , Xidian University, Xi'an, P.R. China
pp. 642-647
Information Assurance and Security

Intrusion Detection System to Detect Variant Attacks Using Learning Algorithms with Automatic Generation of Training Data (Abstract)

Akira Yamada , KDDI R&D Laboratories Inc., Japan
Yutaka Miyake , KDDI R&D Laboratories Inc., Japan
Toshiaki Tanaka , KDDI R&D Laboratories Inc., Japan
Keisuke Takemori , KDDI R&D Laboratories Inc., Japan
pp. 650-655

StackOFFence: A Technique for Defending Against Buffer Overflow Attacks (Abstract)

Kishor S. Trivedi , Duke Univ., Durham, NC
Shashi Phoha , NIST, Gaithersburg, MD
Bharat B. Madan , Penn State Univ., State College, PA
pp. 656-661

Conversion and Proxy Functions for Symmetric Key Ciphers (Abstract)

Debra L. Cook , Columbia University
Angelos D. Keromytis , Columbia University
pp. 662-667

An Aspect-Oriented Approach to Mobile Agent Access Control (Abstract)

Vivek Goel , North Dakota State University, Fargo, ND
Dianxiang Xu , North Dakota State University, Fargo, ND
pp. 668-673

An Efficient Secure Key Issuing Protocol in ID-Based Cryptosystems (Abstract)

M. Choudary Gorantla , Institute for Development and Research in Banking Technology, India
Ashutosh Saxena , Institute for Development and Research in Banking Technology, India
Ved P. Gulati , Institute for Development and Research in Banking Technology, India
Manik Lal Das , Institute for Development and Research in Banking Technology, India
Raju Gangishetti , Institute for Development and Research in Banking Technology, India
pp. 674-678

Clarifying Obfuscation: Improving the Security of White-Box DES (Abstract)

William D. Neumann , Sandia National Laboratories
Hamilton E. Link , Sandia National Laboratories
pp. 679-684

Secure Group Communication with Multiplicative One-way Functions (Abstract)

Heeyoul Kim , Korea Advanced Institute of Science and Technology
J. W. Cho , Korea Advanced Institute of Science and Technology
H. Yoon , Korea Advanced Institute of Science and Technology
Seong-min Hong , Korea Advanced Institute of Science and Technology
pp. 685-690

Application of Loop Reduction to Learning Program Behaviors for Anomaly Detection (Abstract)

Mahesh K. Patel , Rivermine Software, Fairfax, VA
Jidong Long , Florida State University, Tallahassee, FL
Daniel G. Schwartz , Florida State University, Tallahassee, FL
Sara Stoecklin , Florida State University, Tallahassee, FL
pp. 691-696

No-Capture Hardware Feature for Securing Sensitive Information (Abstract)

Khaled Hussain , University of Central Florida
Sharon Rajan , University of Central Florida
Ghada Moussa , University of Central Florida
Naveen Addulla , University of Central Florida
pp. 697-702

Formalisation and implementation of Access control models (Abstract)

Charles Morisset , SPI LIP6, University Paris 6, France
Mathieu Jaume , SPI LIP6, University Paris 6, France
pp. 703-708

QoS-Based Authentication Scheme for Ad Hoc Wireless Networks (Abstract)

P. Muppala , Oklahoma State University, USA
Johnson Thomas , Oklahoma State University, USA
Ajith Abraham , Chung-Ang University, Korea
pp. 709-714

Byteprints: A Tool to Gather Digital Evidence (Abstract)

Sriranjani Sitaraman , University of Texas at Dallas, Richardson, TX
Srinivasan Krishnamurthy , University of Texas at Dallas, Richardson, TX
S. Venkatesan , University of Texas at Dallas, Richardson, TX
pp. 715-720

A Secure and Efficient Voter-Controlled Anonymous Election Scheme (Abstract)

Daniel Grosu , Wayne State University, Detroit, MI
Thomas E. Carroll , Wayne State University, Detroit, MI
pp. 721-726

Security Design and Evaluation in a VoIP Secure Infrastracture: A Policy Based Approach (Abstract)

Massimiliano Rak , Seconda Universit? di Napoli, Italy
Nicola Mazzoccca , Universit? degli Studi di Napoli "Federico II", Italy
Valentina Casola , Seconda Universit? di Napoli, Italy
Antonino Mazzeo , Universit? degli Studi di Napoli "Federico II", Italy
pp. 727-732

The N/R One Time Password System (Abstract)

Sang Yong Han , Chung-Ang University, Korea
Ajith Abraham , Chung-Ang University, Korea
Sugata Sanyal , Tata Institute of Fundamental Research, India
Vipul Goyal , OSP Global, Mumbai, India
pp. 733-738

CompChall: Addressing Password Guessing Attacks (Abstract)

Vipul Goyal , OSP Global, Mumbai, India
Ajith Abraham , Chung-Ang University, Korea
Sugata Sanyal , Tata Institute of Fundamental Research, India
Virendra Kumar , Crypto Group, Institute of Technology, Banaras Hindu University, India
Mayank Singh , Crypto Group, Institute of Technology, Banaras Hindu University, India
pp. 739-744

Efficient TTP-Free Mental Poker Protocols (Abstract)

Vijay Varadharajan , Macquarie University, Australia
Weiliang Zhao , University of Western Sydney, Australia
pp. 745-750

A Dynamic Method for Handling the Inference Problem in Multilevel Secure Databases (Abstract)

R. Wei , Lakehead University, Canada
X. Chen , Lakehead University, Canada
pp. 751-756

ID-Based One Round Authenticated Group Key Agreement Protocol with Bilinear Pairings (Abstract)

Gongliang Chen , Shanghai Jiao Tong University, P.R. China
Yijuan Shi , Shanghai Jiao Tong University, P.R. China
Jianhua Li , Shanghai Jiao Tong University, P.R. China
pp. 757-761

Securely Utilizing External Computing Power (Abstract)

Yu Yu , Nanyang Technological University, Singapore
Jussipekka Leiwo , Nanyang Technological University, Singapore
Benjamin Premkumar , Nanyang Technological University, Singapore
pp. 762-767

Effective Steganalysis Based on Statistical Moments of Wavelet Characteristic Function (Abstract)

Chengyun Yang , Tongji University, Shanghai, P.R. of China
Yun Q. Shi , New Jersey Institute of Technology, Newark, NJ
Chunhua Chen , New Jersey Institute of Technology, Newark, NJ
Zhenping Zhang , Tongji University, Shanghai, P.R. of China
Peiqi Chai , Tongji University, Shanghai, P.R. of China
Jianjiong Gao , Tongji University, Shanghai, P.R. of China
Dekun Zou , New Jersey Institute of Technology, Newark, NJ
Guorong Xuan , Tongji University, Shanghai, P.R. of China
Wen Chen , New Jersey Institute of Technology, Newark, NJ
pp. 768-773

Dynamic Learning of Automata from the Call Stack Log for Anomaly Detection (Abstract)

Zhen Liu , Mississippi State University
Susan M. Bridges , Mississippi State University
pp. 774-779

Efficient Array & Pointer Bound Checking Against Buffer Overflow Attacks via Hardware/Software (Abstract)

Qingfeng Zhuge , University of Texas at Dallas
Edwin H.-M. Sha , University of Texas at Dallas
Bin Xiao , Hong Kong Polytechnic University
Chun Xue , University of Texas at Dallas
Zili Shao , University of Texas at Dallas
pp. 780-785
Information Retrieval

A Comparative Study of Three Moment-Based Shape Descriptors (Abstract)

M. Emre Celebi , University of Texas at Arlington
Y. Alp Aslandogan , University of Texas at Arlington
pp. 788-793

Concept-Based Information Access (Abstract)

Rifat Ozcan , University of Texas at Arlington, U.S.A
Y. Alp Aslandogan , University of Texas at Arlington, U.S.A
pp. 794-799

Designing a Value Based Niche Search Engine Using Evolutionary Strategies (Abstract)

Bernard J. Jansen , The Pennsylvania State University
Sourav Sengupta , The Pennsylvania State University
pp. 800-805

A Mathematical Investigation on Retrieval Performance Evaluation Measures of Information Retrieval Algorithm (Abstract)

Zhang Wei-ming , The National University of Defense Technology, China
Xiao Wei-dong , The National University of Defense Technology, China
Song Jun-feng , The National University of Defense Technology, China
pp. 806-810

Author Index (PDF)

pp. 811-814
103 ms
(Ver )