default search action
8th ICITST 2013: London, UK
- 8th International Conference for Internet Technology and Secured Transactions, ICITST 2013, London, United Kingdom, December 9-12, 2013. IEEE 2013, ISBN 978-1-908320-20-9
- Jeffrey J. Wiley:
ICITST-2013: Keynote speaker 1: Principles of information security risk management. 13 - David Stupples:
ICITST-2013: Keynote speaker 2: Security challenge of TOR and the deep web. 14 - Tyson T. Brooks:
ICITST-2013: Keynote speaker 3: Blurred nets: Disruption and the risk to future 'Internet of Things' (IoT) architectures. 15 - Charles A. Shoniregun:
ICITST-2013: Keynote speaker 4: Writing a sustainable research paper. 16 - Yoon Seok Chang:
RISC'13 Workshop: Keynote speaker 5. 17 - Dalia Battikh, Safwan El Assad, Bassem Bakhache, Olivier Déforges, Mohamad Khalil:
Enhancement of two spatial steganography algorithms by using a chaotic system: Comparative analysis. 20-25 - Zeinab Fawaz, Safwan El Assad, M. Frajallah, Ayman Khalil, René Lozi, Olivier Déforges:
Lightweight chaos-based cryptosystem for secure images. 26-30 - Daniel Caragata, Karim Tabia, Mauricio Luduena:
Cryptanalysis of a chaos-based encryption algorithm for distributed systems. 31-36 - Oleg Garasym, Ina Taralova:
High-speed encryption method based on switched chaotic model with changeable parameters. 37-42 - Sarah Abughazalah, Konstantinos Markantonakis, Keith Mayes:
A mutual authentication protocol for low-cost RFID tags formally verified using CasperFDR and AVISPA. 44-51 - Abdullah Ali Alshehri, Steve A. Schneider:
Formally defining NFC M-coupon requirements, with a case study. 52-58 - Young-Ji Byon, Young-Seon Jeong, Said M. Easa, Joonsang Baek:
Feasibility analysis of transportation applications based on APIs of social network services. 59-64 - Mouza Ahmad Bani Shemaili, Chan Yeob Yeun, Mohamed Jamal Zemerly, Khalid Mubarak, Yoon Seok Chang:
Securing E-Seal real time tracking system for Internet of Things. 65-69 - Bas Geerdink:
A reference architecture for big data solutions introducing a model to perform predictive analytics using big data technology. 71-76 - Mustafa Aydin, Jeremy Jacob:
A comparison of major issues for the development of forensics in cloud computing. 77-82 - Nasser Zalmout, Moustafa Ghanem:
Multidimensional community detection in Twitter. 83-88 - Mohammed Naji Al-Kabi, Nawaf A. Abdulla, Mahmoud Al-Ayyoub:
An analytical study of Arabic sentiments: Maktoob case study. 89-94 - Nicholas Dzugan, Lance Fannin, S. Kami Makki:
A recommendation scheme utilizing Collaborative Filtering. 96-100 - Rawan T. Khasawneh, Heider Wahsheh, Mohammed Al-Kabi, Izzat Mahmoud Alsmadi:
Sentiment analysis of arabic social media content: a comparative study. 101-106 - Yuri Nakagawa, Yuuki Matsuda, Tetsuro Ogi:
Framework for handling personal data proposed system of the self-control on buying information. 107-112 - Mohammed Awad, Ernst L. Leiss:
End-to-End cryptographic voting: Potentials and limitations. 113-118 - Luciene Cristina Alves Rinaldi, Briseida Dogo de Resende, Rodrigo Bossini Tavares Moreira, Márcio Lobo Netto:
A system for social network analysis. 120-125 - Miyoung Jang, Ara Jo, Jae-Woo Chang:
A privacy-aware query authentication index for encrypted database in cloud. 126-131 - Xian Chen, Meilian Chen, Hyoseop Shin, Eun Yi Kim:
Mining salient images from a large-scale blogosphere. 132-136 - Muhannad Quwaider, Yaser Jararweh:
Cloudlet-based for big data collection in body area networks. 137-141 - Elhadj Benkhelifa, Thomas Welsh:
A Cloud Enabled Social Media Monitoring Platform for Events Detection and Prediction. 142-148 - Áine MacDermott, Qi Shi, Madjid Merabti, Kashif Kifayat:
Considering an elastic scaling model for cloud Security. 150-155 - Mohammed A. Alhomidi, Martin J. Reed:
Security risk analysis as a service. 156-161 - Alex Akinbi, Ella Pereira, Chris Beaumont:
Evaluating security mechanisms implemented on public Platform-as-a-Service cloud environments case study: Windows Azure. 162-167 - Melanie Willett, Rossouw von Solms:
A framework for assuring the conformance of cloud-based email. 168-173 - Nan Zhao, Loïc Baud, Patrick Bellot:
Characteristics analysis for the cyberlockers files study on Rapidgator Speedyshare and 1Fichier. 176-181 - Adel Boukhadra, Karima Benatchba, Amar Balla:
DA5DCSWS: A Distributed Architecture for semantic Web services Discovery and Composition. 182-187 - Miklós Kálmán:
ProtoML: A rule-based validation language for Google Protocol Buffers. 188-193 - Saadia Kedjar, Abdelkamel Tari:
The hybrid model for web services security access control and information flow control. 194-202 - Bernd Borchert, Max Günther:
Indirect NFC-login. 204-209 - Muhammad Shaheen, Saeed Iqbal, Fazl-e-Basit:
Labeled clustering a unique method to label unsupervised classes. 210-214 - Hyun-Hwa Choi, Byoung-Seob Kim, Shin-Young Ahn, Seung-Jo Bae:
A workflow for parallel and distributed computing of large-scale genomic data. 215-218 - Kamyab Karimi, Carl Hauser:
Internet Unite-and-Conquer architecture. 219-230 - Sara Jeza Alotaibi, Mike Wald:
Evaluation of the UTAUT model for acceptable user experiences in Identity Access Management Systems. 232-237 - Daehee Kim, Sangwook Kang, Sunshin An:
Energy efficient time synchronization for target tracking in heterogeneous sensor networks. 238-243 - Jacques Bou Abdo, Jacques Demerjian, Hakima Chaouchi, Kablan Barbar, Guy Pujolle:
Broker-based Cross-Cloud Federation Manager. 244-251 - Chongxiao Cao, Fengguang Song, Daniel G. Waddington:
Implementing a high-performance recommendation system using Phoenix++. 252-257 - Saeed Iqbal, Muhammad Shaheen, Fazl-e-Basit:
A machine learning based method for optimal journal classification. 259-264 - Shiu Hong Choi, Bo Yang, H. H. Cheung, Y. X. Yang:
Data management of RFID-based track-and-trace anti-counterfeiting in apparel supply chain. 265-269 - Aspen Olmsted, Csilla Farkas:
Web Service constraint optimization. 270-275 - Ahmed Osama Fathy Atya, Jilong Kuang:
RUFC: A flexible framework for reliable UDP with flow control. 276-281 - Haruhiko Fujii, Yukio Tsuruoka:
SV-2FA: Two-factor user authentication with SMS and voiceprint challenge response. 283-287 - Daniel Fischer, Bernd Markscheffel, T. Seyffarth:
Smartphone security: Overview of security software solutions. 288-289 - Mohamed A. Abdelshafy, Peter J. B. King:
Analysis of security attacks on AODV routing. 290-295 - Nalin Asanka Gamagedara Arachchilage, Cornelius Namiluko, Andrew P. Martin:
A taxonomy for securely sharing information among others in a trust domain. 296-304 - Charles A. Clarke, Eckhard Pfluegel, Dimitris Tsaptsinos:
Enhanced Virtual Private Social Networks: Implementing user content confidentiality. 306-312 - Boniface Kayode Alese, Iwasokun Gabriel Babatunde, Haruna Danjuma Israel:
DGM approach to network attacker and defender strategies. 313-320 - Ove Sörensen:
Zombie-cookies: Case studies and mitigation. 321-326 - Aneel Rahim, Paul Malone:
Intrusion detection system for Wireless Nano sensor Networks. 327-330 - Brika Ammar, Fahima Nader:
Pedagogical hypermédias systems. 332-337 - Margarita Velasco, David While, Pathmeswaran Raju:
Adaptation of Web services using policies. 338-343 - Adam Oest, Manjeet Rege:
Feedback-driven clustering for automated linking of web pages. 344-349 - Charl van der Westhuizen, Marijke Coetzee:
Context-aware RESTful services on mobile devices. 350-355 - Aditya Yulianto, Maria Irmina Prasetiyowati:
BoxLock: Mobile-based Serpent cryptographic algorithm and One-Time Password mechanism implementation for Dropbox files security. 357-362 - Huda Elmogazy, Omaima Bamasak:
Towards healthcare data security in cloud computing. 363-368 - Hisham Al-Assam, Rasber Dh. Rashid, Sabah Jassim:
Combining steganography and biometric cryptosystems for secure mutual authentication and key exchange. 369-374 - Matrazali Noorafiza, Hiroshi Maeda, Toshiyuki Kinoshita, Ryuya Uda:
Virtual machine remote detection method using network timestamp in cloud computing. 375-380 - Abdullah A. Alabdulatif, Xiaoqi Ma, Lars Nolle:
Analysing and attacking the 4-way handshake of IEEE 802.11i standard. 382-387 - Luigi Catuogno, Clemente Galdi:
Towards the design of a film-based graphical password scheme. 388-393 - Chiara Peretti, Paolo Gastaldo, Marco Stramezzi, Rodolfo Zunino:
Embedded implementation of Edwards curve- and extended Jacobi quartic curve-based cryptosystems. 394-400 - Supakorn Prungsinchai, Fouad Khelifi, Ahmed Bouridane:
DCT sign-based robust image hashing. 401-405 - Robert Costello, Nigel Shaw:
Assisted Learning Virtual Support (ALVS) for postgraduate students, through the Graduate Virtual Research Environment (GVRE). 407-410 - Thuraya Kenan, Crinela Pislaru, Abdussalam Elzawi, Maysoun Restoum:
Improving the effectiveness of collaborative learning processes in Libyan Higher Education. 411-416 - Leonard James Mselle, Tabu S. Kondo:
Results on implementing personal learning environments in Tanzanian secondary schools. 417-421 - O. A. Akinsowon, Boniface Kayode Alese:
Edge detection methods in palm-print identification. 422-426 - Afnan Ullah Khan, Manuel Oriol, Mariam Kiran:
Threat methodology for securing scalable video in the Cloud. 428-436 - Timo Schless, Harald P. E. Vranken:
Counter botnet activities in the Netherlands a study on organisation and effectiveness. 437-442 - Sahar Maalej Dammak, Anis Jedidi, Rafik Bouaziz:
Automation and evaluation of the semantic annotation of Web resources. 443-448 - Arome Junior Gabriel, Boniface Kayode Alese, Adebayo O. Adetunmbi, Olumide S. Adewale:
Post-Quantum Crystography: A combination of Post-Quantum Cryptography and Steganography. 449-452 - Nadianatra Musa, Bob Clift:
A model of component interaction between Formal, Technical and Informal components within IS/IT security governance. 454-462 - Mario Sicuranza, Angelo Esposito:
An access control model for easy management of patient privacy in EHR systems. 463-470 - Asma Hamed, Hella Kaffel-Ben Ayed, Mohamed Ali Kâafar, Ahmed Kharraz:
Evaluation of third party tracking on the web. 471-477 - Jong-Hoon Lee, Jung-Tae Kim, Ik-Kyun Kim, Ki Jun Han:
Design and implementation of the contents visualization system for social networks. 479-483 - Hossain Shahriar, Sarah North, Wei-Chuen Chen, Edward Mawangi:
Design and development of Anti-XSS proxy. 484-489 - Abdussalam Elzawi, Stephen J. Wade, Thuraya Kenan, Crinela Pislaru:
Exploratory study of the attitudes of academic staff in Libyan Universities towards the role of the Internet. 490-493 - Nwankwo Nonso Prince:
Design and implementation of microcontroller based short message service control system. 494-499 - Clara Bertolissi, Silvio Ranise:
A methodology to build run-time monitors for security-aware workflows. 501-502 - L. J. Ontanon-Garcia, M. Garcia-Martinez, Eric Campos-Cantón, Sergej Celikovský:
Grayscale image encryption using a hyperchaotic unstable dissipative system. 503-507 - Abdullah Algarni, Yue Xu, Taizan Chan, Yu-Chu Tian:
Social engineering in social networking sites: Affect-based model. 508-515 - Tyson Brooks, Michelle L. Kaarst-Brown, Carlos Caicedo, Joon Park, Lee McKnight:
A failure to communicate: Security vulnerabilities in the GridStreamX Edgeware application. 516-523 - Hemlal Sahu, Birendra Kumar Sharma:
A new encryption scheme based on hybrid Problems. 524-527 - Markus Florian, Sarita Paudel, Markus Tauber:
Trustworthy evidence gathering mechanism for multilayer cloud compliance. 529-530 - Omer K. Jasim Mohammad, Safia Abbas, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem:
A comparative study between modern encryption algorithms based on cloud computing environment. 531-535 - Sofia Najwa Ramli, Rabiah Ahmad, Mohd Faizal Abdollah:
Electrocardiogram (ECG) signals as biometrics in securing Wireless Body Area Network. 536-541 - Vivek Shandilya, Sajjan G. Shiva:
Security in the cloud based systems: Structure and breaches. 542-547 - S. Ananda Kanagaraj, G. Arjun, T. Sree Sharmila:
Pseudo Eye: The next-generation shopping application using Augmented Reality. 549-553 - Kiswendsida K. Kabore, Oumarou Sie, Florence Sèdes, André Péninou:
Information Access Assistant Service (IAAS). 554-557 - Shafiq-Ur Rehman, Naveed Ejaz:
Towards an efficient shopping mechanism for M-commerce. 558-562 - Hiroki Nakayama, Ryo Onuma, Hiroaki Kaminaga, Youzou Miyadera, Setsuo Yokoyama, Shoichi Nakamura:
Extraction methods of e-mail discussion processes considering diversity of description granularity and their complicated relationships. 563-568 - Maher Salem, Ulrich Buehler:
Reinforcing network security by converting massive data flow to continuous connections for IDS. 570-575 - Balkis Hamdane, Ahmed Serhrouchni, Sihem Guemara El Fatmi:
Access control enforcement in Named Data Networking. 576-581 - Iman Ranaee, Mahdi Majidi Nia, Reza Jahantigh, Amirhossein Gharib:
Introducing a new algorithm for medical image encryption based on chaotic feature of cellular automata. 582-587 - Fatimah Y. Akeel, Gary B. Wills, Andrew M. Gravell:
SecureDIS: A framework for secure Data Integration Systems. 588-593 - Liangxiu Han, Zheng Xie, Richard A. Baldock:
Automatic data reuse for accelerating data intensive applications in the Cloud. 596-600 - Ibrahim Kabiru Musa, Stuart D. Walker:
Adaptive market place for converged cloud computing model. 601-606 - Mounira Msahli, Rached Abdeljaoued, Ahmed Serhrouchni:
Access control in probative value Cloud. 607-611 - Antti Evesti, Jani Suomalainen, Reijo Savola:
Security risks in the short-range communication of ubiquitous application. 612-617 - Abdolazim Rezaei, Zarinah Mohd Kasirun, Vala Ali Rohani, Touraj Khodadadi:
Anomaly detection in Online Social Networks using structure-based technique. 619-622 - Love Adedayo, Sergey Butakov, Ron Ruhl, Dale Lindskog:
E-Government web services and security of Personally Identifiable Information in developing nations a case of some Nigerian embassies. 623-629 - Akintoba Emmanuel Akinwonmi, Boniface Kayode Alese:
A prosodic Text-to-Speech system for Yorùbá language. 630-635 - Fahad M. Alotaibi, Jordan Dimitrov:
Implementation and evaluation of classroom simulation for trainee teacher using second life environments. 636-643 - Sarita Paudel, Markus Tauber, Ivona Brandic:
Security standards taxonomy for Cloud applications in Critical Infrastructure IT. 645-646 - Bruno Silva, Paulo Romero Martins Maciel, Armin Zimmermann:
Performability models for designing disaster tolerant Infrastructure-as-a-Service cloud computing systems. 647-652 - Muteveri Kandira, Jabu Mtsweni, Keshnee Padayachee:
Cloud security and compliance concerns: Demystifying stakeholders' roles and responsibilities. 653-658 - Dinkar Sitaram, H. L. Phalachandra, Anush Vishwanath, Pramod Ramesh, Meghana Prashanth, Akshay G. Joshi, Anoop R. Desai, Harikrishna Prabhu C. R, Prafulla, Shwetha R, Yashaswini A:
Keystone federated security. 659-664 - Wafa Slaibi Al-Shorafat:
Security in software engineering requirement. 666-673 - Denis Obrul, Borut Zalik:
Real-time adaptive arrival prediction system for public transport. 674-677 - Ryo Onuma, Hiroki Nakayama, Hiroaki Kaminaga, Yasuhiko Morimoto, Youzou Miyadera, Shoichi Nakamura:
Methods for strategic accumulation of context information in research activities. 678-683 - Umar Manzoor, Maria Zubair, Kanwal Batool:
Using multi-agent systems to solve food distribution problem in disaster area. 684-689
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.