Please Note:
The selection of papers for the book was mainly based in the evaluation provided by the program committee under the program chairs supervision.
The conference attendance was also a factor.
After the book is published the contact author of each paper will receive one complimentary copy of the book.

- A CREDIT CARD USAGE BEHAVIOUR ANALYSIS FRAMEWORK - A DATA MINING APPROACH
Chieh-Yuan Tsai

- AN ADAPTIVE SHILL BIDDING AGENT
Jarrod Trevathan, Alan McCabe and Wayne Read

- CRITICAL SUCCESS FACTORS OF INTERNET SHOPPING IN JAPAN: CUSTOMER-CENTRIC AND WEBSITE-CENTRIC PERSPECTIVES
Kanokwan Atchariyachanvanich, Hitoshi Okada and Noboru Sonehara

- A MIDDLEWARE INFRASTRUCTURE FOR MOBILE SERVICES BASED ON AN ENTERPRISE SERVICE BUS - Mobile Service Provisioning as SOA-Integration Problem
Michael Decker and Rebecca Bulander

- TOWARDS A GENERIC FRAUD ONTOLOGY IN E-GOVERNMENT
Panos Alexopoulos, Kostas Kafentzis, Xanthi Benetou, Tassos Tagaris and Panos Georgolios

- SECURE COMPUTATION OF COMMON DATA AMONG MALICIOUS PARTNERS
Sebastian Obermeier and Stefan Böttcher

- K2: A STREAM CIPHER ALGORITHM USING DYNAMIC FEEDBACK CONTROL
Shinsaku Kiyomoto, Toshiaki Tanaka and Kouichi Sakurai

- REMOTE ALGORITHMIC COMPLEXITY ATTACKS AGAINST RANDOMIZED HASH TABLES
Noa Bar-Yosef and Avishai Wool

- ON THE EFFECT OF SCORE EQUALIZATION IN SVM MULTIMODAL BIOMETRIC SYSTEMS
Pascual Ejarque and Javier Hernando

- A COMBINATORICS PROLIFERATION MODEL TO DETERMINE THE TIMING FOR BLOCKING SCANNING MALWARE
Kazumasa Omote, Takeshi Shimoyama and Satoru Torii

- A QUERY UNIT FOR THE IPSEC DATABASES
Alberto Ferrante, Sathish Chandra and Vincenzo Piuri

- A 3G IMS-BASED TESTBED FOR SECURE REAL-TIME AUDIO SESSIONS
Paolo Cennamo, Antonio Fresa, Anton Luca Robustelli, Francesco Toro, Maurizio Longo and Fabio Postiglione

- PRACTICAL SECURE BIOMETRICS USING SET INTERSECTION AS A SIMILARITY MEASURE
Daniel Socek, Dubravko Ćulibrk and Vladimir Božović

- ON THE KEY-COMPROMISE IMPERSONATION VULNERABILITY OF ONE-PASS KEY ESTABLISHMENT PROTOCOLS
K. Chalkias, F. Mpaldimtsi, D. Hristu-Varsakelis and G. Stephanides

- WISE GUARD - MAC Address Spoofing Detection System for Wireless LANs
Kai Tao, Jing Li and Srinivas Sampalli

- A HIGH-LEVEL ASPECT-ORIENTED BASED LANGUAGE FOR SOFTWARE SECURITY HARDENING
Azzam Mourad, Marc-André Laverdière and Mourad Debbabi

- UNSUPERVISED NON PARAMETRIC DATA CLUSTERING BY MEANS OF BAYESIAN INFERENCE AND INFORMATION THEORY
Gilles Bougenière, Claude Cariou, Kacem Chehdi and Alan Gay

- FACIAL EXPRESSION SYNTHESIS AND RECOGNITION WITH INTENSITY ALIGNMENT
Hao Wang

- RATE CONTROL FOR MULTI-SEQUENCE H.264/AVC COMPRESSION
Andrzej Pietrasiewicz and Grzegorz Pastuszak

- SPONTANEOUS AND PERSONALIZED ADVERTISING THROUGH MPEG-7 MARKUP AND SEMANTIC REASONING - Exploring New Ways for Publicity and Marketing over Interactive Digital TV
Martín López-Nores, José J. Pazos-Arias, Jorge García-Duque, Yolanda Blanco-Fernández, Marta Rey-López and Esther Casquero-Villacorta

- KNOWLEDGE ENGINEERING FOR AFFECTIVE BI-MODAL HUMAN-COMPUTER INTERACTION
Efthimios Alepis, Maria Virvou and Katerina Kabassi

- PHONETIC-BASED MAPPINGS IN VOICE-DRIVEN SOUND SYNTHESIS
Jordi Janer and Esteban Maestre

- DESIGN OF A PASSWORD-BASED AUTHENTICATION METHOD FOR WIRELESS NETWORKS
Andrea Manganaro, Mingyur Koblensky and Michele Loreti

- AN INTEGRATED APPROACH TO DEVELOP PERVASIVE MOBILE APPLICATIONS
Hiata Anderson de O. Coelho, Ricardo de O. Anido and Alisson Luiz da Cruz

- CHALLENGES OF BUILDING END-TO-END NETWORK TOPOLOGIES FOR MULTI-SERVICE NETWORKS
Anne-Marie Bosneag and David Cleary

- RESOURCE ALLOCATION FOR OFDM SYSTEMS IN THE PRESENCE OF TIME-VARYING CHANNELS
Mort Naraghi-Pour and Xiang Gao