440-017
|
Maximum Number of VOIP Traffic Streams Served in IEEE 802.11i/e Wireless LANs
W.-Y. Choi and S.-K. Lee (Korea)
|
Abstract
|
|
440-019
|
Securing Binding Update in Mobile IPv6 using an IP Address-based Multisignature
C.-H. Wu, M. Long, and J.D. Irwin (USA)
|
Abstract
|
|
440-050
|
A New Scheme to Improve the Security of the WEP Protocol
N. Jha and I.S. Gupta (India)
|
Abstract
|
|
440-059
|
Performance Evaluation of Technologies for Securing 802.11 Enterprise Wireless Networks
K. Jamshaid and L. You (USA)
|
Abstract
|
|
440-069
|
Advanced Security Management on Mobile Devices in Ad Hoc Networks
H. Buchholz, S. Preuss, I Sedov, and C. Cap (Germany)
|
Abstract
|
|
440-077
|
Modelling Privacy Risk Associated with RFIDs
T. Brekne (Norway)
|
Abstract
|
|
440-083
|
Public WLAN with UMTS IP Multimedia Subsystem
S. Kim, H. Lee, and W. Ryu (Korea)
|
Abstract
|
|
440-097
|
A User Authentication Protocol using EAP for Mobile Ad Hoc Networks
J.-H. Lee, and H.J. Park (Korea)
|
Abstract
|
|
440-105
|
Tracing Byzantine Faults in Ad Hoc Networks
M. Burmester, T. Van Le, and M. Weir (USA)
|
Abstract
|
|
440-009
|
An Optimal Watermarking Scheme based on Singular Value Decomposition
E. Ganic, N. Zubair, and A.M. Eskicioglu (USA)
|
Abstract
|
|
440-040
|
On the Security of the Finite-field Wavelet-based Block Cipher
K.S. Chan and F. Fekri (USA)
|
Abstract
|
|
440-045
|
Integrating & Automating Security Engineering in UML
A. Maña, J.A. Montenegro, D. Ray, F. Sánchez, and M. Yagüe (Spain)
|
Abstract
|
|
440-067
|
A New Divisible Anonymous Off-line Electronic Payment System
Q. Tang (UK)
|
Abstract
|
|
440-072
|
Evaluation of Obfuscation Scheme Focusing on Calling Relationships of Fields and Methods in Methods
K. Fukushima, T. Tabata, and K. Sakurai (Japan)
|
Abstract
|
|
440-074
|
Efficient Two Party Multi-prime RSA Key Generation
T. Straub (Germany)
|
Abstract
|
|
440-075
|
An Efficient and Secure Alternative to OCSP for Public-key Certificate Revocation
E. Faldella and M. Prandini (Italy)
|
Abstract
|
|
440-085
|
Qusai-Anonymous Channelsuasi-Anonymous Channels
I.S. Moskowitz, R.E. Newman, and P.F. Syverson (USA)
|
Abstract
|
|
440-088
|
An Improved Internal-state Reconstruction Method of a Stream Cipher RC4
Y. Shiraishi, T. Ohigashi, and M. Morii (Japan)
|
Abstract
|
|
440-089
|
Comparison of Algorithms for Elliptic Curve Cryptography over Finite Fields of GF(2m)
M. Schmalisch and D. Timmermann (Germany)
|
Abstract
|
|
440-104
|
Extracting Randomness from External Interrupts
J. Castejón-Amenedo, R. McCue, and B.H. Simov (USA)
|
Abstract
|
|
440-011
|
A Critical Analysis of Models for Fault-tolerant and Secure Computation
M. Burmester, Y. Desmedt, and Y. Wang (USA)
|
Abstract
|
|
440-037
|
A Cautionary Note on Automatic Proxy Configuration
A. Pashalidis (UK)
|
Abstract
|
|
440-038
|
Mobile Agent based Security Monitoring and Analysis for the Electric Power Infrastructure
M.W. David (UK) and K. Sakurai (Japan)
|
Abstract
|
|
440-044
|
Tracing High Bandwidth Aggregates
B.-T. Wang (USA)
|
Abstract
|
|
440-052
|
Towards Integrated Management of Firewall Appliances
L. Pinto, E. Monteiro, and P. Simões (Portugal)
|
Abstract
|
|
440-054
|
Interchanging the Search Space Between the Logical and Physical Layers in Future IP Optical Networks
A. Hadjiantonis, A. Khalil, M.A. Ali, N. Abdellatif, and J. Moghaddasi (USA)
|
Abstract
|
|
440-058
|
A Unicast-based Model for Many-to-Many Group Communication
N. Lu, H. Chen, and J. Xiao (PRC)
|
Abstract
|
|
440-061
|
Adaptive Detection of Worms/Viruses in Firewalls
I.-S. Yoo and U. Ultes-Nitsche (Switzerland)
|
Abstract
|
|
440-076
|
Bypassing the Internet with the CODIS Content Delivery Network
L. Duquerroy, M. Haddad (France), H. Hlavacs (Austria), S. Josset, C. Lafouge, and J. Ribe
|
Abstract
|
|
440-079
|
Using Consistency Checks to Prevent Malcious Tunneling
A. Singh, O. Nordström, and A.L.M. dos Santos (USA)
|
Abstract
|
|
440-081
|
A New Path Restoration Algorithm in Networks
H.A. Harutyunyan and Y. Zhang (Canada)
|
Abstract
|
|
440-087
|
Evaluation of Anti-spam Method Combining Bayesian Filtering and Strong Challenge and Response
M. Iwanaga, T. Tabata, and K. Sakurai (Japan)
|
Abstract
|
|
440-093
|
Towards IA-aware Web Services for Federated Identity Management
P. Shenoy, D. Shin, and G.-J. Ahn (USA)
|
Abstract
|
|
440-094
|
Handling Denial-of-Service Attacks with Quality-of-Service Framework
Q. Yu, S. Sharma, and H. Liu (USA)
|
Abstract
|
|
440-098
|
Behavioral and Performance Characteristics of Ipsec/IKE in Large-scale VPNS
O. Kim and D. Montgomery (USA)
|
Abstract
|
|
440-101
|
Mining Frequency Content of Network Traffic for Intrusion Detection
M. Zhou and S.-D. Lang (USA)
|
Abstract
|
|
440-108
|
Trust and Security in Enterprise Grid Computing Environment
S. Goel and M. Sobolewski (USA)
|
Abstract
|
|
440-803
|
A Scalable, Seamless and Privacy-aware Access Control System based on a Federated Architecture
D.R. Lopez (Spain)
|
Abstract
|
|
440-804
|
Authentication and Authorization for Digital Rights Management for Information Distribution Systems
H. Abie, P. Spilling, and B. Foyn (Norway)
|
Abstract
|
|
440-805
|
DRM Implications and Alternatives for IP in the Digital Age
S. Leisten (Australia)
|
Abstract
|
|
440-806
|
Constrained Delegation in XML-based Access Control and Digital Rights Management Standards
G. Navarro (Spain), B.S. Firozabadi, E. Rissanen (Sweden), and J. Borrell (Spain)
|
Abstract
|
|
440-807
|
A Secure Infrastructure for Negotiation and Purchase of Intellectual Property Rights (SECURingIPR)
A. Ruiz, L. Baño, C. Immaculada Marín, Ó. Cánovas, and A.F. Gómez (Spain)
|
Abstract
|
|
440-808
|
EC-GATE: An Infrastructure for DRM
A. Maña, M. Yagüe, and V. Benjumea (Spain)
|
Abstract
|
|
440-809
|
Authorization
Framework in Grid Environment
A. Manandhar, G. Drinkwater, R. Tyer, and K. Kleese
(UK)
|
Abstract
|
|