TABLE OF CONTENTS
6th WSEAS International Conference
on
INFORMATION SECURITY and PRIVACY
(ISP '07)
Tenerife, Canary Islands, Spain
December 14-16, 2007
The Applications of Ameso Optimization in Supply Chains |
572-088 |
M. N. Katehakis, Wen Chen |
|
|
|
Supply Chain for a High Stakes Testing Agency |
572-091 |
Ronald Armstrong, Dmitry Belov, Mabel Kung |
|
|
|
Quickest Path Distances on Context-Free Labeled Graphs |
572-199 |
Phillip G. Bradford |
|
|
|
An Information-Theoretic Security Analysis of Quantum String Sealing |
572-223 |
Masaki Nakanishi, Seiichiro Tani, Shigeru Yamashita |
|
|
|
A New Public Key Cryptosystem based on Matrices |
572-235 |
Rafael Alvarez, Francisco-Miguel Martinez, Jose-Francisco Vicent, Antonio Zamora |
|
|
|
Generating Pseudo-Random Sequences from Cellular Automata and Bent Functions |
572-243 |
Francisco J. Garcia, Veronica Requena, Virtudes Tomas |
|
|
|
A Characterization of Bent Functions on n + 1 Variables |
572-244 |
Joan-Josep Climent, Francisco J. Garcia, Veronica Requena |
|
|
|
Construction of a Convolutional Code based Symmetric Cryptosystem |
572-247 |
Joan-Josep Climent, Francisco Ferrandez, Virtudes Tomas |
|
|
|
Distributed Information Systems and Data Security Problem |
572-425 |
Agnieszka Dardzinska-Glebocka |
|
|
|
Posterior Distributions for Rare Events in Multivariate Categorical Data |
572-089 |
Douglas H. Jones |
|
|
|
Trustrings in Mobile Wireless Network Settings |
572-195 |
Dagmara Spiewak, Volker Fusenig, Thomas Engel |
|
|
|
A Survey on IDS Alerts Processing Techniques |
572-217 |
Safaa O. Al-Mamory, Hong Li Zhang |
|
|
|
Study on Information Security Strategy for Ubiquitous Society |
572-222 |
Eungyong Lee, Lim Hee Jun, Min Koung Sik |
|
|
|
Home Area Network: A Security Perspective |
572-248 |
Hira Sathu, Ranjana Shukla |
|
|
|
A Quantum Secure Direct Communication Protocol for Sending a Quantum State and its Security Analysis |
572-255 |
Yumiko Murakami, Masaki Nakanishi, Shigeru Yamashita, Yasuhiko Nakashima, Manabu Hagiwara |
|
|
|
Fast Pseudorandom Generator based on Packed Matrices |
572-267 |
Jose-Vicente Aguirre, Rafael Alvarez, Leandro Tortosa, Antonio Zamora |
|
|
|
Depth-in-Defense Approach against DDoS |
572-305 |
Rabia Sirhindi, Asma Basharat, Ahmad Raza Cheema |
|
|
|
A Novel Solution for IP Spoofing Attacks |
572-310 |
Asma Basharat, Rabia Sirhindi, Ahmad Raza Cheema, Imtiaz Khokhar |
|
|
|
Towards a Corporate IT Risk Management Model |
572-315 |
Mario Spremic, Matija Popovic |
|
|
|
Methods of Privacy Protection Certification Systems |
572-384 |
Ki-Ho Lee, Tae-Hee Cho, Kyu-Cheol Oh, Dae-Yong Byun, Sang-Soo Jang |
|
|
|
Nested Encryption Library for automated IPSec-based Anonymous Circuits Establishment |
572-437 |
Herve Aiache, Matteo Lauriano, Corinne Sieux, Cedric Tavernier |
|
|
|
Privacy from an Individuals' Point of View in German Speaking Countries: Assessments and Empirical Results |
572-438 |
Ulrike Hugl, Harald Valkanover |
|
|
|
IP Trace Back Techniques to Ferret out Denial of Service Attack Source |
572-468 |
Adnan Aijaz, Syed Raza Mohsin, Mofassir-Ul-Haque |
|
|
|
Multi-Purpose Code Generation Using Fingerprint Images |
572-534 |
H. A. Ali, B. M. Ne'ma |
|
|
|
A Static or Dynamic Reconfiguration Method of Security Functions for Mobile Devices by Using the Security Profiles |
572-572 |
Wonjoo Park, Dongho Kang, Kiyoung Kim |
|
|
|
Study on Spam Endurance Index in On-Line Environment |
572-587 |
Kiyeon Baek, Youngha Yang, Jinho Yoo |
|
|
|
The Design of SSO Service Architecture for Mashup Service in Web Portals |
572-591 |
SoHee Park, JeongNyeo Kim |
|
|
|
Implementation of a Cryptographic Co-Processor |
572-693 |
A. P. Kakarountas, H. Michail |
|
|
|
CESNET Intrusion Detection System |
572-420 |
Pavel Vachek |
|
|
|
Image Contrast Enhancement and Quantitative Measuring of Information Flow |
571-298 |
Zhengmao Ye, Habib Mohamadian, Su-Seng Pang, Sitharama Iyengar |
|
|
|
A New and Comprehensive Taxonomy of DDoS Attacks and Defense Mechanism |
572-400 |
Abbass Asosheh, Naghmeh Ramezani |