Tabla de Contenidos:
  • Chaotic routing as a method of an information conversion / Y.P. Shankin
  • Combinatorial game models for security systems / Edward Pogossian
  • Architectural enhancements for secure embedded processing / Divya Arora, Srivaths Ravi, Anand Raghunathan and Niraj K. Jha
  • Computational improvements to differential side channel analysis / David Nacache, Michael Tunstall and Claire Whelan
  • A process algebra approach to authentication and secrecy / Lacramioara Astefanoaei and Gabriel Ciobanu
  • Intellectual property protection using embedded systems / A.G. Fragopoulos and D.N. Serpanos
  • Challenges in deeply networked system survivability / Philip Koopman, Jennifer Morris and Priya Narasimhan
  • Multimedia watermarking / Bede Liu
  • A platform for designing secure embedded systems / Haris Lekatsas, Jorg Henkel, Venkata Jakkula and Srimat Chakradhar
  • Cryptographic insecurity of the test & repeat paradigm / Tomas Rosa
  • A privacy classification model based on linkability valuation / Dan Cvrcek, Vashek Matyas and Marek Kumpost
  • A run-time reconfigurable architecture for embedded program flow verification / Joseph Zambreno, Tanathil Anish and Alok Choudhary
  • Model-based validation of enterprise access policies / Sandeep Bhatt, William Horne, Joe Pato, Raj Rajagopalan and Prasad Rao
  • Research issues in homeland security / Theodoros Zachariadis
  • Assurance in autonomous decentralized embedded system / Kinji Mori.
  • Vulnerabilities and countermeasures for embedded processors / Shengqi Yang, Wayne Wolf, N. Vijakrishnan, Yuan Xie and Dimitrios Serpanos
  • Agent-based modeling and simulation of malefactors' attacks against computer networks / Igor Kotenko, Mihail Stepashkin and Alexander Ulanov
  • Current problems in security of military networks / Jaroslav Dockal and Pavel Pokorny
  • Multi-agent framework for intrusion detection and alert correlation / Vladimir Gorodetsky, Oleg Karsaev, Valdimir Samoilov and Alexander Ulanov
  • Securing home and building automation systems using the zPnP approach / Ran Giladi
  • REWARD : a routing method for ad-hoc networks with adjustable security capability / Zdravko Karakehayov and Ivan Radev
  • On the security of the GSM cellular network / Elad Barkan and Eli Biham
  • Telecommunications fraud & electronic crime in fix and mobile embedded systems / Michalis Mavis.