default search action
5th ICITST 2010: London, UK
- 5th International Conference for Internet Technology and Secured Transactions, ICITST 2010, London, United Kingdom, November 8-10, 2010. IEEE 2010, ISBN 978-1-4244-8862-9
- Abdelhaq Belkadi, Abdelaziz El Fazziki, Ait Ouahman Abdallah, Ibourk Aomar:
Toward an agent based approach for decisional systems modeling. 1-8 - Saman Hina, Eric Atwell, Owen A. Johnson:
Secure information extraction from clinical documents using SNOMED CT gazetteer and natural language processing. 1-5 - Huseyin Kusetogullari, Amir Yavariabdi, Mark S. Leeson, Evor L. Hines:
Genetic algorithm based rainbow network flow optimization for multiple description coding in lossy network. 1-6 - Iftikhar Ahmad, Azween Vitra Abdullah, Abdullah Sharaf Alghamdi:
Remote to Local attack detection using supervised neural network. 1-6 - Kamal A. ElDahshan, Hany M. S. Lala:
Mining uncertain data warehouse. 1-7 - Shiva Nadi, Mohamadhosein Hussein Saraee, Mohamad Davarpanah Jazi:
A fuzzy recommender system for dynamic prediction of user's behavior. 1-5 - Mohammad Ahmadi Livani, Mahdi Abadi:
Distributed PCA-based anomaly detection in wireless sensor networks. 1-8 - Prakash S. Raghavendra, Shreya Roy Chowdhury, Srilekha Vedula Kameswari:
Comparative study of neural networks and k-means classification in web usage mining. 1-7 - Zeeshan Shafi Khan, Nabila Akram, Khaled Alghathbar, Muhammad Sher, Rashid Mehmood:
Secure single packet IP Traceback mechanism to identify the source. 1-5 - Pieter Burghouwt, Marcel E. M. Spruit, Henk J. Sips:
Detection of botnet collusion by degree distribution of domains. 1-8 - Maximilian Ronniger, Florian Fankhauser, Christian Schanes, Thomas Grechenig:
A robust and flexible test environment for VoIP security tests. 1-6 - Dae-il Jang, Kang-yu Cho, Minsoo Kim, Hyun-Chul Jung, Bong-Nan Noh:
Evasion technique and detection of malicious botnet. 1-5 - Robert E. Johnson III:
Survey of SCADA security challenges and potential attack vectors. 1-5 - Fuchun Zhao, Hong Ling, Zhengchuan Xu:
Inter-organizational trust and supply chain Flexibility: From a relational view of the firm. 1-5 - Andreas Leicher, Andreas U. Schmidt, Yogendra Shah, Inhyok Cha:
Trusted Computing enhanced OpenID. 1-8 - Pradheepkumar Singaravelu, Shekhar Verma:
Viability of multivariate cryptosystems for WSN. 1-6 - Vivek Pathak:
Combating web plagiarism and improving internet safety by authenticating web content. 1-6 - Busra Ozdenizci, Vedat Coskun, Mehmet N. Aydin, Kerem Ok:
NFC loyal: A beneficial model to promote loyalty on smart cards of mobile devices. 1-6 - Daniel Caragata, Anca-Livia Radu, Safwan El Assad, Cristian-Gabriel Apostol:
Chaos based fragile watermarking algorithm for JPEG images. 1-7 - Hisham Al-Assam, Harin Sellahewa, Sabah Jassim:
On security of multi-factor biometric authentication. 1-6 - Jie Wang, Raphael Chung-Wei Phan, John N. Whitley, David J. Parish:
Quality of detectability (QoD) and QoD-aware AAT-based attack detection. 1-6 - Busra Ozdenizci, Mehmet N. Aydin, Vedat Coskun, Kerem Ok:
Design science in NFC research. 1-6 - Manar Iskandar, Noor Akma Mohd Salleh:
IT governance in e-commerce environment: Cases from airline industry. 1-6 - Franka Moritz, Maria Siebert, Christoph Meinel:
Improving community rating in the tele-lecturing context. 1-6 - Pilar Castro Garrido, Guillermo Matas Miraz, Irene Luque Ruiz, Miguel Ángel Gómez-Nieto:
Near Field Communication in the development of ubiquitous games. 1-7 - Ravi Bhushan Mishra, Bireshwar Dass Mazumdar:
Cognitive parameters based seller agent selection in B2C E-Commerce. 1-3 - Yeojeong Yoon, Chanil Park, Pyung Kim, Seongoun Hwang, Hyunsoo Yoon:
An efficient identity-based proxy signcryption for secure broadcast. 1-6 - Abdullah Mohammed Alaraj:
Ownership transfer protocol. 1-6 - Young Sam Kim, Seung-Hyun Hyun Kim, Seung-Hun Hun Jin:
SRS-based automatic secure device pairing on audio channels. 1-6 - Safdar Ali, Waseem Shahzad, Farrukh Aslam Khan:
Remote-to-Local attacks detection using incremental genetic algorithm. 1-6 - Najeeb Elahi, Randi Karlsen, Waqas Younas:
Semantic image annotation with social context. 1-7 - Gregory Epiphaniou, Carsten Maple, Paul Sant, Peter Norrington:
The effects of encryption on VoIP streams under the code-excited linear prediction coder G.729. 1-6 - Ion Bica, Mihai Togan, Stefan-Vladimir Ghita:
Gossip membership protocol for peer-to-peer streaming overlay construction. 1-5 - Areej Al-Wabil, Ebtisam Alabdulqader, Latifa Al-Abdulkarim, Nora Al-Twairesh:
Measuring the user experience of digital books with children: An eyetracking study of interaction with digital libraries. 1-7 - Annette Tolnai, Sebastiaan H. von Solms:
A Virtualized Environment Security (VES) model for a secure virtualized environment. 1-6 - Tristan Lavarack, Marijke Coetzee:
A Web Services security policy assistant. 1-6 - Giuliano Benelli, Alessandro Pozzebon:
An automated payment system for car parks based on Near Field Communication technology. 1-6 - Guenther Starnberger, Lorenz Froihofer, Karl M. Göschka:
Distributed timestamping with smart cards using efficient overlay routing. 1-6 - Laurentiu Ionescu, Constantin Anton, Ion Tutanescu, Alin Mazare, Gheorghe Serban:
On a FPGA implementation of BCH codes. 1-5 - Parminder Singh, G. S. Lehal:
Statistical syllables selection approach for the preparation of Punjabi speech database. 1-4 - Taiwo Ayodele:
Unsupervised email vector space model (UEVSM). 1-5 - V. Siva RamaKrishna Reddy, Durvasula V. L. N. Somayajulu, Ajay R. Dani:
Sentiment Classification of text reviews using novel feature selection with reduced over-fitting. 1-2 - Mark E. Culverhouse, Bogdan V. Ghita, Paul L. Reynolds, Xingang Wang:
Optimising Quality of Service through the controlled aggregation of traffic. 1-7 - Mohannmad Waqar, Zeeshan Shafi Khan:
Web 2.0 content extraction. 1-3 - Usha Jayahkudy, Chong Eng Tan:
Link signal strength based path selection scheme for ad hoc networks. 1-6 - Aini Aman, Hasmiah Kasimin:
E-government evaluation: The case of e-procurement in Malaysia government. 1-6 - Maria Siebert, Franka Moritz, Frank Hambach, Christoph Meinel:
Enriching E-Learning meta data with user generated playlists. 1-6 - David J. Lutz, Dominik Lamp, Patrick Mandic, Fabio Victora Hecht, Burkhard Stiller:
Charging of SAML-based federated VoIP services. 1-8 - Saeed Ezzati, Hamid Reaza Naji, Amir Chegini, Payam Habibimehr:
A new method of hardware firewall implementation on SOC. 1-7 - Mohssen M. Z. E. Mohammed, H. Anthony Chan, Neco Ventura, Mohsin Hashim, Eihab Bashier:
Fast and accurate detection for polymorphic worms. 1-6 - Elena Castro Galán, Almudena Alcaide, Agustín Orfila, Jorge Blasco Alís:
A multi-agent scanner to detect stored-XSS vulnerabilities. 1-6 - Conor Mc Manamon, Fredrick Mtenzi:
Defending privacy: The development and deployment of a darknet. 1-6 - P. Vcelck, Jana Klecková, Vladimir Rohan:
Cerebrovascular diseases research based on heterogeneous medical data mining and knowledge base. 1-6 - Bachar Alrouh, Adel Almohammad, Gheorghita Ghinea:
SOAP message-based steganography. 1-6 - Khawla Alghafli, Chan Yeob Yeun:
New authentication protocol for IP CAS of IPTV. 1-6 - Mohammed Alzomai, Bander AlFayyadh, Audun Jøsang:
Display security for online transactions: SMS-based authentication scheme. 1-7 - Sabah S. Al-Fedaghi:
Diagrammatical framework for information system attacks. 1-7 - Boustia Narhimene, Aïcha Mokhtari:
A contextual multilevel access control model with default and exception description logic. 1-6 - Hamid Hatim, Hanane El Bakkali, Ilham Berrada:
Workflow access control: From role engineering to task engineering. 1-7 - Masoud Rezaei, Nafise Sadat Moosavi, Hamed Nemati, Reza Azmi:
TCvisor: A hypervisor level secure storage. 1-9 - Muhammad Asif Habib:
Mutual exclusion and role inheritance affecting least privilege in RBAC. 1-6 - Fazl-e Hadi, Fahad Bin Muhaya, Atif R. Naseer:
Secure multimedia communication in wireless mesh networks. 1-4 - Vasaki Ponnusamy, Azween Vitra Abdullah:
A bio-inspired framework for wireless sensor network using mobile sensors. 1-6 - Hanunah Othman, Habibah Hashim, Jamalul-lail Ab Manan:
A conceptual framework providing Direct Anonymous Attestation (DAA) protocol in trusted location-based services (LBS). 1-7 - Paul T. Edelman, Michael J. Donahoo, David B. Sturgill:
Secure group communications for Delay-Tolerant Networks. 1-8 - Emmanuel Hooper:
Strategic and intelligent smart grid systems engineering. 1-6 - Onyeka Emebo, Olawande J. Daramola, Charles Ayo:
A Grid-based e-learning model for Open Universities. 1-4 - Peter Chovanec, Michal Krátký, Jirí Walder:
Lossless R-tree compression using variable-length codes. 1-8 - Filip Krizka, Michal Krátký:
On the efficient indexing of ordered multidimensional tuples. 1-8 - Katie Wood, Ella Pereira:
An investigation into cloud configuration and security. 1-6 - Denis J. Reilly, Chris Wren, Tom Berry:
Cloud computing: Forensic challenges for law enforcement. 1-7 - Pedro Peris-Lopez, Enrique San Millán, Jan C. A. van der Lubbe, Luis Entrena:
Cryptographically secure pseudo-random bit generator for RFID tags. 1-6 - Martin Feldhofer, Manfred Josef Aigner, Thomas Baier, Michael Hutter, Thomas Plos, Erich Wenger:
Semi-passive RFID development platform for implementing and attacking security tags. 1-6 - Sandra Dominikus, Manfred Josef Aigner, Stefan Kraxberger:
Passive RFID technology for the internet of things. 1-8 - Kyusuk Han, Hyeran Mun, Taeshik Shon:
Design of secure key agreement protocol for pairing in RF4CE. 1-5 - Mete Akgün, Ali Özhan Gürel, Mehmet Ufuk Çaglayan:
Attacks to a lightweight RFID mutual authentication protocol. 1-5 - Dang Nguyen Duc, Kwangjo Kim, Chan Yeob Yeun:
Reconsidering Ryu-Takagi RFID authentication protocol. 1-6 - Hyeran Mun, Chan Yeob Yeun, Kyusuk Han, Byung-Ho Chung:
Enhancement of anonymous authentication scheme in wireless sensor network. 1-4 - Fadi A. Aloul:
Information security awareness in UAE: A survey paper. 1-6 - Said Jafari, Fredrick Mtenzi, Ciaran O'Driscoll, Ronan Fitzpatrick, Brendan O'Shea:
Privacy metrics in ubiquitous computing applications. 1-2 - Dennis M. Lupiana, Fredrick Mtenzi, Ciaran O'Driscoll, Brendan O'Shea:
Strictly alphanumeric data: Improving privacy in smart environments. 1-3 - Zanifa Omary, Fredrick Mtenzi, Bing Wu, Ciaran O'Driscoll:
Accessing sensitive patient information in ubiquitous healthcare systems. 1-3 - Ciaran O'Driscoll, Paul Doyle:
The cost of security for a completely private ubiquitous environment. 1-2
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.