PROGRAM

S

5th WSEAS International Conference on

INFORMATION SECURITY AND PRIVACY

(ISP '06)

S

Venice, Italy, November 20-22, 2006

 

 

The 5th WSEAS International Conference on INFORMATION SECURITY AND PRIVACY sponsored by WSEAS and WSEAS Transactions

 

 

 

Monday, November 20, 2006

 

 

SPECIAL SESSION: Modelling and analysis for information security

Chair: Rafael Alvarez, Kassem Saleh

A New Negotiation Mechanism for Cryptographic Capabilities in SIP based Secure VoIP Service Using Priority Joongman Kim, Yoojae Won, Jaeil Lee 539-248
Lightweight Peer-to-Peer Secure Multi-Party VoIP Protocol Jose-Vicente Aguirre,Rafael Alvarez,Leandro Tortosa,Antonio Zamora 539-558
Silence Detection in Secure P2P VoIP Multiconferencing Jose-Vicente Aguirre, Rafael Alvarez, Julia Sanchez, Antonio Zamora 539-657
On the iterative construction of bent functions Joan-Josep Climent, Francisco J. García, and Verónica Requena 539-616
A new iterative method to construct bent functions Joan-Josep Climent, Francisco J. García, and Verónica Requena 539-617
Synthesis of Trustworthy Protocol Specifications from Service Specifications Kassem Saleh 539-183

 

 

 

Tuesday, November 21, 2006

 

 

SESSION: Trustworthy systems and tools for information security
Chair: Jacques Calmet, Seppo Sirkemaa

Trusting the Trust-Model in mobile wireless ad-hoc network settings Dagmara Spiewak, Thomas Engel 539-271
Towards a Threat Model for Mobile Ad-Hoc Networks Dagmara Spiewak, Thomas Engel, Volker Fusenig 539-269
The Development fo Policy Proxy Agent in Policy Based Network Security Management System Geonlyang-Kim, Hyochan-Bang, Jungchan-Na, Jongsu-Jang 539-191
Back Propagation Networks for Credit Card Fraud Prediction Using Stratified Personalized Data Rong-Chang Chen,  Chih-Yi Lai 539-085
Implementation of watermarking algorithms for medical imaging Oueslati Sameh, Cherif Adnen 539-615
Sequential Multi-Layers Covering Neural Network Wang Renwu, Yang Hongshan, Chen Jiaxun 539-495
The Role of Information Systems Security: Towards a More Secure Environment Seppo Sirkemaa, Eeva Ylänen 539-214
A Methodology for Trust Control Mode Prediction Zheng Yan 539-287
A Framework for Systemic Privacy Protection in a Pervasive Platform Jan Porekar, Kajetan Dolinar 539-336
A framework for engineering trustworthy systems Kassem Saleh , Aziz Alkhaili 539-174
Generic Denial of Service Prevention through a Logical Fibering Algorithm Marvin Oliver Schneider, Jacques Calmet 539-578

 

 

 

SPECIAL SESSION: Security Issues for Mobile Payment System

Chair: Kun Gao

Ontology and Metadata Based Semantic Search System Hongshan Yang, Guoxiang Wang, Jiaxun Chen 539-415
Application Study on Public Key Cryptography in mobile payment Xiaoyan Yang, Xuanping Li, Jifang Li 539-708
Formal Analysis and Verification of a Communication Protocol Xin Ben Li, De Chao Sun 539-599
A Security Framework Model for Mobile Computing Kun Gao, Lifeng Xi, Jifang Li 539-568
Hybrid Image Compression Using Fractal-Wavelet Prediction Liangbin Zhang, Lifeng Xi 539-566
A hybrid method to construct Fuzzy Cognitive Map Chunmei Lin, Kexiong Chen, Yue He 539-563
Semantic Retrieval System Based on Ontology Jianbo Xu, Zhonglin Xu, Jiaxun Chen 539-647
Safe Expert System of Chemical Process Based on Neural Network Huang Chengwu, Yang Hongshan, Jessica Zhang, Jin Zhengqiang 539-652
Mobile Payment System for Prepayment Meter Pan Tie-Jun, Zheng Lei-Na 539-529
Concepts Discrimination Research Jianbo Xu, Chengwei Ma, Jiaxun Chen 539-598
A parameter robust numerical method for a singularly perturbed Volterra equation in security technologies Cen Zhongdi, Xi Lifeng 539-538
Security Key: A New Mobile Payment Solution Pan Tie-Jun, Zheng Lei-Na 539-531
A Public-Key Cryptosystem Scheme on conic curves over the ring Zn Zhigang Chen, Xinxia Song, Jifang Li 539-533
A Multiplier to Enhance the Speed of Encryption/Decryption Yang Ai-Min,Zhang Wen-Xiang 539-536

 

 

 

Wednesday, November 22, 2006

 

 

SESSION: Cryptography, privacy policy and applications of information security

Chair:  Sattar J Aboud, Devinder Kaur

A New Idea in Digital Signature Schemes Mohammed A Al-Fayoumi, Sattar J Aboud 539-458
Privacy Protection in Context-Dependent Retrieval of Information and Multimedia Elena Vildjiounaite Vesa Kyllönen 539-230
Towards Policy-based System on Privacy Assadarat Khurat, Joerg Abendroth 539-339
Using Grammatical Evolution for Evolving Intrusion Detection Rules Dominic Wilson, Devinder Kaur 539-374
Study on security policy options for responding to phishing Eungyong Lee, yoongjung Kim 539-641
Secure Architecture for the Digital Rights Management of the M-Content Ion Ivan, Cristian Toma, Marius Popa, Catalin Boja 539-552
Deploying the Trusted Platform Module (TPM) to Increased Fairness and Trust in P2P File Sharing Servants Joerg Abendroth, Jean-Marc Seigneur 539-335
Malicious Code Detection Method over IPv4/IPv6 Tunneling Using Naive Bayesian Classifier Kyu-Cheol Oh,Ki-Ho Lee,You-Jae Won 539-625
Efficient Hardware Implementations for the DES Family Charalampos Manifavas Ioannis Papaefstathiou Christos Sotiriou 539-660
Analysis of software vulnerability Chunguang Kuang Qing Miao Hua Chen 539-128