Organized by:
INSTICC
and
WITRC
from Westminster University


Sponsored by:



in cooperation with:

 

Please Note:
The selection of papers for the book was mainly based in the evaluation provided by the program committee under the program chairs supervision.
The conference attendance was also a factor.
After the book is published the contact author of each paper will receive one complimentary copy of the book.

ADVERTISING VIA MOBILE TERMINALS - Delivering context sensitive and personalized advertising while guaranteeing privacy
Rebecca Bulander, Michael Decker, Gunther Schiefer and Bernhard Kölmel

STRATEGIES FOR SERVICE COMPOSITION IN P2P NETWORKS
Jan Gerke, Peter Reichl and Burkhard Stiller

SECRET LOCKING: EXPLORING NEW APPROACHES TO BIOMETRIC KEY ENCAPSULATION
Seny Kamara, Breno de Medeiros and Susanne Wetzel

SHARING SERVICE RESOURCE INFORMATION FOR APPLICATION INTEGRATION IN A VIRTUAL ENTERPRISE - Modeling the communication protocol for exchanging service resource information
Hiroshi Yamada and Akira Kawaguchi

HOST IDENTITY PROTOCOL PROXY
Patrik Salmela and Jan Melén

GUARANTEERRING SECURITY OF FINANCIAL TRANSACTION BY USING QUANTUM CRYPTOGRAPHY IN BANKING ENVIRONMENT
Solange GHERNAOUTI-HÉLIE and Mohamed Ali SFAXI

OPTIMAL TRADE-OFF FOR MERKLE TREE TRAVERSAL
Piotr Berman, Marek Karpinski and Yakov Nekrich

SUPPORTING THE CYBERCRIME INVESTIGATION PROCESS: EFFECTIVE DISCRIMINATION OF SOURCE CODE AUTHORS BASED ON BYTE-LEVEL INFORMATION
Georgia Frantzeskou, Efstathios Stamatatos and Stefanos Gritzalis

PERFORMANCE OF VOIP OVER IEEE 802.11G DSSS-OFDM MODE WITH IEEE 802.11E QOS SUPPORT
Gráinne Hanley, Seán Murphy and Liam Murphy

A COMPARATIVE STUDY OF IEEE 802.11 MAC ACCESS MECHANISMS FOR DIFFERENT TRAFFIC TYPES
Mohammad Saraireh, Reza Saatchi, Samir Al-khayatt and Rebecca Strachan

AN AUTOMATIC BLIND MODULATION RECOGNITION ALGORITHM FOR M-PSK SIGNALS BASED ON MSE CRITERION
M. Vastram Naik, A. Mahanta, R. Bhattacharjee and H. B. Nemade

ITERATIVE MMSE DETECTION FOR MIMO/BLAST DS-CDMA SYSTEMS IN FREQUENCY SELECTIVE FADING CHANNELS - Achieving High Performance in Fully Loaded Systems
João Carlos Silva, Nuno Souto, Francisco Cercas and Rui Dinis

PROPERTIES OF DOMINANT COLOR TEMPERATURE DESCRIPTOR
Karol Wnukowicz and Wladyslaw Skarbek

TEST ENVIRONMENT FOR PERFORMANCE EVALUATION OF AN INTERNET RADIO
David Melendi, Manuel Vilas, Xabiel G. Pañeda, Roberto García and Víctor G. García

END TO END ADAPTATION FOR THE WEB: Matching Content to Client Connections
Kristoffer Getchell, Martin Bateman, Colin Allison and Alan Miller

SEARCHING FOR RESOURCES IN MANETS - A cluster based flooding approach
Rodolfo Oliveira, Luis Bernardo and Paulo Pinto

ADAPTIVE REAL-TIME NETWORK MONITORING SYSTEM: - Detecting Anomalous Activity with Evolving Connectionist System
Muhammad Fermi Pasha, Rahmat Budiarto and Masashi Yamada

ON DIGITAL CASH-LIKE PAYMENT SYSTEMS
Daniel A. Nagya

IN-DEPTH ANALYSIS OF SELECTED TOPICS RELATED TO THE QUALITY ASSESSMENT OF E-COMMERCE SYSTEMS
Antonia Stefani, Dimitris Stavrinoudis and Michalis Xenos

A NOVEL REAL-TIME SELF-SIMILAR TRAFFIC DETECTOR/FILTER TO IMPROVE THE RELIABILITY OF A TCP BASED END-TO-END CLIENT/SERVER INTERACTION PATH FOR SHORTER ROUNDTRIP TIME
Wilfred W. K. Lin, Allan K. Y. Wong, Richard S.L. Wu and Tharam S. Dillon

FLOODING ATTACK ON THE BINDING CACHE IN MOBILE IPv6
Christian Veigner and Chunming Rong

VOICE BIOMETRICS WITHIN THE FAMILY: TRUST, PRIVACY AND PERSONALISATION
Delphine Charlet and Victor Peral Lecha

THE ROBUSTNESS OF BLOCKING PROBABILITY IN A LOSS SYSTEM WITH REPEATED CUSTOMERS
Akira Takahashi, Yoshitaka Takahashi, Shigeru Kaneda, Yoshikazu Akinaga and Noriteru Shinagawa

ON THE EVALUATION OF A SECURE SOLUTION TO ACCESS 802.11 NETWORKS
Fernando da Costa Junior, Luciano Gaspary, Jorge Barbosa, Gerson Cavalheiro and Luciano Pfitscher