Personal tools
You are here: Home Program SAM'09: July 14, 2009 Schedule
Current Event
Click Here
Other Events
Click Here

Click Here

Click Here

Click Here

Click Here

Click Here

WORLDCOMP'06 & '07
Click Here

Join Our Mailing List
Sign up to receive email announcements and updates about conferences and future events


SAM'09: July 14, 2009 Schedule

Last modified 2009-06-20 16:14

To select a different schedule CLICK HERE

6:45am - 5:00pm:  REGISTRATION (Second Floor, Conference Lobby: 1-5)

                  Chair: Prof. Kevin Daimi, University of Detroit Mercy, Michigan, USA
                  July 14, 2009 (Tuesday); 08:00am - 10:20am
                  (LOCATION: Ballroom 8)

08:00 - 08:20am:  An Intrusion Detection System for Mobile Ad-Hoc Networks
                  Charlie Obimbo
                  University of Guelph, Canada

08:20 - 08:40am:  A Database Firewall Server Using Data Masking
                  Eun-Ae Cho, Chang-Joo Moon, Dae-Ha Park, Doo-Kwon Baik
                  Korea University 1, Korea & Konkuk University, Korea &
                  Korea Digital University, Korea

08:40 - 09:00am:  Denial of Service Attack Resilience on Area Expanded WLAN Services
                  Ryu Watanabe and Toshiaki Tanaka
                  KDDI R&D Laboratories, Inc., Japan

09:00 - 09:20am:  Detecting Anomalies in Network Traffic with Entropy Based
                  MA-RMSE Algorithms
                  Breno Pinto, Varin Khera, Chun Che Fung
                  Computer Security Incident Response Team BrasilTelecom (CSIRT), Brazil &
                  CSI Security APAC, Nokia Siemens Network & Murdoch U., Australia

09:20 - 09:40am:  A New Element in Information Security Process - Security
                  Aware Smart Household Employee
                  Ilze Murane
                  The University of Latvia, Latvia

09:40 - 10:00am:  A New Practical Scheme for Protecting Web Content
                  Eric Ke Wang, Lucas C. K. Hui, S. M.Yiu
                  University of Hong Kong, Hong Kong

10:00 - 10:20am:  Advanced Network Traffic Visualization in the Service of
                  Network Security
                  Pavel Minarik, Zdenek Vrbka, Marek Winkler
                  Masaryk University, Czech Republic

10:20 - 10:40am:  BREAK

                  Co-Chairs: Prof. Gevorg Margarov* and Francis J. Manning III**
                  *State Engineering University of Armenia, Yerevan, Armenia
                  **Nova Southeastern University, Florida, USA
                  July 14, 2009 (Tuesday); 10:40am - 12:20pm
                  (LOCATION: Ballroom 8)

10:40 - 11:00am:  A Practical SMS-Based Mutual Authentication Protocol for
                  Secure Online Banking
                  Eric Ke Wang, Yi-Jun He, Lucas C. K. and  Hui S. M. Yiu
                  The University of Hong Kong, Hong Kong

11:00 - 11:20am:  Secure Authentication Using Visual Cryptography
                  Naveen Kumar
                  IGNOU, Maidan Garhi, New Delhi, India

11:20 - 11:40am:  Fingerprint Biometric Solution for Securely Secret Sharing
                  Gevorg Margarov, Maha Tolba
                  State Engineering University of Armenia, Yerevan, Armenia

11:40 - 12:00pm:  An Agent-Based Single Sign-On Scheme for Web Services Environments
                  Woei-Jiunn Tsaur and You-Mine Lin
                  Da-Yeh University, Taiwan

12:00 - 12:20pm:  RFID Authentication Protocol Conforming to EPC Class-1
                  Generation-2 Standard
                  Guiyue Jin, Eun Young Jeong, Ki Dong Lee
                  Yeungnam University, Korea

12:20 - 01:00pm:  LUNCH (On Your Own)

                  Chair: Dr. Xiaowen Zhang, College of Staten Island / CUNY, USA
                  July 14, 2009 (Tuesday); 01:00pm - 03:00pm
                  (LOCATION: Ballroom 8)

01:00 - 01:20pm:  A Tripartite Strong Designated Verifier Scheme Based on
                  Threshold RSA Signatures
                  Jerome Dossogne, Olivier Markowitch
                  Free University of Brussels, Belgium

01:20 - 01:40pm:  Two Efficient Proxy Signature Schemes for Delegationi
                  Chains With Nonrepudiation and Untraceability
                  S. H. Y. Wong, Zoe L. Jiang, L. C. K. Hui, S. M. Yiu
                  The University of Hong Kong, Hong Kong

01:40 - 02:00pm:  Analysis of RFID Authentication Protocols Based on Static
                  and Dynamic Shared Secret
                  Xiaowen Zhang, Qinghai Gao, Mohamed Saad
                  College of Staten Island / CUNY, New York, USA

02:00 - 02:20pm:  A Secure Multi-Provider OSGi Platform Enabling Process-Isolation
                  by Using Distribution
                  Tobias Wegner
                  Technische Universitat Dortmund, Germany

02:20 - 02:40pm:  Security Level Determination Using Branes for Contextual Based
                  Global Processing: An Architecture
                  Gregory Vert, Evangelos Triantaphyllou
                  Louisiana State University, Louisiana, USA

02:40 - 03:00pm:  Tantra: A Fast PRNG Algorithm and its Implementation
                  Mahadevan Gomathisankaran, Ruby Lee
                  Princeton University, USA

03:00 - 03:40pm:  DISCUSSION SESSION A-SAM (Refreshments will be available)
                  July 14, 2009 (Tuesday)
                  (LOCATION: Hallways - Ballrooms 1-5)

                  O. USB Data Leakage Prevention Using Hardware Based Data
                     Inspection Technique
                     DongHo Kang, BoHeung Jung, KyoungSon Jhang, KiYoung Kim
                     Electronics and Telecommunications Research Institute, Korea &
                     ChungNam National University, Daejeon, Korea
                  O. Optical Encryption with Jigsaw Transform Using MATLAB
                     Leidy Marcela Giraldo Castano, Edward Yesid Villegas Pulgarin
                     EAFIT University, Medellin, Colombia
                  O. Multi-Region Based Clustering Analysis Method for Unknown
                     Malicious Code Detection
                     Byoungkoo Kim, Seungyong Yoon, Ikkyun Kim, and Jintae Oh
                     Electronics and Teletcommunicatons Research Institute, Korea
                  O. Differentiated Services to Provide Efficient Node Authentication
                     in VANETs
                     P. Caballero-Gil, C. Hernandez-Goya, A. Fuster-Sabater
                     University of La Laguna, Spain
                  O. Abnormal Traffic Detection Using Flow-Based Traffic Measuring Scheme
                     Seungyong Yoon, Byoungkoo Kim, Hwashin Moon, Ikkyun Kim, Jintae Oh
                     Electronics and Telecommunications Research Institute, Korea
                  O. Security: A Cloud Way
                     Rahul Shelke, Pramila Chawan
                     V.J.T.I. Mumbai, India

                  Co-Chairs: Prof. Charlie Obimbo* and Prof. Gevorg Margarov**
                  *University of Guelph, Canada
                  **State Engineering University of Armenia, Yerevan, Armenia
                  July 14, 2009 (Tuesday); 03:40pm - 06:00pm
                  (LOCATION: Ballroom 8)

03:40 - 04:00pm:  Cryptanalysis of Finite Automata Public Key Cryptosystems
                  Gevorg Margarov, Siranush Chopuryan, Yeghisabet Alaverdyan
                  State Engineering University of Armenia, Republic of Armenia &
                  European Regional Academy, Republic of Armenia

04:00 - 04:20pm:  A Framework for Online Examination Security Based on
                  Cryptology and Biometrics
                  Kevin Daimi
                  University of Detroit Mercy, Michigan, USA

04:20 - 04:40pm:  Design of a Cryptographic Software for Wireless Network Security
                  Dr. Okonigene R.E., ...
                  Ambrose Alli University, Nigeria

04:40 - 05:00pm:  A Performance Comparison of Microsoft SQL Server 2008 Transparent
                  Data Encryption and NetLib Encryptionizer
                  Phillip D. Colbert and Ben A. Juliano
                  California State University, Chico, USA

05:00 - 05:20pm:  Design and Anlysis of Cryptographically Strong S-Boxes: A Novel Approach
                  S. A. Srinivasan, R. Mukkamala, K. Venkataramaniah
                  Old Dominion University, USA & Sri Sathya Sai University, India

05:20 - 05:40pm:  Cryptanalysis of an Identification Scheme Based on the Perceptron
                  Problem Using a Hybridization of Deterministic Optimization
                  and Genetic Algorithm
                  Le Thi Hoai An, Pham Dinh Tao, Bouallagui Sarra
                  University Paul Verlaine - Metz, France &
                  National Institute for Applied Sciences - Rouen, France

05:40 - 06:00pm:  FREE SLOT

                  (Please see the lists at the begining of this booklet)

To select a different schedule CLICK HERE

Administered by UCMSS
Universal Conference Management Systems & Support
San Diego, California, USA
Contact: Kaveh Arbtan

If you can read this text, it means you are not experiencing the Plone design at its best. Plone makes heavy use of CSS, which means it is accessible to any internet browser, but the design needs a standards-compliant browser to look like we intended it. Just so you know ;)