International Conference on Information Security and Privacy
(ISP-09)

Orlando, Florida, USA, July 13-16, 2009
Zoran Majkic, Rahul Banerjee, Dmitry P. Zegzhda, Guoyin Wang (Editors)
ISBN: 978-1-60651-012-4
Publisher: ISRST
Website: http://www.PromoteResearch.org

 

Contents:

 

R. K. Agrawal, Gaurav K. Rajput
Detection of Stegoimages: A Comparative Study of Classifiers
1-7

Ghassan ‘Gus' Jabbour, Daniel A. Menasce
Stopping the Insider Threat: the case for implementing integrated autonomic defense mechanisms in computing systems
8-13

Wenbin Luo, Qiaoying Zhou
Performance Comparison of Different Hash Algorithms
14-21

R.O. Sinnott, O. Ajayi, A.J. Stell
Data Privacy by Design: Digital Infrastructures for Clinical Collaborations
22-29

Alan Hannaway, Tahar Kechadi
An Analysis of the Scale and Distribution of Copyrighted Material on the Gnutella Network
30-35

Mohamed Abo El-Fotouh, Klaus Diepold
Dynamic Permutation Model
36-45

Guoyu QIAN, Yibo FAN, Takeshi IKENAGA, Yukiyasu TSUNOO, Satoshi GOTO
A Study of Effect of Oscilloscope Parameters on DPA Attacks
46-53

Jeffy MWAKALINGA, Louise YNGSTRÖM, Stewart KOWALSKI
A Holistic and Immune System inspired Security Framework
54-61

Nabil M.K. Mirza, Ziad Osman, Rached Zantout
A Novel Approach for Correcting Noisy AES Ciphers
61-66

Jonathan White
RFID Honeytokens as a Mitigation Tool against Illicit Inventorying
67-73

H.J. Seo, J.P. An, Heedong Ko, Y.C. Choi
Personal Contents Access Control System Using Social Relation Attribute Ontology
74-78

Aleksey Koval, Boris S. Verkhovsky
On Discrete Logarithm Problem for Gaussian Integers
79-84

Youngdong Son, Injung Kim, Yongtae Shin
Information Security Policy to Cope with National Cyber Threats
85-90

Joshua A. Atah, Gareth Howells
Mapping of Information in Voice Features for use in an Efficient Template -Free Biometric Security System
91-97

Roshan Shaikh, Hamida Qunber Ali, Zubair A. Shaikh
WiMAX Security Issues and Enhancement
98-101

Zoran Majkic
Probabilistic Deduction and Pattern Recognition of Complex Events
102-109

Maxim O. Kalinin, Dmitry P. Zegzhda
Automatic Security Management: A Technique to Implement Ubiquitous Security
110-116

Viktor Bunimov, Manfred Schimmler
An Efficient Algorithm for Scalable Modular Multiplication on Standard Processors
117-122

S. A. Srinivasan, R. Mukkamala, K. Venkataramanaiah
Key Scheduling in an SPN Cryptosystem using Musical Notes
123-130

Mohsen Rezvani, Ramtin Aryan
Analyzing Anomalies in Firewall Security Rules
131-138

Mohamed Abo El-Fotouh, Klaus Diepold
The Security of Dynamic and Static Substitution Models
139-144

Piya Techateerawat
Wireless Sensor Network: Security Out-of-the-Box for Agriculture Industry
145-150

Gedare Bloom, Stefan Popoveniuc
Information Leakage in Mix Networks with Randomized Partial Checking
151-155

Ehsan Mokhtari, Behrouz Tork Ladani, Mohammad Ali Nematbakhsh
FOCET: A Functional Ontology of Context for Evaluating Trust
156-163

Ruo Ando, Nguyen Anh Quynh, Kuniyasu Suzaki
A visualization of anomaly memory behavior of full-virtualized Windows OS using virtual machine introspection
164-170

Claudio Biancalana, Claudio Pisu, Francesco Saverio Profiti, Fabio Raimondi
Security and Privacy Preserving Data in e-Government Integration SIRFARMA Experience
171-175

 

back to 2009 proceedings listing