![](https://dblp.org/img/logo.ua.320x120.png)
![](https://dblp.org/img/dropdown.dark.16x16.png)
![](https://dblp.org/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
2nd SIN 2009: Gazimagusa, North Cyprus
- Atilla Elçi, Oleg B. Makarevich, Mehmet A. Orgun, Alexander G. Chefranov, Josef Pieprzyk, Yuri Anatolievich Bryukhomitsky, Siddika Berna Örs:
Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009. ACM 2009, ISBN 978-1-60558-412-6
Keynote session 1
- Vijay Varadharajan
:
Evolution and challenges in trust and security in information system infrastructures. 1-2
SA.1 SA: security assessment, policies, and educational programs
- Vladimir Mikhailovich Shishkin, Sergey Vitalievich Savkov:
The method of interval estimation in risk-analysis system. 3-7 - Jukka A. Koskinen, Tomi O. Kelo:
Pure e-learning course in information security. 8-13 - Mücahit Mutlugün, Oktay Adalier:
Turkish national electronic identity card. 14-18
Keynote session 2
- Elisa Bertino:
Assured information sharing: concepts and issues. 19-20
SA.2 SA: security assessment, policies, and educational programs
- Anand Singh, David J. Lilja:
Improving risk assessment methodology: a statistical design of experiments approach. 21-29 - Tomi O. Kelo, Jukka A. Koskinen:
Modeling network security competence for certification. 30-38
SA.3 SA: security assessment, policies, and educational programs
- Haider Abbas
, Louise Yngström, Ahmed Hemani:
Adaptability infrastructure for bridging IT security evaluation and options theory. 39-45 - Simon Edward Parkin, Aad P. A. van Moorsel, Robert Coles:
An information security ontology incorporating human-behavioural implications. 46-55
SI.1 SI: security and integrity management and models
- Andrey P. Kurilo, Natalia G. Miloslavskaya
, Svetlana Tolstaya:
Ensuring information security controls for the Russian banking organizations. 56-60 - Lie Liu, Chun Yuan:
Trace and revoke systems with short ciphertexts. 61-66 - Alexandr S. Basan
, Lyudmila K. Babenko
, Oleg B. Makarevich
:
A model of mandatory access for current database management systems. 67-70 - Serif Bahtiyar, Murat Cihan, Mehmet Ufuk Çaglayan:
An architectural approach for assessing system trust based on security policy specifications and security mechanisms. 71-74
SI.2 SI: security and integrity management and models
- Xianghan Zheng, Vladimir A. Oleshchuk:
A secure architecture for P2PSIP-based communication systems. 75-82 - Çagdas Cirit, Feza Buzluca
:
A UML profile for role-based access control. 83-92
SI.3 SI: security and integrity management and models
- Anna Kostina, Natalia G. Miloslavskaya
, Alexander I. Tolstoy
:
Information security incident management process. 93-97 - Samrat Mondal
, Shamik Sural
:
XML-based policy specification framework for spatiotemporal access control. 98-103
Keynote session 3
- Erdal Cayirci:
Deployed sensor networks and their security challenges in practice. 104
CS.1 CS: cryptography, security, and networks
- Sari Haj Hussein:
The hush cryptosystem. 105-110 - Sumi M., Ebrahim A. Soujeri
, Rahim Rajan, Harikrishnan A. I.:
Design of a zigbee-based RFID network for industry applications. 111-116 - Mahdi Dashtbozorgi, Mohammad Abdollahi Azgomi
:
A scalable multi-core aware software architecture for high-performance network monitoring. 117-122
CS.2 CS: cryptography, security, and networks
- Feodor Kulishov:
DFA-based and SIMD NFA-based regular expression matching on cell BE for fast network traffic filtering. 123-127 - Christian Schridde, Matthew Smith, Bernd Freisleben
:
TrueIP: prevention of IP spoofing attacks using identity-based cryptography. 128-137
Keynote session 4
- Sorin Alexander Huss:
Embedded systems for IT security applications: properties and design considerations. 138-142
CS.3 CS: cryptography, security, and networks
- Kazim Yumbul, Erkay Savas:
Efficient, secure, and isolated execution of cryptographic algorithms on a cryptographic unit. 143-151 - Sazia Parvin
, Shohrab Ali, Song Han, Tharam S. Dillon:
Security against DOS attack in mobile IP communication. 152-157
CS.4 CS: cryptography, security, and networks
- Somanath Tripathy
:
Effective pair-wise key establishment scheme for wireless sensor networks. 158-163 - Ahmed Y. Mahmoud
, Alexander G. Chefranov
:
Hill cipher modification based on eigenvalues HCM-EE. 164-167 - Naveen Kumar
, Shrikant Ojha, Kritika Jain, Sangeeta Lal:
BEAN: a lightweight stream cipher. 168-171 - Erdal Cayirci, Son Thanh Nguyen, Chunming Rong
:
Secure many to many routing for wireless sensor and actuator networks. 172-178
SA.1 AI: attacks and intrusion detection
- Gökhan Dalkiliç
, Devrim Sipahi, Mehmet Hilal Özcanhan
:
A simple yet effective spam blocking method. 179-185 - Khaled Salah
, Karim Sattar
, Zubair A. Baig
, Mohammed H. Sqalli, Prasad Calyam:
Resiliency of open-source firewalls against remote discovery of last-matching rules. 186-192
SA.2 AI: attacks and intrusion detection
- R. Suriya, K. Saravanan, Arunkumar Thangavelu:
An integrated approach to detect phishing mail attacks: a case study. 193-199 - Jayashree Padmanabhan, K. S. Easwarakumar
, Gokul B., Harishankar S.:
Trust based traffic monitoring approach for preventing denial of service attacks. 200-206
SA.3 AI: attacks and intrusion detection
- Vadim D. Kotov, Vladimir I. Vasilyev:
Artificial immune system based intrusion detection system. 207-212 - Sanjay Rawat, Ashutosh Saxena:
Danger theory based SYN flood attack detection in autonomic network. 213-218
SA.4 AI: attacks and intrusion detection
- Kuldeep Singh, Audun Jøsang, Md. Sadek Ferdous
, Ravishankar Borgaonkar:
Spam filter optimality based on signal detection theory. 219-224 - Vinod P. Nair, Vijay Laxmi
, Manoj Singh Gaur, G. V. S. S. Phani Kumar, Yadvendra S. Chundawat:
Static CFG analyzer for metamorphic Malware code. 225-228 - Iftikhar Ahmad, Azween B. Abdullah
, Abdullah Sharaf Alghamdi:
Application of artificial neural network in detection of DOS attacks. 229-234
AC.1 AC: access control and security assurance
- Vladimir Kotenko, Alexey Evseev, Stas Kotenko, Konstantin E. Rumyantsev
:
New approach to evaluate the effectiveness of the audio information protection for determining the identity of virtual speech images. 235-239 - Dmitry Rublev, Vladimir Fedorov, Oleg B. Makarevich
, Anatolij Chumachenko:
Digital sound card identification based on recording path imperfections. 240-243 - Atilla Elçi, Behnam Rahnama:
AWGN based seed for random noise generator in ParseKey+. 244-248
AC.2 AC: access control and security assurance
- Kemal Bicakci
:
Pushing the limits of one-time signatures. 249-257 - Moussa Amir Ehsan, Morteza Amini
, Rasool Jalili:
A semantic-based access control mechanism using semantic technologies. 258-267
AC.3 AC: access control and security assurance
- Jorge L. Hernandez-Ardieta, Ana Isabel González-Tablas Ferreres
, Benjamín Ramos, Arturo Ribagorda:
Extended electronic signature policies. 268-277 - Francesco Buccafurri
, Gianluca Caminiti, Gianluca Lax
:
Fortifying the dalì attack on digital signature. 278-287
AC.4 AC: access control and security assurance
- Ashutosh Saxena:
An efficient and secure protocol for DTV broadcasts. 288-292 - Riccardo Bresciani, Andrew Butterfield
:
Weakening the Dolev-Yao model through probability. 293-297 - Vijay Laxmi
, Mudassar N. Khan, Sarath S. Kumar, Manoj Singh Gaur:
Buyer seller watermarking protocol for digital rights management. 298-301
Technopark reception
- Oleg B. Makarevich
, Lyudmila K. Babenko
:
Research and Education Activities of the Department of Security of Information Technologies of Taganrog Institute of Technology of the Southern Federal University in the Field of Information Security. 302-303
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.