TABLE OF CONTENTS

 

6th WSEAS International Conference on
INFORMATION SECURITY and PRIVACY
(ISP '07)

  

Tenerife, Canary Islands, Spain
December 14-16, 2007

 

 

The Applications of Ameso Optimization in Supply Chains

572-088

M. N. Katehakis, Wen Chen

 

 

 

Supply Chain for a High Stakes Testing Agency

572-091

Ronald Armstrong, Dmitry Belov, Mabel Kung

 

 

 

Quickest Path Distances on Context-Free Labeled Graphs

572-199

Phillip G. Bradford

 

 

 

An Information-Theoretic Security Analysis of Quantum String Sealing

572-223

Masaki Nakanishi, Seiichiro Tani, Shigeru Yamashita

 

 

 

A New Public Key Cryptosystem based on Matrices

572-235

Rafael Alvarez, Francisco-Miguel Martinez, Jose-Francisco Vicent, Antonio Zamora

 

 

 

Generating Pseudo-Random Sequences from Cellular Automata and Bent Functions

572-243

Francisco J. Garcia, Veronica Requena, Virtudes Tomas

 

 

 

A Characterization of Bent Functions on n + 1 Variables

572-244

Joan-Josep Climent, Francisco J. Garcia, Veronica Requena

 

 

 

Construction of a Convolutional Code based Symmetric Cryptosystem

572-247

Joan-Josep Climent, Francisco Ferrandez, Virtudes Tomas

 

 

 

Distributed Information Systems and Data Security Problem

572-425

Agnieszka Dardzinska-Glebocka

 

 

 

Posterior Distributions for Rare Events in Multivariate Categorical Data

572-089

Douglas H. Jones

 

 

 

Trustrings in Mobile Wireless Network Settings

572-195

Dagmara Spiewak, Volker Fusenig, Thomas Engel

 

 

 

A Survey on IDS Alerts Processing Techniques

572-217

Safaa O. Al-Mamory, Hong Li Zhang

 

 

 

Study on Information Security Strategy for Ubiquitous Society

572-222

Eungyong Lee, Lim Hee Jun, Min Koung Sik

 

 

 

Home Area Network: A Security Perspective

572-248

Hira Sathu, Ranjana Shukla

 

 

 

A Quantum Secure Direct Communication Protocol for Sending a Quantum State and its Security Analysis

572-255

Yumiko Murakami, Masaki Nakanishi, Shigeru Yamashita, Yasuhiko Nakashima, Manabu Hagiwara

 

 

 

Fast Pseudorandom Generator based on Packed Matrices

572-267

Jose-Vicente Aguirre, Rafael Alvarez, Leandro Tortosa, Antonio Zamora

 

 

 

Depth-in-Defense Approach against DDoS

572-305

Rabia Sirhindi, Asma Basharat, Ahmad Raza Cheema

 

 

 

A Novel Solution for IP Spoofing Attacks

572-310

Asma Basharat, Rabia Sirhindi, Ahmad Raza Cheema, Imtiaz Khokhar

 

 

 

Towards a Corporate IT Risk Management Model

572-315

Mario Spremic, Matija Popovic

 

 

 

Methods of Privacy Protection Certification Systems

572-384

Ki-Ho Lee, Tae-Hee Cho, Kyu-Cheol Oh, Dae-Yong Byun, Sang-Soo Jang

 

 

 

Nested Encryption Library for automated IPSec-based Anonymous Circuits Establishment

572-437

Herve Aiache, Matteo Lauriano, Corinne Sieux, Cedric Tavernier

 

 

 

Privacy from an Individuals' Point of View in German Speaking Countries: Assessments and Empirical Results

572-438

Ulrike Hugl, Harald Valkanover

 

 

 

IP Trace Back Techniques to Ferret out Denial of Service Attack Source

572-468

Adnan Aijaz, Syed Raza Mohsin, Mofassir-Ul-Haque

 

 

 

Multi-Purpose Code Generation Using Fingerprint Images

572-534

H. A. Ali, B. M. Ne'ma

 

 

 

A Static or Dynamic Reconfiguration Method of Security Functions for Mobile Devices by Using the Security Profiles

572-572

Wonjoo Park, Dongho Kang, Kiyoung Kim

 

 

 

Study on Spam Endurance Index in On-Line Environment

572-587

Kiyeon Baek, Youngha Yang, Jinho Yoo

 

 

 

The Design of SSO Service Architecture for Mashup Service in Web Portals

572-591

SoHee Park, JeongNyeo Kim

 

 

 

Implementation of a Cryptographic Co-Processor

572-693

A. P. Kakarountas, H. Michail

 

 

 

CESNET Intrusion Detection System

572-420

Pavel Vachek

 

 

 

Image Contrast Enhancement and Quantitative Measuring of Information Flow

571-298

Zhengmao Ye, Habib Mohamadian, Su-Seng Pang, Sitharama Iyengar

 

 

 

A New and Comprehensive Taxonomy of DDoS Attacks and Defense Mechanism

572-400

Abbass Asosheh, Naghmeh Ramezani