Scheduled System Maintenance
On Friday, October 20, IEEE Xplore will be unavailable from 9:00 PM-midnight ET. We apologize for the inconvenience.
Notice: There is currently an issue with the citation download feature. Learn more.

2011 8th International ISC Conference on Information Security and Cryptology

14-15 Sept. 2011

Filter Results

Displaying Results 1 - 23 of 23
  • [Front cover]

    Publication Year: 2011, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (128 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (203 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (202 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (243 KB)
    Freely Available from IEEE
  • Program committee members

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (227 KB)

    Provides a listing of current committee members. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reviewers list

    Publication Year: 2011, Page(s):1 - 3
    Request permission for commercial reuse | PDF file iconPDF (284 KB)
    Freely Available from IEEE
  • Authors index

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (211 KB)
    Freely Available from IEEE
  • Table of contents (English papers)

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (202 KB)
    Freely Available from IEEE
  • Trust modeling and verification using Colored Petri Nets

    Publication Year: 2011, Page(s):1 - 8
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (439 KB) | HTML iconHTML

    Trust is an interesting concept in modern computing environments such as pervasive computing, P2P networks, social networks, etc. There is a huge body of works on how to model and evaluate trust and how to decide based on it. However despite the importance of trust and its usages in some critical systems, verification and validation of trust systems have not been sufficiently considered yet. In th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RTBIMS: Accuracy enhancement in Iterative Multiplication Strategy for computing propagated trust

    Publication Year: 2011, Page(s):9 - 14
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB) | HTML iconHTML

    Trust Management (TM) systems are frameworks for managing security in decentralized environments. However computing the trust value is a challenge when the source entity has no experience of previous direct interaction with the sink. A popular way to estimate the trust value in this case is trust propagation. It suggests evaluating the trust value between two nodes based on the information receive... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computing trust resultant using intervals

    Publication Year: 2011, Page(s):15 - 20
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (551 KB) | HTML iconHTML

    An important problem in trust management area is to evaluate the trust value among two nodes in a web of trust using intermediate nodes. This is widely used when the source node has no experience of direct interaction with the target. If trust is used to support decision making, it is important to have not only an accurate estimate of trust, but also a measure of confidence in the intermediate nod... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hybrid rule Threshold Adjustment system for intrusion detection

    Publication Year: 2011, Page(s):21 - 28
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1325 KB) | HTML iconHTML

    Generally, multiple IDSs generates huge volume of alerts every minute and to manage these alerts, rule-based alert management systems are very important. It is critical to keep the rules inside these systems updated, based on the ever changing network environment. Rule Threshold Adjustment is the solution to this problem and it is able to keep the rules updated. Rule Threshold Adjustment tunes the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security analyzing and designing GUI with the resources model

    Publication Year: 2011, Page(s):29 - 36
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1916 KB) | HTML iconHTML

    Recently security problems in the Graphic User Interface (GUI) of applications have become a serious threat for system security. Because much of security experts don't design the GUI from end user's point of view, users have problems to practice security. The aim of Human & Computer Interaction (HCI) and Security (HCI-Sec) is to improve the usability of security features in end user applicatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the period of GSM's A5/1 stream cipher and its internal state transition structure

    Publication Year: 2011, Page(s):37 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (572 KB) | HTML iconHTML

    The A5/1 algorithm is one of the most applicable and famous stream cipher algorithms. However, the period of A5/1 keystream sequence and the exact structure of its internal state transition were not investigated thoroughly, until now. This paper deals with the transition of the internal state of A5/1 algorithm and tries to present a model for such a transition. Additionally, the internal states ar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An improved attack on A5/1

    Publication Year: 2011, Page(s):41 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB) | HTML iconHTML

    A5/1 is a stream cipher used in GSM to provide over-the-air communication privacy. Biham and Dunkelman proposed an attack on A5/1 with time complexity of 2^(39.91) and data complexity of 2^(21.1) known bits and memory complexity of 32 GB. In this paper, we propose an improvement on their attack. Our improvement is identification and elimination of useless states from the precomputed table. Further... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An entanglement-based quantum key distribution protocol

    Publication Year: 2011, Page(s):45 - 48
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (194 KB) | HTML iconHTML

    A novel quantum key distribution protocol using entanglement is presented. In this protocol, the stream of qubits is divided up into a sequence of qubit pairs. It is shown that by entangling the qubits in each qubit pair by randomly applying one of the two predefined unitary transformations before transmission, the protocol reveals less information about the key bit than the BB84 protocol, and the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cryptanalysis and improvement on a new RFID mutual authentication protocol compatible with EPC standard

    Publication Year: 2011, Page(s):49 - 54
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (297 KB) | HTML iconHTML

    The developing of RFID systems in sensitive applications like e-passport, e-health, credit cards, and personal devices, makes it necessary to consider the related security and privacy issues in precise. Among other security characteristic of an RFID authentication protocol, the untraceability and synchronization are the most important attributes. The former is strongly related to the privacy of ta... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiple-chi-square tests and their application on distinguishing attacks

    Publication Year: 2011, Page(s):55 - 60
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (523 KB) | HTML iconHTML

    Chi-square tests are vastly used for distinguishing random distributions, but extra care must be taken when using them on several independent variables. We noticed, the chi-square statistics, in some previous works, was computed half of its real value. Thus, to avoid possible future confusions, we formulize multiple-chi-square tests. To show the application of multiple-chi-square tests, we introdu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A secure and robust video watermarking based on chaotic maps

    Publication Year: 2011, Page(s):61 - 66
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1136 KB) | HTML iconHTML

    The intriguing characteristics of chaotic maps have prompted researchers to use these sequences in watermarking systems to good effect. In this paper we aim to use a tent map to encrypt the binary logo to arrive at a like-noise signal. This approach makes extraction of the watermark signal for potential attacker very hard. Embedding locations are selected based on certain principles. The experimen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Watermarking in Farsi/Arabic binary document images using fractal coding

    Publication Year: 2011, Page(s):67 - 72
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1211 KB) | HTML iconHTML

    This paper presents a novel watermarking method based on fractal theory. In the proposed method, information is embedded into binary document images. First, host image is coded by the proposed fractal coding method which is designed particularly for binary images. To insert the watermark uniformly over the entire host image, only some of Range segments with certain conditions are selected. Then, t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient buyer-seller watermarking protocol based on proxy signatures

    Publication Year: 2011, Page(s):73 - 78
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (252 KB) | HTML iconHTML

    In this paper, we employ the concept of proxy signatures to propose a buyer-seller watermarking protocol. We show that in the proposed protocol, watermarks are generated such that the seller is unable to fabricate piracy, but he can trace copyright violators. The protocol further protects anonymity of the buyer until s/he is adjudicated to be guilty. Moreover, we solve the conspiracy problem witho... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A reversible data embedding scheme based on search order coding for VQ index tables

    Publication Year: 2011, Page(s):79 - 82
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (753 KB) | HTML iconHTML

    This paper proposes a reversible data hiding scheme for vector quantization (VQ)-compressed images based on search order coding (SOC). Data is embedded by choosing one of the possible ways to represent each embeddable index and outputted code is legitimate SOC code. The proposed scheme has two advantages. First it is more secure, comparing with previous SOC based schemes that generate non-legitima... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cryptographic keys management for H.264 scalable coded video security

    Publication Year: 2011, Page(s):83 - 86
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (554 KB) | HTML iconHTML

    Scalable multi-layered coded video requires its individual layer security, as every layer has its own characteristics i.e. bit-rate, frame rate, resolution and quality. We investigate a problem of individual layer cryptographic key management issues in scalable video coding (H.264/SVC) and propose a top down hierarchical keys generation and distribution system by using a standard key management pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.