Communication, Network, and Information Security    (CNIS 2003)

December 10 – 12, 2003
New York, USA
Editor(s): M.H. Hamza
Other Years:

Abstracts may contain minor errors and formatting inconsistencies.
Please contact us if you have any concerns or questions.

Track Wireless Security FreeSubscription
440-017 Maximum Number of VOIP Traffic Streams Served in IEEE 802.11i/e Wireless LANs
W.-Y. Choi and S.-K. Lee (Korea)
Abstract
440-019 Securing Binding Update in Mobile IPv6 using an IP Address-based Multisignature
C.-H. Wu, M. Long, and J.D. Irwin (USA)
Abstract
440-050 A New Scheme to Improve the Security of the WEP Protocol
N. Jha and I.S. Gupta (India)
Abstract
440-059 Performance Evaluation of Technologies for Securing 802.11 Enterprise Wireless Networks
K. Jamshaid and L. You (USA)
Abstract
440-069 Advanced Security Management on Mobile Devices in Ad Hoc Networks
H. Buchholz, S. Preuss, I Sedov, and C. Cap (Germany)
Abstract
440-077 Modelling Privacy Risk Associated with RFIDs
T. Brekne (Norway)
Abstract
440-083 Public WLAN with UMTS IP Multimedia Subsystem
S. Kim, H. Lee, and W. Ryu (Korea)
Abstract
440-097 A User Authentication Protocol using EAP for Mobile Ad Hoc Networks
J.-H. Lee, and H.J. Park (Korea)
Abstract
440-105 Tracing Byzantine Faults in Ad Hoc Networks
M. Burmester, T. Van Le, and M. Weir (USA)
Abstract
Track Access Control, Authentication and Digital Signatures FreeSubscription
440-007 A Flexible, Model-driven Security Framework for Distributed Systems
U. Lang and R. Schreiner (UK)
Abstract
440-033 An Intrusion Resilient Password/key Hybrid Authentication Protocol
M. Long, C.-H. Wu, and J.D. Irwin (USA)
Abstract
440-034 Initial Investigation into Cross-context Trust and Risk Assessment
E. Gray, Y. Chen (Ireland), and C. Jensen (Denmark)
Abstract
440-055 Authorization and Certificates: Are We Pushing When We Should Be Pulling?
J. Crampton and H. Khambhammettu (UK)
Abstract
440-086 A Storage-efficient Key Management Scheme for Ad-hoc Networks
H. You and M. Lu (USA)
Abstract
440-091 Formal Security Analysis of GDH Key Agreement Protocols
H. Abdel-Hafez, A. Miri, and L. Orozco-Barbosa (Canada)
Abstract
440-096 On the Security of Selinux with a Simplified Policy
K. Sueyasu, T. Tabata, and K. Sakurai (Japan)
Abstract
Track Information Security FreeSubscription
440-009 An Optimal Watermarking Scheme based on Singular Value Decomposition
E. Ganic, N. Zubair, and A.M. Eskicioglu (USA)
Abstract
440-040 On the Security of the Finite-field Wavelet-based Block Cipher
K.S. Chan and F. Fekri (USA)
Abstract
440-045 Integrating & Automating Security Engineering in UML
A. Maña, J.A. Montenegro, D. Ray, F. Sánchez, and M. Yagüe (Spain)
Abstract
440-067 A New Divisible Anonymous Off-line Electronic Payment System
Q. Tang (UK)
Abstract
440-072 Evaluation of Obfuscation Scheme Focusing on Calling Relationships of Fields and Methods in Methods
K. Fukushima, T. Tabata, and K. Sakurai (Japan)
Abstract
440-074 Efficient Two Party Multi-prime RSA Key Generation
T. Straub (Germany)
Abstract
440-075 An Efficient and Secure Alternative to OCSP for Public-key Certificate Revocation
E. Faldella and M. Prandini (Italy)
Abstract
440-085 Qusai-Anonymous Channelsuasi-Anonymous Channels
I.S. Moskowitz, R.E. Newman, and P.F. Syverson (USA)
Abstract
440-088 An Improved Internal-state Reconstruction Method of a Stream Cipher RC4
Y. Shiraishi, T. Ohigashi, and M. Morii (Japan)
Abstract
440-089 Comparison of Algorithms for Elliptic Curve Cryptography over Finite Fields of GF(2m)
M. Schmalisch and D. Timmermann (Germany)
Abstract
440-104 Extracting Randomness from External Interrupts
J. Castejón-Amenedo, R. McCue, and B.H. Simov (USA)
Abstract
Track Network Security FreeSubscription
440-011 A Critical Analysis of Models for Fault-tolerant and Secure Computation
M. Burmester, Y. Desmedt, and Y. Wang (USA)
Abstract
440-037 A Cautionary Note on Automatic Proxy Configuration
A. Pashalidis (UK)
Abstract
440-038 Mobile Agent based Security Monitoring and Analysis for the Electric Power Infrastructure
M.W. David (UK) and K. Sakurai (Japan)
Abstract
440-044 Tracing High Bandwidth Aggregates
B.-T. Wang (USA)
Abstract
440-052 Towards Integrated Management of Firewall Appliances
L. Pinto, E. Monteiro, and P. Simões (Portugal)
Abstract
440-054 Interchanging the Search Space Between the Logical and Physical Layers in Future IP Optical Networks
A. Hadjiantonis, A. Khalil, M.A. Ali, N. Abdellatif, and J. Moghaddasi (USA)
Abstract
440-058 A Unicast-based Model for Many-to-Many Group Communication
N. Lu, H. Chen, and J. Xiao (PRC)
Abstract
440-061 Adaptive Detection of Worms/Viruses in Firewalls
I.-S. Yoo and U. Ultes-Nitsche (Switzerland)
Abstract
440-076 Bypassing the Internet with the CODIS Content Delivery Network
L. Duquerroy, M. Haddad (France), H. Hlavacs (Austria), S. Josset, C. Lafouge, and J. Ribe
Abstract
440-079 Using Consistency Checks to Prevent Malcious Tunneling
A. Singh, O. Nordström, and A.L.M. dos Santos (USA)
Abstract
440-081 A New Path Restoration Algorithm in Networks
H.A. Harutyunyan and Y. Zhang (Canada)
Abstract
440-087 Evaluation of Anti-spam Method Combining Bayesian Filtering and Strong Challenge and Response
M. Iwanaga, T. Tabata, and K. Sakurai (Japan)
Abstract
440-093 Towards IA-aware Web Services for Federated Identity Management
P. Shenoy, D. Shin, and G.-J. Ahn (USA)
Abstract
440-094 Handling Denial-of-Service Attacks with Quality-of-Service Framework
Q. Yu, S. Sharma, and H. Liu (USA)
Abstract
440-098 Behavioral and Performance Characteristics of Ipsec/IKE in Large-scale VPNS
O. Kim and D. Montgomery (USA)
Abstract
440-101 Mining Frequency Content of Network Traffic for Intrusion Detection
M. Zhou and S.-D. Lang (USA)
Abstract
440-108 Trust and Security in Enterprise Grid Computing Environment
S. Goel and M. Sobolewski (USA)
Abstract
Track Special Session FreeSubscription
440-803 A Scalable, Seamless and Privacy-aware Access Control System based on a Federated Architecture
D.R. Lopez (Spain)
Abstract
440-804 Authentication and Authorization for Digital Rights Management for Information Distribution Systems
H. Abie, P. Spilling, and B. Foyn (Norway)
Abstract
440-805 DRM Implications and Alternatives for IP in the Digital Age
S. Leisten (Australia)
Abstract
440-806 Constrained Delegation in XML-based Access Control and Digital Rights Management Standards
G. Navarro (Spain), B.S. Firozabadi, E. Rissanen (Sweden), and J. Borrell (Spain)
Abstract
440-807 A Secure Infrastructure for Negotiation and Purchase of Intellectual Property Rights (SECURingIPR)
A. Ruiz, L. Baño, C. Immaculada Marín, Ó. Cánovas, and A.F. Gómez (Spain)
Abstract
440-808 EC-GATE: An Infrastructure for DRM
A. Maña, M. Yagüe, and V. Benjumea (Spain)
Abstract
440-809 Authorization Framework in Grid Environment
A. Manandhar, G. Drinkwater, R. Tyer, and K. Kleese (UK)
Abstract
Track Additional Papers FreeSubscription
440-057 Against DoS Attacks using Notify Mechanism
N. Lu, H. Chen, and J. Xiao (PRC)
Abstract
Abstracts may contain minor errors and formatting inconsistencies.
Please contact us if you have any concerns or questions.

What are Digital Object Identifers?


Rates (USD):   N/A (Hardcopy) ;  $66.00 (Online) ;  $73.20 (CD)

(The Hardcopy and CD proceedings also include the Online version)

For complete proceedings please choose one of the following:

   

Online Edition $66.00
CD Edition $73.20
Individual Articles (Online): $40.00  
Hard Copy Subscriptions are not available for CNIS 2003
ISSN: N/A ;
ISBN: 0-88986-402-0 ;
ISSN (CD): N/A ;
ISBN (CD): N/A ;
ISSN (Online): N/A ;

The main topics covered throughout this publication include: wireless security; access control, authentication, and digital signatures; information security; and network security.

Loading Information

Go Back