default search action
IAS 2010: Atlanta, GA, USA
- Sixth International Conference on Information Assurance and Security, IAS 2010, Atlanta, GA, USA, August 23-25, 2010. IEEE 2010, ISBN 978-1-4244-7407-3
- Victor Gayoso Martínez
, Fernando Hernández Álvarez, Luis Hernández Encinas
, Carmen Sánchez Ávila
:
A comparison of the standardized versions of ECIES. 1-4 - Mrutyunjaya Panda
, Ajith Abraham, Manas Ranjan Patra:
Discriminative multinomial Naïve Bayes for network intrusion detection. 5-10 - Vesa Pehkonen, Juha Koivisto:
Secure Universal Plug and Play network. 11-14 - Sean S. E. Thorpe:
A case analysis of a Contextual Model of Trust for digital identities using UML 2.0 and context graph algorithms. 15-20 - Zahri Yunos, Syahrul Hafidz Suid, Rabiah Ahmad, Zuraini Ismail
:
Safeguarding Malaysia's critical national information infrastructure (CNII) against cyber terrorism: Towards development of a policy framework. 21-27 - Chi-Wu Huang, Chien-Lun Yen, Che-Hao Chiang, Kuo-Huang Chang, Chi-Jeng Chang:
The five modes AES applications in sounds and images. 28-31 - Vincent C. Hu
, David F. Ferraiolo, Serban I. Gavrila:
Specification of attribute relations for access control policies and constraints using Policy Machine. 32-35 - David O. Manz
, Thomas W. Edgar, Glenn Allen Fink
:
A hybrid Authentication and authorization process for control system networks. 36-39 - Wendpanga Francis Ouedraogo, Frédérique Biennier, Nicolas Salatgé:
Security preferences specification and implementation in a service-based workflow. 40-43 - Mohamed El-Hadedy, Martin Margala
, Danilo Gligoroski, Svein J. Knapskog:
Resource-efficient implementation of Blue Midnight Wish-256 hash function on Xilinx FPGA platform. 44-47 - Hanan A. Mahmoud, Hanan Saad Al-Hulaibah, Sarah A. Al-Naeem, Suha Ali Al-Qhatani, Aljoharah Al-Dawood, Buthaina Saleh Al-Nassar, Dhay Yousef Al-Salman:
Novel technique for steganography in fingerprints images: Design and implementation. 48-51 - Hanan A. Mahmoud, Khaled Alghathbar:
Novel algorithmic countermeasures for Differential Power Analysis attacks on smart cards. 52-55 - Jonathan White, Brajendra Panda:
Insider threat discovery using automatic detection of mission critical data based on content. 56-61 - David Oro, Jesus Luna, Toni Felguera, Marc Vilanova, Jetzabel M. Serna:
Benchmarking IP blacklists for financial botnet detection. 62-67 - Sebastian Roschke, Feng Cheng, Christoph Meinel:
Using vulnerability information and attack graphs for intrusion detection. 68-73 - Ying-Wei Kuo, Shou-Hsuan Stephen Huang, Christopher Hill:
Detect multi-hop stepping-stone pairs with clock skew. 74-79 - Frank Yeong-Sung Lin, Yu-Shun Wang, Po-Hao Tsang:
Efficient defense strategies to minimize attackers' success probabilities in honeynet. 80-85 - Jan Platos
, Pavel Krömer
, Václav Snásel, Ajith Abraham:
Scaling IDS construction based on Non-negative Matrix factorization using GPU computing. 86-91 - Michael Müter, André Groll, Felix C. Freiling:
A structured approach to anomaly detection for in-vehicle networks. 92-98 - Wael Kanoun, Nora Cuppens-Boulahia, Frédéric Cuppens, Samuel Dubus, Antony Martin:
Intelligent response system to mitigate the success likelihood of ongoing attacks. 99-105 - Tomás Novosád, Jan Platos
, Václav Snásel, Ajith Abraham:
Fast intrusion detection system based on Flexible Neural Tree. 106-111 - Pavel Krömer
, Jan Platos
, Václav Snásel, Ajith Abraham:
Towards intrusion detection by information retrieval and genetic programming. 112-117 - Ashley Thomas:
RAPID: Reputation based approach for improving intrusion detection effectiveness. 118-124 - Eugen Leontie, Olga Gelbart, Bhagirath Narahari, Rahul Simha:
Detecting memory spoofing in secure embedded systems using cache-aware FPGA guards. 125-130 - Kalyani Divi, Mohammed Raza Kanjee, Hong Liu:
Secure architecture for healthcare Wireless Sensor Networks. 131-136 - Ziyi Su, Frédérique Biennier:
End-to-end security policy description and management for collaborative system. 137-142 - Suleyman Kondakci
:
A causal model for information security risk assessment. 143-148 - Caroline Moeckel, Ali E. Abdallah:
Threat modeling approaches and tools for securing architectural designs of an e-banking application. 149-154 - Yang Liu, Yue Wu, Junhua Tang:
Two tier detection model for misbehavior of low-power nodes in virtual MIMO based wireless networks. 155-160 - Lin You, Fugeng Zeng:
The number of the isomorphism classes of hyperelliptic curves of genus four over finite fields. 161-166 - Alessandro Barenghi
, Guido Marco Bertoni
, Luca Breveglieri, Mauro Pellicioli, Gerardo Pelosi
:
Fault attack on AES with single-bit induced faults. 167-172 - Hesiri Weerasinghe, Huirong Fu, Supeng Leng:
Anonymous service access for Vehicular Ad hoc Networks. 173-178 - Tibebe Tesema, Dawn Medlin, Ajith Abraham:
Patient's perception of health information security: The case of selected public and private hospitals in Addis Ababa. 179-184 - Ganthan Narayana Samy
, Rabiah Ahmad, Zuraini Ismail
:
A framework for integrated risk management process using survival analysis approach in information security. 185-190 - Reine Lundin, Stefan Lindskog:
Extending the definition of guesswork. 191-196 - Hanieh Azkia, Nora Cuppens-Boulahia, Frédéric Cuppens, Gouenou Coatrieux:
Reconciling IHE-ATNA profile with a posteriori contextual access and usage control policy in healthcare environment. 197-203 - Riaz Ahmed Shaikh
, Kamel Adi, Luigi Logrippo, Serge Mankovski:
Inconsistency detection method for access control policies. 204-209 - Kazuhiro Kono, Yoshimichi Ito, Noboru Babaguchi:
Anonymous communication system using probabilistic choice of actions and multiple loopbacks. 210-215 - Maya I. Chehab, Ali E. Abdallah:
Assurance in identity management systems. 216-221 - Ali Nasrat Haidar, Stefan J. Zasada, Peter V. Coveney, Ali E. Abdallah, Bruce Beckles:
Audited credential delegation - a user-centric identity management solution for computational grid environments. 222-227 - Alessio Merlo, Alessandro Armando
:
Cooperative access control for the Grid. 228-233 - Roberto Morales, Jetzabel M. Serna, Manel Medina, Jesus Luna:
CARMA: Composable-Adaptive Resource Management Authorization for ubiquitous environments. 234-239 - Flora Amato
, Valentina Casola
, Antonino Mazzeo
, Sara Romano:
A semantic based methodology to classify and protect sensitive data in medical records. 240-246 - Antonio Celesti
, Massimo Villari
, Antonio Puliafito
:
A naming system applied to a RESERVOIR cloud. 247-252 - Valentina Casola
, Massimiliano Rak
, Umberto Villano:
Identity federation in cloud computing. 253-259 - Alessandra De Benedictis
, Andrea Gaglione
, Nicola Mazzocca
:
Securing a tiered re-taskable sensing system. 260-264 - Claudio Mazzariello
, Roberto Bifulco
, Roberto Canonico
:
Integrating a network IDS into an open source Cloud Computing environment. 265-270 - Mohammed Raza Kanjee, Kalyani Divi, Hong Liu:
A two-tiered authentication and encryption scheme in secure healthcare sensor networks. 271-276 - Danilo Valeros Bernardo:
UDT -Authentication Option field: An approach. 277-281 - Jezabel Molina-Gil
, Pino Caballero-Gil
, Candelaria Hernández-Goya
, Cándido Caballero-Gil
:
Data aggregation for information authentication in VANETs. 282-287 - Johnson P. Thomas, Vinay Abburi, Mathews Thomas, Ajith Abraham:
Secure protocol for ad hoc transportation system. 288-293 - He Liu, Man-Gui Liang, Gao-Liang Qi, Xiaowei Chen:
A hierarchical access authentication in network. 294-297 - Li Yao, Ning Zhang:
Quantifying authentication Levels of Assurance in grid environments. 298-303 - Chris G. Hocking, Steven M. Furnell
, Nathan L. Clarke
, Paul L. Reynolds:
A distributed and cooperative user authentication framework. 304-310 - Mrinal Kanti Bhowmik, Debotosh Bhattacharjee
, Mita Nasipuri, Dipak Kumar Basu, Mahantapas Kundu:
Optimum fusion of visual and thermal face images for recognition. 311-316 - Guiguang Ding, Na Xu:
Automatic semantic annotation of images based on Web data. 317-322 - Zuwena Musoromy, Faycal Bensaali
, Soodamani Ramalingam
, Georgios Pissanidis:
Comparison of real-time DSP-based edge detection techniques for license plate detection. 323-328 - Jeffrey Mounzer, Tansu Alpcan
, Nicholas Bambos:
Integrated security risk management for IT-intensive organizations. 329-334 - Václav Snásel, Zdenek Horak, Ajith Abraham:
Link suggestions in terrorists networks using Semi Discrete Decomposition. 335-337 - Zdenek Horak, Václav Snásel, Ajith Abraham, Aboul Ella Hassanien
:
Fuzzified Aho-Corasick search automata. 338-342 - Václav Snásel, Ajith Abraham, Khalid Saeed, Hameed Al-Qaheri:
A framework for cyber surveillance of unlawful activities for critical infrastructure using computational grids. 343-348
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.