International Conference on Information Security and Privacy
(ISP-09)
Orlando, Florida, USA, July 13-16, 2009
Zoran Majkic, Rahul Banerjee, Dmitry P. Zegzhda, Guoyin Wang (Editors)
ISBN: 978-1-60651-012-4
Publisher: ISRST
Website: http://www.PromoteResearch.org
Contents:
R. K. Agrawal, Gaurav K. Rajput
Detection of Stegoimages: A Comparative Study of Classifiers
1-7
Ghassan ‘Gus' Jabbour, Daniel A. Menasce
Stopping the Insider Threat: the case for implementing integrated autonomic defense mechanisms in computing systems
8-13
Wenbin Luo, Qiaoying Zhou
Performance Comparison of Different Hash Algorithms
14-21
R.O. Sinnott, O. Ajayi, A.J. Stell
Data Privacy by Design: Digital Infrastructures for Clinical Collaborations
22-29
Alan Hannaway, Tahar Kechadi
An Analysis of the Scale and Distribution of Copyrighted Material on the Gnutella Network
30-35
Mohamed Abo El-Fotouh, Klaus Diepold
Dynamic Permutation Model
36-45
Guoyu QIAN, Yibo FAN, Takeshi IKENAGA, Yukiyasu TSUNOO, Satoshi GOTO
A Study of Effect of Oscilloscope Parameters on DPA Attacks
46-53
Jeffy MWAKALINGA, Louise YNGSTRÖM, Stewart KOWALSKI
A Holistic and Immune System inspired Security Framework
54-61
Nabil M.K. Mirza, Ziad Osman, Rached Zantout
A Novel Approach for Correcting Noisy AES Ciphers
61-66
Jonathan White
RFID Honeytokens as a Mitigation Tool against Illicit Inventorying
67-73
H.J. Seo, J.P. An, Heedong Ko, Y.C. Choi
Personal Contents Access Control System Using Social Relation Attribute Ontology
74-78
Aleksey Koval, Boris S. Verkhovsky
On Discrete Logarithm Problem for Gaussian Integers
79-84
Youngdong Son, Injung Kim, Yongtae Shin
Information Security Policy to Cope with National Cyber Threats
85-90
Joshua A. Atah, Gareth Howells
Mapping of Information in Voice Features for use in an Efficient Template -Free Biometric Security System
91-97
Roshan Shaikh, Hamida Qunber Ali, Zubair A. Shaikh
WiMAX Security Issues and Enhancement
98-101
Zoran Majkic
Probabilistic Deduction and Pattern Recognition of Complex Events
102-109
Maxim O. Kalinin, Dmitry P. Zegzhda
Automatic Security Management: A Technique to Implement Ubiquitous Security
110-116
Viktor Bunimov, Manfred Schimmler
An Efficient Algorithm for Scalable Modular Multiplication on Standard Processors
117-122
S. A. Srinivasan, R. Mukkamala, K. Venkataramanaiah
Key Scheduling in an SPN Cryptosystem using Musical Notes
123-130
Mohsen Rezvani, Ramtin Aryan
Analyzing Anomalies in Firewall Security Rules
131-138
Mohamed Abo El-Fotouh, Klaus Diepold
The Security of Dynamic and Static Substitution Models
139-144
Piya Techateerawat
Wireless Sensor Network: Security Out-of-the-Box for Agriculture Industry
145-150
Gedare Bloom, Stefan Popoveniuc
Information Leakage in Mix Networks with Randomized Partial Checking
151-155
Ehsan Mokhtari, Behrouz Tork Ladani, Mohammad Ali Nematbakhsh
FOCET: A Functional Ontology of Context for Evaluating Trust
156-163
Ruo Ando, Nguyen Anh Quynh, Kuniyasu Suzaki
A visualization of anomaly memory behavior of full-virtualized Windows OS using virtual machine introspection
164-170
Claudio Biancalana, Claudio Pisu, Francesco Saverio Profiti, Fabio Raimondi
Security and Privacy Preserving Data in e-Government Integration SIRFARMA Experience
171-175