PROGRAM
S
5th WSEAS International Conference on
INFORMATION SECURITY AND PRIVACY
(ISP '06)
S
Venice, Italy, November 20-22, 2006
The 5th WSEAS International Conference on INFORMATION SECURITY AND PRIVACY sponsored by WSEAS and WSEAS Transactions
Monday, November 20, 2006
SPECIAL SESSION: Modelling and analysis for information security
Chair: Rafael Alvarez, Kassem Saleh
A New Negotiation Mechanism for Cryptographic Capabilities in SIP based Secure VoIP Service Using Priority | Joongman Kim, Yoojae Won, Jaeil Lee | 539-248 |
Lightweight Peer-to-Peer Secure Multi-Party VoIP Protocol | Jose-Vicente Aguirre,Rafael Alvarez,Leandro Tortosa,Antonio Zamora | 539-558 |
Silence Detection in Secure P2P VoIP Multiconferencing | Jose-Vicente Aguirre, Rafael Alvarez, Julia Sanchez, Antonio Zamora | 539-657 |
On the iterative construction of bent functions | Joan-Josep Climent, Francisco J. García, and Verónica Requena | 539-616 |
A new iterative method to construct bent functions | Joan-Josep Climent, Francisco J. García, and Verónica Requena | 539-617 |
Synthesis of Trustworthy Protocol Specifications from Service Specifications | Kassem Saleh | 539-183 |
Tuesday, November 21, 2006
SESSION:
Trustworthy
systems
and tools for information security
Chair:
Jacques Calmet, Seppo Sirkemaa
Trusting the Trust-Model in mobile wireless ad-hoc network settings | Dagmara Spiewak, Thomas Engel | 539-271 |
Towards a Threat Model for Mobile Ad-Hoc Networks | Dagmara Spiewak, Thomas Engel, Volker Fusenig | 539-269 |
The Development fo Policy Proxy Agent in Policy Based Network Security Management System | Geonlyang-Kim, Hyochan-Bang, Jungchan-Na, Jongsu-Jang | 539-191 |
Back Propagation Networks for Credit Card Fraud Prediction Using Stratified Personalized Data | Rong-Chang Chen, Chih-Yi Lai | 539-085 |
Implementation of watermarking algorithms for medical imaging | Oueslati Sameh, Cherif Adnen | 539-615 |
Sequential Multi-Layers Covering Neural Network | Wang Renwu, Yang Hongshan, Chen Jiaxun | 539-495 |
The Role of Information Systems Security: Towards a More Secure Environment | Seppo Sirkemaa, Eeva Ylänen | 539-214 |
A Methodology for Trust Control Mode Prediction | Zheng Yan | 539-287 |
A Framework for Systemic Privacy Protection in a Pervasive Platform | Jan Porekar, Kajetan Dolinar | 539-336 |
A framework for engineering trustworthy systems | Kassem Saleh , Aziz Alkhaili | 539-174 |
Generic Denial of Service Prevention through a Logical Fibering Algorithm | Marvin Oliver Schneider, Jacques Calmet | 539-578 |
SPECIAL SESSION: Security Issues for Mobile Payment System
Chair: Kun Gao
Ontology and Metadata Based Semantic Search System | Hongshan Yang, Guoxiang Wang, Jiaxun Chen | 539-415 |
Application Study on Public Key Cryptography in mobile payment | Xiaoyan Yang, Xuanping Li, Jifang Li | 539-708 |
Formal Analysis and Verification of a Communication Protocol | Xin Ben Li, De Chao Sun | 539-599 |
A Security Framework Model for Mobile Computing | Kun Gao, Lifeng Xi, Jifang Li | 539-568 |
Hybrid Image Compression Using Fractal-Wavelet Prediction | Liangbin Zhang, Lifeng Xi | 539-566 |
A hybrid method to construct Fuzzy Cognitive Map | Chunmei Lin, Kexiong Chen, Yue He | 539-563 |
Semantic Retrieval System Based on Ontology | Jianbo Xu, Zhonglin Xu, Jiaxun Chen | 539-647 |
Safe Expert System of Chemical Process Based on Neural Network | Huang Chengwu, Yang Hongshan, Jessica Zhang, Jin Zhengqiang | 539-652 |
Mobile Payment System for Prepayment Meter | Pan Tie-Jun, Zheng Lei-Na | 539-529 |
Concepts Discrimination Research | Jianbo Xu, Chengwei Ma, Jiaxun Chen | 539-598 |
A parameter robust numerical method for a singularly perturbed Volterra equation in security technologies | Cen Zhongdi, Xi Lifeng | 539-538 |
Security Key: A New Mobile Payment Solution | Pan Tie-Jun, Zheng Lei-Na | 539-531 |
A Public-Key Cryptosystem Scheme on conic curves over the ring Zn | Zhigang Chen, Xinxia Song, Jifang Li | 539-533 |
A Multiplier to Enhance the Speed of Encryption/Decryption | Yang Ai-Min,Zhang Wen-Xiang | 539-536 |
Wednesday, November 22, 2006
SESSION: Cryptography, privacy policy and applications of information security
Chair: Sattar J Aboud, Devinder Kaur
A New Idea in Digital Signature Schemes | Mohammed A Al-Fayoumi, Sattar J Aboud | 539-458 |
Privacy Protection in Context-Dependent Retrieval of Information and Multimedia | Elena Vildjiounaite Vesa Kyllönen | 539-230 |
Towards Policy-based System on Privacy | Assadarat Khurat, Joerg Abendroth | 539-339 |
Using Grammatical Evolution for Evolving Intrusion Detection Rules | Dominic Wilson, Devinder Kaur | 539-374 |
Study on security policy options for responding to phishing | Eungyong Lee, yoongjung Kim | 539-641 |
Secure Architecture for the Digital Rights Management of the M-Content | Ion Ivan, Cristian Toma, Marius Popa, Catalin Boja | 539-552 |
Deploying the Trusted Platform Module (TPM) to Increased Fairness and Trust in P2P File Sharing Servants | Joerg Abendroth, Jean-Marc Seigneur | 539-335 |
Malicious Code Detection Method over IPv4/IPv6 Tunneling Using Naive Bayesian Classifier | Kyu-Cheol Oh,Ki-Ho Lee,You-Jae Won | 539-625 |
Efficient Hardware Implementations for the DES Family | Charalampos Manifavas Ioannis Papaefstathiou Christos Sotiriou | 539-660 |
Analysis of software vulnerability | Chunguang Kuang Qing Miao Hua Chen | 539-128 |