589-041
|
Multi-Agent
based Security Assurance Monitoring System for Telecommunication Infrastructures
E. Bulut (France), D. Khadraoui (Luxembourg), and
B. Marquet (France)
|
Abstract
|
|
589-046
|
An Efficient Algorithm for the Implementation of Fingerprint Authentication on Smartcards
M. Govan and T. Buggy (UK)
|
Abstract
|
|
589-047
|
Integration of a Secure Mobile Payment System in a GSM/UMTS SIM Smart Card
I.G. Askoxylakis, M. Pramateftakis, D.D. Kastanis, and A.P. Traganitis (Greece)
|
Abstract
|
|
589-053
|
Security, Privacy, and Usability: A High Common Ground
H.K. Lu and A.M. Ali (USA)
|
Abstract
|
|
589-055
|
High Level Specification of Non-Interference Security Policies in Partitioned MLS Systems
J. Son and J. Alves-Foss (USA)
|
Abstract
|
|
589-073
|
Prevention of SPIT using the Concept of Access Number (AN)
A.H. Khalil and D.J. Parish (UK)
|
Abstract
|
|
589-078
|
FEDERACY: An Extensible Federated Identity and Access Management Framework Considering Legacy Systems
S.-C. Cha, H.-P. Lin, M.-G. Wang, and C.-W. Huang (Taiwan)
|
Abstract
|
|
589-079
|
A Dynamic Fusion Approach for Security Situation Assessment
A. Siraj and R.B. Vaughn (USA)
|
Abstract
|
|
What are Digital Object Identifers?
The relevant topics for this conference include, but are not limited to:
Communication Security
* Access control
* Authentication
* Cryptographic Protocols and Applications
* Digital Signatures
* Disaster Protocols
* Hash Functions
* Warning Systems
Network Security
* Computer/Network Disaster Recovery
* Global Security Architectures and Infrastructures
* Hacking and Intrusion Detection
* Secure Deletion
* Secure Email
* Spam
* Viruses and Worms
* Web Security
* WiFi Spying/Sniffing
* Wireless Privacy
* Wireless Security
* Virtual Private Networks
Information Security
* Biometrics
* Digital Rights Management
* Digitally Embedded Signatures
* DNA, Fingerprint, Iris, and Retina Scanning
* Identify Theft
* Information Hiding
* Legal and Regulatory Issues in Communication
* Operating System Security
* Plagiarism
* Privacy and Confidentiality
* Software Security
* Spyware
* Standards
* Watermarking.