


default search action
ISA 2011: Brno, Czech Republic
- Tai-Hoon Kim, Hojjat Adeli, Rosslin John Robles, Maricel O. Balitanas:

Information Security and Assurance - International Conference, ISA 2011, Brno, Czech Republic, August 15-17, 2011. Proceedings. Communications in Computer and Information Science 200, Springer 2011, ISBN 978-3-642-23140-7 - Bilal Khan, Khaled Alghathbar, Muhammad Khurram Khan

:
Information Security Awareness Campaign: An Alternate Approach. 1-10 - Wei Wang:

Equivalent Key Recovery Attack on H 2-MAC Instantiated with MD5. 11-20 - Pierre-Louis Cayrel, Sidi Mohamed El Yousfi Alaoui, Gerhard Hoffmann, Mohammed Meziani, Robert Niebuhr:

Recent Progress in Code-Based Cryptography. 21-32 - Pierre-Louis Cayrel, Gerhard Hoffmann, Michael Schneider:

GPU Implementation of the Keccak Hash Function Family. 33-42 - Ines Bouzouita, Michel Liquiere, Samir Elloumi, Ali Jaoua

:
A Comparative Study of a New Associative Classification Approach for Mining Rare and Frequent Classification Rules. 43-52 - Guoyan Zhang, Qiuliang Xu:

Secret Key Awareness Security Public Key Encryption Scheme. 53-61 - Mohamed Saied Emam Mohamed, Stanislav Bulygin, Johannes Buchmann:

Using SAT Solving to Improve Differential Fault Analysis of Trivium. 62-71 - Lukás Durfina, Jakub Kroustek, Petr Zemek, Dusan Kolár, Tomás Hruska, Karel Masarík, Alexander Meduna

:
Design of a Retargetable Decompiler for a Static Platform-Independent Malware Analysis. 72-86 - Soltan Alharbi

, Jens H. Weber-Jahnke, Issa Traoré:
The Proactive and Reactive Digital Forensics Investigation Process: A Systematic Literature Review. 87-100 - Fabio Manganiello, Mirco Marchetti

, Michele Colajanni
:
Multistep Attack Detection and Alert Correlation in Intrusion Detection Systems. 101-110 - Mohammed Meziani, Pierre-Louis Cayrel, Sidi Mohamed El Yousfi Alaoui:

2SC: An Efficient Code-Based Stream Cipher. 111-122 - Mohamed Saied Emam Mohamed, Jintai Ding

, Johannes Buchmann:
Towards Algebraic Cryptanalysis of HFE Challenge 2. 123-131 - Mohammed Meziani, Özgür Dagdelen, Pierre-Louis Cayrel, Sidi Mohamed El Yousfi Alaoui:

S-FSB: An Improved Variant of the FSB Hash Family. 132-145 - Sidi Mohamed El Yousfi Alaoui, Pierre-Louis Cayrel, Mohammed Meziani:

Improved Identity-Based Identification and Signature Schemes Using Quasi-Dyadic Goppa Codes. 146-155 - Noureldien Abdelrhman Noureldien, Mahmud Awadelkariem, DeiaEldien M. Ahmed:

A Detrministic Factorization and Primality Testing Algorithm for Integers of the Form Z Mod 6 = -1. 156-165 - Jayaprakash Kar

:
Non-interactive Deniable Authentication Protocol Using Generalized ECDSA Signature Scheme. 166-176 - Gerasimos C. Meletiou, Yannis C. Stamatiou

, Apostolos Tsiakalos
:
Lower Bounds for Interpolating Polynomials for Square Roots of the Elliptic Curve Discrete Logarithm. 177-187 - Jari Veijalainen, Veikko Hara:

Towards Next Generation System Architecture for Emergency Services. 188-202 - Rosslin John Robles

, Gilcheol Park:
Securing Communication between SCADA Master Station and Mobile Remote Components. 203-210 - Maricel O. Balitanas, Seung-Hwan Jeon, Tai-Hoon Kim:

Retrofit to CAIN of IP-Based Supervisory Control and Data Acquisition System. 211-218 - Rosslin John Robles

, Tai-Hoon Kim:
Application Program Interface as Back-Up Data Source for SCADA Systems. 219-226 - (Withdrawn) Supervisory Control and Data Acquisition System CAIN Issues. 227-235

- Young B. Choi, Tae Hwan Oh, Rajath Chouta:

RFID Implementation and Security Issues. 236-249 - Gyuyeong Kim, Hyuntae Kim, Jangsik Park, Yunsik Yu:

Vehicle Tracking Based on Kalman Filter in Tunnel. 250-256 - Chai-Jong Song

, Seok-Pil Lee, Hochong Park:
The Contents Based Music Retrieval Method Using Audio Feature Analysis against Polyphonic Music. 257-263 - Hyuntae Kim, Daehyun Ryu, Jangsik Park:

A Noise Robust Echo Canceller with Post-processing Using Liner Predictor and Wiener filter. 264-274 - Jangsik Park, Hyuntae Kim, Yunsik Yu:

Implementation Fire Detection Algorithm Using Fixed Point Digital Signal Processor. 275-281 - Seung-Hyun Lee, Kyung-Soo Jang, Kee-Hyun Choi, Choon-Sung Nam, Dong Ryeol Shin:

An Efficient Private Registry Management System Using DHT Based on FIPA Agent Platform. 282-291 - You-Jin Song, Jae Sang Cha, Jang Mook Kang:

A Study for Method of Construct Encryption Scheme for Supporting Range Query Based on Bucket ID Transformation about Sensor Applications. 292-305 - Ji-Yeon Hwang, Seung-Jung Shin, DaeHyun Ryu:

Improvement of Message Processing Method for SOA Based Digital Set-Top Box System. 306-312 - You-Jin Song, Jae Sang Cha, Jang Mook Kang, Wan Sik kim:

A Data Management Method to Secure Data in Cloud Computing Environment. 313-317 - Dongjae Song, Soongyu Kwon, Chun-Guan Kim, Jong Tae Kim:

VLSI Architecture of Adaptive Viterbi Decoder for Wireless Communication. 318-325 - Jang Mook Kang, You-Jin Song, Jae Sang Cha, Seon-Hee Lee:

A Study for Security Scheme and the Right to Be Forgotten Based on Social Network Service for Smart-Phone Environment. 326-332 - Jun-Pil Boo, Do-Hyeun Kim:

Development of Integrated Adapter Based on Multi-sensor Networks for Tracking and Surveillance. 333-338 - Byoungman An, Youngseop Kim, Oh-Jin Kwon:

High Speed and Low-Complexity Mode Decision for Advanced Video Coding. 339-348 - Ji Hoon Yang, Seung-Jung Shin, Dong Kyun Lim, Jeong Jin Kang:

Robust Congestion Control Design for Input Time Delayed AQM System. 349-358 - Dong-Sung Ryu, Kwanghwi Kim, Hwan-Gue Cho:

An Intelligent Clustering Method for Highly Similar Digital Photos Using Pyramid Matching with Human Perceptual 25 Color Histogram. 359-366 - Yong-Kyun Cho, Young-Bum Park:

Requirements Analysis and Critical Requirement Derivation Method Using Macrostruktur. 367-377 - Jang Mook Kang, Jae Sang Cha, You-Jin Song, Goo-Man Park, Eun-Young Ko, Myong-Chul Shin, Jeong Jin Kang, YouSik Hong:

A Scheme for Role-Based 3D CCTV Using CS-RBAC (Context-Sensitivity Role-Based Access Control). 378-383 - Jangsik Park, Hyuntae Kim, Gyuyeong Kim, Yunsik Yu:

Vessel Tracking Using Adaboost Algorithm and AIS Information. 384-388 - Xing Xiong, Byung-Jae Choi:

Relative Self-Localization Base on Fish-Eye Lenses and SIFT Algorithm for Indoor Mobile Robot. 389-394 - Wonjun Jang, Sikwan Cho, Hyung-Woo Lee:

User-Oriented Pseudo Biometric Image Based One-Time Password Mechanism on Smart Phone. 395-404

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














