default search action
7th ICITST 2012: London, UK
- Nick Savage, Safwan El Assad, Charles A. Shoniregun:
7th International Conference for Internet Technology and Secured Transactions, ICITST 2012, London, United Kingdom, December 10-12, 2012. IEEE 2012, ISBN 978-1-4673-5325-0 - Léa D. Cot, René Lozi:
Assessing the security of subsampling process using modified EKF and nonlinear least squares methods. 27-31 - Peter Backs, Steffen Wendzel, Jörg Keller:
Dynamic routing in covert channel overlays based on control protocols. 32-39 - Maryline Chetto, Hassan Noura, Safwan El Assad, Mousa Farajallah:
How to guarantee secured transactions with QoS and real-time constraints. 40-44 - Relu Laurentiu Tataru, Safwan El Assad, Olivier Déforges:
Improved blind DCT watermarking by using chaotic sequences. 46-50 - Lorenzo Antonio Delgado-Guillen, Jose Juan Garcia-Hernandez, César Torres-Huitzil:
Validating the existence of watermarks on digital images using a mobile phone. 51-55 - Ina Taralova, René Lozi, Safwan El Assad:
Chaotic generator synthesis: Dynamical and statistical analysis. 56-59 - Ana Cristina Dascalescu, Radu Eugen Boriga:
A new method to improve cryptographic properties of chaotic discrete dynamical systems. 60-65 - Safwan El Assad:
Chaos Based Information Hiding and Security. 67-72 - Mohamed Hamdy Eldefrawy, Muhammad Khurram Khan:
Detecting counterfeit-money using RFID-enabled mobile devices. 74-79 - Eyad Taqieddin, Jagannathan Sarangapani:
Vulnerability analysis of two ultra-lightweight RFID authentication protocols: RAPP and gossamer. 80-86 - Mouza Ahmad Bani Shemaili, Chan Yeob Yeun, Khalid Mubarak, Mohamed Jamal Zemerly:
A new lightweight hybrid cryptographic algorithm for the internet of things. 87-92 - Leonard James Mselle, Tabu S. Kondo:
Deploying Computer-Based Learning under suboptimal conditions. 94-98 - Jameson Mbale, Kauna Mufeti, Victor Hamutenya:
Examining ubiquitous security-capital issues in implementing a Campus-System-as-a-Service(CSaaS) model in the cloud computing age: Case study sub-Saharan region. 99-104 - Lena Yuryna Connolly, Michael Lang:
Investigation of cultural aspects within information systems security research. 105-111 - Elke Franz, Thomas Springer, Norbert Harder:
Enhancing privacy in social applications with the notion of group context. 112-118 - Sukyoung Kim, Kihong Ahn:
User-intent custom adaptive search service based on ontology and similar-word retrieval algorithm composition. 121-126 - Carlos R. Jaimez-González, Wulfrano Arturo Luna-Ramírez, Simon M. Lucas:
A web tool for monitoring HTTP asynchronous method invocations. 127-132 - Tom Yuan Gao, David Kearney:
A shared secret security broker implementation in a commercial context. 133-138 - Junfeng Xu, Bo Sun, Chengxiang Si:
The survey of cache management in the shared storage environment. 139-142 - Alba Amato, Beniamino Di Martino, Salvatore Venticinque:
Evaluation and brokering of service level agreements for negotiation of cloud infrastructures. 144-149 - Bernd Zwattendorfer, Arne Tauber:
Secure cross-cloud single sign-on (SSO) using eIDs. 150-155 - Tom Kirkham, Karim Djemame, Mariam Kiran, Ming Jiang, Django Armstrong, George Kousiouris, George Vafiadis, Athanasia Evangelinou:
Risk based SLA management in clouds: A legal perspective. 156-160 - Dalia Sobhy, Yasser El-Sonbaty, Mohamad Abou El-Nasr:
MedCloud: Healthcare cloud computing system. 161-166 - Ruhma Tahir, Huosheng Hu, Dongbing Gu, Klaus D. McDonald-Maier, Gareth Howells:
A scheme for the generation of strong cryptographic key pairs based on ICMetrics. 168-174 - Sajjad Ahmed Ghauri, Hasan Humayun, Muhammad Ehsan ul Haq, Farhan Sohail:
Implementation of Convolutional codes on FPGA. 175-178 - Abdul Qayum, Prakash Kumar:
QR decomposition-based cryptography: Via image generation (QR-CRYPT). 179-184 - Peter Teufl, Thomas Zefferer, Sandra Kreuzhuber, Christian M. Lesjak:
Trusted Location Based Services. 185-192 - Sheheryar Malik, Fabrice Huet, Denis Caromel:
Reliability aware scheduling in cloud computing. 194-200 - Aliaksandr Lazouski, Gaetano Mancini, Fabio Martinelli, Paolo Mori:
Usage control in cloud systems. 202-207 - Kiran Karnad, Saravanan Nagenthram:
Cloud security: Can the cloud be secured? 208-210 - Suaad S. Alarifi, Stephen D. Wolthusen:
Detecting anomalies in IaaS environments through virtual machine host system call analysis. 211-218 - Abrar Ullah, Hannan Xiao, Mariana Lilley, Trevor Barker:
Usability of profile based student authentication and traffic light system in online examinations. 220-225 - Dawn Carmichael, David Cleave:
How effective is social media advertising? A study of Facebook Social Advertisements. 226-229 - Geovanny Poveda, Adam Westerski, Carlos Angel Iglesias:
Application of semantic search in Idea Management Systems. 230-236 - Aline Izida, Thiago da Rocha Tedrus, Maria das Graças Bruno Marietto, Margarethe Steinberger-Elias, Wagner Tanaka Botelho, Robson dos Santos França:
Emergency care in situations of natural disaster: A Multi-Agent approach. 237-242 - JeongMok Ha, Hong Jeong:
Modelsim simulation for real-time stereo matching using DP algorithm. 244-248 - Ariel Stulman, Jonathan Lahav, Avraham Shmueli:
MANET secure key exchange using spraying diffie-hellman algorithm. 249-252 - Abdelrahman AlMahmoud, Maurizio Colombo, Chan Yeob Yeun, Hassan Al-Muhairi:
Smart authentication for real-time business process monitoring. 253-258 - Mike Just, David Aspinall:
On the security and usability of dual credential authentication in UK online banking. 259-264 - Khawla Abdulla Alghafli, Andrew Jones, Thomas Anthony Martin:
Forensics data acquisition methods for mobile phones. 265-269 - Settachai Chaisanit, Napatwadee Sangboonnum Hongthong, Surachai Suksakulchai, Chuchart Pinpat:
Traditional musical Virtual Reality on M-learning. 271-274 - Aspen Olmsted, Csilla Farkas:
High volume web service resource consumption. 275-280 - Markus Jung, Thomas Hofer, Susen Döbelt, Georg Kienesberger, Florian Judex, Wolfgang Kastner:
Access control for a Smart Grid SOA. 281-287 - Umar Manzoor, Naveed Ejaz, Nadeem Akhtar, Muhammad Umar, M. Shoaib Khan, Hafsa Umar:
Ontology based image retrieval. 288-293 - Kotaro Yoshida, Yodai Watanabe:
Security of audio secret sharing scheme encrypting audio secrets. 294-295 - Pasquale Stirparo, Ioannis Kounelis:
The mobileak project: Forensics methodology for mobile application privacy assessment. 297-303 - Y. Y. Chen, Shakirah Mohd Taib, Che Sarah Che Nordin:
Determinants of student performance in advanced programming course. 304-307 - Ghada Moussa Bahig, Amr El-Kadi:
Ensuring software safety in safety critical domains. 308-312 - Omniyah Gul, Mahmoud Al-Qutayri, Quang Hieu Vu, Chan Yeob Yeun:
Data integration of electronic health records using artificial neural networks. 313-317 - Seyed Ali Mirheidari, Sajjad Arshad, Saeidreza Khoshkdahan, Rasool Jalili:
Two novel server-side attacks against log file in Shared Web Hosting servers. 318-323 - Galoh Rashidah Haron, Dharmadharshni Maniam, Vijayakumari Sadasivam, Wong Hon Loon:
Re-engineering of web reverse proxy with shibboleth authentication. 325-330 - Mikhail Y. R. Gadelha, Cicero Ferreira Fernandes Costa Filho, Marly Guimarães Fernandes Costa:
Proposal of a cryptography method using gray scale digital images. 331-335 - Norah Farooqi, Siobhán North:
Evaluation of practical trust based access control for XML databases. 336-340 - Greg Miiller:
Issues in inter-organisational encryption systems: The problem with FedLink. 341-346 - Andres Ojamaa, Karl Düüna:
Assessing the security of Node.js platform. 348-355 - Ana A. Andrade, Vitor V. Lopes, Augusto Q. Novais:
Quantifying the impact on distrust of e-commerce trust factors: A non-parametric study. 356-361 - Hatem Fawzi Halaoui:
Uncertainty with STOS: Intelligent solution for uncertain navigation problems. 362-367 - Daphne Rixon, Mary Furey:
Learning from oversight by telecommunications regulatory agencies. 368-374 - Eghbal Ghazizadeh, Mazdak Zamani, Jamalul-lail Ab Manan, Reza Khaleghparast, Ali Taherian:
A trust based model for federated identity architecture to mitigate identity theft. 376-381 - Sanchika Gupta, Anjali Sardana, Padam Kumar:
A light weight centralized file monitoring approach for securing files in Cloud environment. 382-387 - Abdullah Abuhussein, Harkeerat Singh Bedi, Sajjan G. Shiva:
Evaluating security and privacy in cloud computing services: A Stakeholder's perspective. 388-395 - Tran Thao Phuong, Kazumasa Omote, Nguyen Gia Luyen, Nguyen Dinh Thuc:
Improvement of multi-user searchable encrypted data scheme. 396-401 - A. H. Azni, Rabiah Ahmad, Zul Azri Muhamad Noh:
Correlated node behavior in wireless ad hoc networks: An epidemic model. 403-410 - Mohammed Alhussein, Avinash Srinivasan, Duminda Wijesekera:
Forensics filesystem with cluster-level identifiers for efficient data recovery. 411-415 - Ewa Idzikowska:
A round level approach to fault detection in PP-2 symmetric block cipher. 416-419 - V. Anil Kumar, Debabrata Das:
Feedback manipulation flooding attack: Feasibility evaluation and impact quantification on Stream Control Transmission Protocol. 420-425 - Jeffrey Medsger, Avinash Srinivasan:
ERASE- entropy-based sanitization of sensitive data for privacy preservation. 427-432 - Xin Huang, Shangyuan Guo, Bangdao Chen, A. W. Roscoe:
Bootstrapping body sensor networks using human controlled LED-camera channels. 433-438 - Omer Nawaz, Christian Gehrmann, Markus Fiedler:
Secure mobile social networks using USIM in a closed environment. 439-446 - Hsi-Chung Lin:
Content Extraction Signatures Revisited. 447-451 - Sara Jeza Alotaibi, Mike Wald:
Towards a UTAUT-based model for studying the integrating physical and virtual Identity Access Management Systems in e-government domain. 453-458 - Jerry Walsh, Donogh Roche, Franclin S. Foping:
NitroScript: A PHP template engine for customizing of e-commerce applications. 459-464 - Yan Hu, Fangjie Lu, Israr Khan, Guohua Bai:
A cloud computing solution for sharing healthcare information. 465-470 - Yang Guo, Guohua Bai, Yan Hu:
Using Bayes Network for Prediction of Type-2 diabetes. 471-472 - Daniel Fischer, Bernd Markscheffel, Sebastian Frosch, Daniela Büttner:
A survey of threats and security measures for data transmission over GSM/UMTS networks. 477-482 - Yury Chemerkin:
Vulnerability elimination by force of new mobile OS Comparative research of security techniques on BlackBerry OS (incl. PlayBook). 483-487 - Jason Flood, Mark Denihan, Anthony Keane, Fredrick Mtenzi:
Black hat training of white hat resources: The future of security is gaming. 488-491 - Rami Mustafa A. Mohammad, Fadi A. Thabtah, Lee McCluskey:
An assessment of features related to phishing websites using an automated technique. 492-497 - Sidney de Castro, Maria das Graças Bruno Marietto, Robson dos Santos França, Wagner Tanaka Botelho:
A Multi-Agent System for information management and augmented reality in asymmetric wars. 499-504 - Tafta Zani, Ari Moesriami Barmawi, Maman Abdurohman:
Securing Elliptic Curve based El-Gamal against Pollard Rho attack using Elliptic Curve based Diffie-Hellman Key Exchange. 505-512 - Uthairatt Phangphol, Settachai Chaisanit, Tau-tong Puangsuwan, Veena Khongpit, Parichat Kunpluem:
Community OTOP Web Portal for Eastern Region of Thailand. 513-514 - Afif Mghawish, Akram A. AbdelQader, Mahmoud A. Al-Jezawi, Mohammad AbuMahfouz:
Multi function control system using GSM modem based SM5100B Module. 515-518 - Veena Khongpit, Uthairatt Phangphol, M. L. Kulthon Kasemsan, Chonawat Srisa-an:
2D Gun's type classification using edge detection algorithm and SUSAN low level image processing. 521-523 - Damian Gordon:
Hackers and Hollywood 2: Considering televisual Cyberthreats in Security Risk Analysis. 524-527 - Ruchi Jain, Nasser S. Abouzakhar:
Hidden Markov Model based anomaly intrusion detection. 528-533 - Brad Miller, Kaitlyn Buck, J. D. Tygar:
Systematic analysis and evaluation of web privacy policies and implementations. 534-540 - Laurentiu Ionescu, Constantin Anton, Ion Tutanescu, Alin Mazare, Gheorghe Serban:
Error correction and detection system based on Hopfield networks. 541-544 - Laddawan Meeanan, Apichai Trangansri, Pornpipat Hongthai, Settachai Chaisanit, Ratchadawan Nimnual:
The edutainment of virtual music instrument for Thai xylophone (Ranad-ek). 546-547 - José Luis González, Victor Sosa-Sosa, Borja Bergua, Luis Miguel Sánchez, Jesús Carretero:
Fault-tolerant middleware based on multistream pipeline for private storage services. 548-555 - N. Abdul Hamid, M. F. Al A'zhim, M. L. Yap:
e-Ticketing system for football events in Malaysia. 556-561 - Aleksandar Milenkoski, Samuel Kounev:
Towards benchmarking intrusion detection systems for virtualized cloud environments. 562-563 - Rozita Mohd Yusof, Norrozila Sulaiman:
Multi-probes fusion framework for matching simultaneous latent impressions. 564-567 - Maja Vidovic, Josip Kolic:
Are contemporary trade unions utilizing the opportunities for revival presented by internet technology? A comparison of Croatian, UK and USA practice. 569-574 - Limin Fan:
Security management mechanism for composite applications based on hash chains. 575-577 - Ahmad Mousa Odat:
E-Government in developing countries: Framework of challenges and opportunities. 578-582 - Zawlikhah Al Somali, Gheorghita Ghinea:
Investigation of factors affecting growth of e-banking services in Saudi Arabia. 583-588 - Antonis Michalas, Menelaos Bakopoulos:
SecGOD Google Docs: Now i feel safer! 589-595 - Xin Huang, Rong Fu, Bangdao Chen, Tingting Zhang, A. W. Roscoe:
User interactive Internet of things privacy preserved access control. 597-602 - Mohamed Sameh Hassanein, Gheorghita Ghinea:
Text fingerprint key generation. 603-609 - Ji Ma:
Analysis of access control protocols using labelled tableaux. 610-615 - Somsak Choto, Nol Premasathian:
A dynamic fuzzy commitment scheme using ARRSES forecasting. 616-619 - Martin A. Negron:
A Bayesian Belief Network analysis of the Internet governance conflict. 621-627 - Maria das Graças Bruno Marietto, Robson dos Santos França, Margarethe Steinberger-Elias, Wagner Tanaka Botelho, Emerson Aguiar Noronha, Vera Lúcia da Silva:
Comparing distinct approaches for panic behavior computer simulations: A theoretical analysis. 628-633 - Chiranjib Sur, Sanjeev Sharma, Anupam Shukla:
Analysis & modeling multi-breeded Mean-Minded ant colony optimization of agent based Road Vehicle Routing Management. 634-641 - Maria das Graças Bruno Marietto, Margarethe Born Steinberger-Elias, Marllon Felipe Muniz De Farias Alves, Rita Vucinic Teles:
The process of building knowledge and communication of social systems emulated by multiagent systems capable of cause and emerging learning. 642-647 - Daniel Slamanig, Christian Hanser:
On cloud storage and the cloud of clouds approach. 649-655 - Karim Benzidane, Saad Khoudali, Abderrahim Sekkaki:
Autonomous agent-based inspection for inter-VM traffic in a Cloud environment. 656-661 - Yongki Kim, Jungmin Lim, Seokjoo Doo, Hyunsoo Yoon:
The design of adaptive intrusion tolerant system(ITS) based on historical data. 662-667 - Joonsang Baek, Quang Hieu Vu, Andrew Jones, Sameera Al-Mulla, Chan Yeob Yeun:
Smart-frame: A flexible, scalable, and secure information management framework for smart grids. 668-673 - Benjamin Heckmann, Marcus Zinn, Ronald C. Moore, Christoph Wentzel, Andrew D. Phippen:
Economic efficiency control on data centre resources in heterogeneous cost scenarios. 675-679 - Sheheryar Malik, Fabrice Huet, Denis Caromel:
RACS: A framework for Resource Aware Cloud computing. 680-687 - Ashwini Rath, Sanjay Kumar, Sanjay Mohapatra, Rahul Thakurta:
Decision points for adoption cloud computing in small, medium enterprises (SMEs). 688-691 - Mafawez T. Alharbi, Amelia Platt, Ali H. Al-Bayatti:
Context-aware Personal Learning Environment. 692-697 - Mourad Ykhlef, Abeer AlDayel:
Query paraphrasing using genetic approach for intelligent information retrieval. 699-703 - Zhe Wang, Xiaodong Liu, Kevin Chalmers, Guojian Cheng:
Evolution pattern for Service Evolution in Clouds. 704-709 - Said Rabah Azzam, Shikun Zhou:
Implementation methodology of Rely/Guarantee plug-in for Protégé. 710-714 - Funminiyi Olajide, Nick Savage, Galyna A. Akmayeva, Richard Trafford:
Forensic memory evidence of windows application. 715-718 - Pardis Pourghomi, Gheorghita Ghinea:
Challenges of managing secure elements within the NFC ecosystem. 720-725 - Saneeha Khalid, Haider Abbas, Maruf Pasha, Asad Raza:
Securing Internet Information Services (IIS) configuration files. 726-729 - Muhammad Qasim Saeed, Colin D. Walter:
Off-line NFC Tag Authentication. 730-735 - Matthias Trojahn, Philipp Marcus:
Towards coupling user and device locations using biometrical authentication on smartphones. 736-741 - Saurabh Kulkarni, Madhumitra Mutalik, Prathamesh Kulkarni, Tarun Gupta:
Honeydoop - a system for on-demand virtual high interaction honeypots. 743-747 - Jeffrey J. Wiley, Frank P. Coyle:
Semantic hedgehog for log analysis. 748-752 - Jabu Mtsweni:
Exploiting UML and acceleo for developing Semantic Web Services. 753-758 - Said Rabah Azzam, Shikun Zhou:
Assessment of ontology alignment methodology. 759-764 - Rehaballah Elbadrawy, Rasha Abdel Aziz:
Mobile banking contexts and prospects in Egypt: A framework. 766-771 - Pardis Pourghomi, Gheorghita Ghinea:
Managing NFC payment applications through cloud computing. 772-777 - S. N. Arun, W. C. Lam, Kok Kiong Tan:
Innovative solution for a telemedicine application. 778-783 - Gaozheng Zhang, Mengdong Chen, Mou Shen:
Authorization model of SSO for a distributed environment based on the attributes. 784-789