Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/icitst/icitst2010.bht:"
@inproceedings{DBLP:conf/icitst/AbdelhaqAAA10, author = {Abdelhaq Belkadi and Abdelaziz El Fazziki and Ait Ouahman Abdallah and Ibourk Aomar}, title = {Toward an agent based approach for decisional systems modeling}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--8}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678115/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AbdelhaqAAA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AhmadAA10, author = {Iftikhar Ahmad and Azween Vitra Abdullah and Abdullah Sharaf Alghamdi}, title = {Remote to Local attack detection using supervised neural network}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678110/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AhmadAA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AkgunGC10, author = {Mete Akg{\"{u}}n and Ali {\"{O}}zhan G{\"{u}}rel and Mehmet Ufuk {\c{C}}aglayan}, title = {Attacks to a lightweight {RFID} mutual authentication protocol}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--5}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678039/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AkgunGC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Al-AssamSJ10, author = {Hisham Al{-}Assam and Harin Sellahewa and Sabah Jassim}, title = {On security of multi-factor biometric authentication}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678012/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Al-AssamSJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Al-Fedaghi10, author = {Sabah S. Al{-}Fedaghi}, title = {Diagrammatical framework for information system attacks}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--7}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678533/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Al-Fedaghi10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Al-WabilAAA10, author = {Areej Al{-}Wabil and Ebtisam Alabdulqader and Latifa Al{-}Abdulkarim and Nora Al{-}Twairesh}, title = {Measuring the user experience of digital books with children: An eyetracking study of interaction with digital libraries}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--7}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678025/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Al-WabilAAA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Alaraj10, author = {Abdullah Mohammed Alaraj}, title = {Ownership transfer protocol}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678022/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Alaraj10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlghafliY10, author = {Khawla Alghafli and Chan Yeob Yeun}, title = {New authentication protocol for {IP} {CAS} of {IPTV}}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678535/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AlghafliY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AliSK10, author = {Safdar Ali and Waseem Shahzad and Farrukh Aslam Khan}, title = {Remote-to-Local attacks detection using incremental genetic algorithm}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678024/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AliSK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Aloul10, author = {Fadi A. Aloul}, title = {Information security awareness in {UAE:} {A} survey paper}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678046/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Aloul10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlrouhAG10, author = {Bachar Alrouh and Adel Almohammad and Gheorghita Ghinea}, title = {{SOAP} message-based steganography}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678538/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AlrouhAG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlzomaiAJ10, author = {Mohammed Alzomai and Bander AlFayyadh and Audun J{\o}sang}, title = {Display security for online transactions: SMS-based authentication scheme}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--7}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678536/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AlzomaiAJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AmanK10, author = {Aini Aman and Hasmiah Kasimin}, title = {E-government evaluation: The case of e-procurement in Malaysia government}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678549/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AmanK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Ayodele10, author = {Taiwo Ayodele}, title = {Unsupervised email vector space model {(UEVSM)}}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--5}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678093/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Ayodele10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BenelliP10, author = {Giuliano Benelli and Alessandro Pozzebon}, title = {An automated payment system for car parks based on Near Field Communication technology}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678029/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BenelliP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BicaTG10, author = {Ion Bica and Mihai Togan and Stefan{-}Vladimir Ghita}, title = {Gossip membership protocol for peer-to-peer streaming overlay construction}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--5}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678028/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BicaTG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BurghouwtSS10, author = {Pieter Burghouwt and Marcel E. M. Spruit and Henk J. Sips}, title = {Detection of botnet collusion by degree distribution of domains}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--8}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678103/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BurghouwtSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/CaragataRAA10, author = {Daniel Caragata and Anca{-}Livia Radu and Safwan El Assad and Cristian{-}Gabriel Apostol}, title = {Chaos based fragile watermarking algorithm for {JPEG} images}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--7}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678064/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/CaragataRAA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ChovanecKW10, author = {Peter Chovanec and Michal Kr{\'{a}}tk{\'{y}} and Jir{\'{\i}} Walder}, title = {Lossless R-tree compression using variable-length codes}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--8}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678116/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ChovanecKW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/CulverhouseGRW10, author = {Mark E. Culverhouse and Bogdan V. Ghita and Paul L. Reynolds and Xingang Wang}, title = {Optimising Quality of Service through the controlled aggregation of traffic}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--7}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678553/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/CulverhouseGRW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/DominikusAK10, author = {Sandra Dominikus and Manfred Josef Aigner and Stefan Kraxberger}, title = {Passive {RFID} technology for the internet of things}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--8}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678037/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/DominikusAK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/DucKY10, author = {Dang Nguyen Duc and Kwangjo Kim and Chan Yeob Yeun}, title = {Reconsidering Ryu-Takagi {RFID} authentication protocol}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678044/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/DucKY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/EdelmanDS10, author = {Paul T. Edelman and Michael J. Donahoo and David B. Sturgill}, title = {Secure group communications for Delay-Tolerant Networks}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--8}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678120/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/EdelmanDS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ElDahshanL10, author = {Kamal A. ElDahshan and Hany M. S. Lala}, title = {Mining uncertain data warehouse}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--7}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678108/}, timestamp = {Sun, 29 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ElDahshanL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ElahiKY10, author = {Najeeb Elahi and Randi Karlsen and Waqas Younas}, title = {Semantic image annotation with social context}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--7}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678026/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ElahiKY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/EmeboDA10, author = {Onyeka Emebo and Olawande J. Daramola and Charles Ayo}, title = {A Grid-based e-learning model for Open Universities}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--4}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678119/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/EmeboDA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/EpiphaniouMSN10, author = {Gregory Epiphaniou and Carsten Maple and Paul Sant and Peter Norrington}, title = {The effects of encryption on VoIP streams under the code-excited linear prediction coder {G.729}}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678023/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/EpiphaniouMSN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/EzzatiNCH10, author = {Saeed Ezzati and Hamid Reaza Naji and Amir Chegini and Payam Habibimehr}, title = {A new method of hardware firewall implementation on {SOC}}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--7}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678545/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/EzzatiNCH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/FeldhoferABHPW10, author = {Martin Feldhofer and Manfred Josef Aigner and Thomas Baier and Michael Hutter and Thomas Plos and Erich Wenger}, title = {Semi-passive {RFID} development platform for implementing and attacking security tags}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678040/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/FeldhoferABHPW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/GalanAOA10, author = {Elena Castro Gal{\'{a}}n and Almudena Alcaide and Agust{\'{\i}}n Orfila and Jorge Blasco Al{\'{\i}}s}, title = {A multi-agent scanner to detect stored-XSS vulnerabilities}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678543/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/GalanAOA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/GarridoMRG10, author = {Pilar Castro Garrido and Guillermo Matas Miraz and Irene Luque Ruiz and Miguel {\'{A}}ngel G{\'{o}}mez{-}Nieto}, title = {Near Field Communication in the development of ubiquitous games}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--7}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678018/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/GarridoMRG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Habib10, author = {Muhammad Asif Habib}, title = {Mutual exclusion and role inheritance affecting least privilege in {RBAC}}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678530/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Habib10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HadiMN10, author = {Fazl{-}e Hadi and Fahad Bin Muhaya and Atif R. Naseer}, title = {Secure multimedia communication in wireless mesh networks}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--4}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678528/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/HadiMN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HanMS10, author = {Kyusuk Han and Hyeran Mun and Taeshik Shon}, title = {Design of secure key agreement protocol for pairing in {RF4CE}}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--5}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678042/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/HanMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HatimBB10, author = {Hamid Hatim and Hanane El Bakkali and Ilham Berrada}, title = {Workflow access control: From role engineering to task engineering}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--7}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678532/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/HatimBB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HinaAJ10, author = {Saman Hina and Eric Atwell and Owen A. Johnson}, title = {Secure information extraction from clinical documents using {SNOMED} {CT} gazetteer and natural language processing}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--5}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678112/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/HinaAJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Hooper10, author = {Emmanuel Hooper}, title = {Strategic and intelligent smart grid systems engineering}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678118/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Hooper10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/IonescuATMS10, author = {Laurentiu Ionescu and Constantin Anton and Ion Tutanescu and Alin Mazare and Gheorghe Serban}, title = {On a {FPGA} implementation of {BCH} codes}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--5}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678091/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/IonescuATMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/IskandarS10, author = {Manar Iskandar and Noor Akma Mohd Salleh}, title = {{IT} governance in e-commerce environment: Cases from airline industry}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678016/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/IskandarS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/JafariMOFO10, author = {Said Jafari and Fredrick Mtenzi and Ciaran O'Driscoll and Ronan Fitzpatrick and Brendan O'Shea}, title = {Privacy metrics in ubiquitous computing applications}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--2}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678048/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/JafariMOFO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/JangCKJN10, author = {Dae{-}il Jang and Kang{-}yu Cho and Minsoo Kim and Hyun{-}Chul Jung and Bong{-}Nan Noh}, title = {Evasion technique and detection of malicious botnet}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--5}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678101/}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/JangCKJN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/JayahkudyT10, author = {Usha Jayahkudy and Chong Eng Tan}, title = {Link signal strength based path selection scheme for ad hoc networks}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678551/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/JayahkudyT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Johnson10, author = {Robert E. Johnson III}, title = {Survey of {SCADA} security challenges and potential attack vectors}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--5}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678102/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Johnson10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KhanAASM10, author = {Zeeshan Shafi Khan and Nabila Akram and Khaled Alghathbar and Muhammad Sher and Rashid Mehmood}, title = {Secure single packet {IP} Traceback mechanism to identify the source}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--5}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678105/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KhanAASM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KimKJ10, author = {Young Sam Kim and Seung{-}Hyun Hyun Kim and Seung{-}Hun Hun Jin}, title = {SRS-based automatic secure device pairing on audio channels}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678019/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KimKJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KrizkaK10, author = {Filip Krizka and Michal Kr{\'{a}}tk{\'{y}}}, title = {On the efficient indexing of ordered multidimensional tuples}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--8}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678117/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KrizkaK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KusetogullariYLH10, author = {Huseyin Kusetogullari and Amir Yavariabdi and Mark S. Leeson and Evor L. Hines}, title = {Genetic algorithm based rainbow network flow optimization for multiple description coding in lossy network}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678113/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KusetogullariYLH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/LavarackC10, author = {Tristan Lavarack and Marijke Coetzee}, title = {A Web Services security policy assistant}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678032/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/LavarackC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/LeicherSSC10, author = {Andreas Leicher and Andreas U. Schmidt and Yogendra Shah and Inhyok Cha}, title = {Trusted Computing enhanced OpenID}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--8}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678097/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/LeicherSSC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/LivaniA10, author = {Mohammad Ahmadi Livani and Mahdi Abadi}, title = {Distributed PCA-based anomaly detection in wireless sensor networks}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--8}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678106/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/LivaniA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/LupianaMOO10, author = {Dennis M. Lupiana and Fredrick Mtenzi and Ciaran O'Driscoll and Brendan O'Shea}, title = {Strictly alphanumeric data: Improving privacy in smart environments}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--3}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678045/}, timestamp = {Wed, 01 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/LupianaMOO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/LutzLMHS10, author = {David J. Lutz and Dominik Lamp and Patrick Mandic and Fabio Victora Hecht and Burkhard Stiller}, title = {Charging of SAML-based federated VoIP services}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--8}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678547/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/LutzLMHS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ManamonM10, author = {Conor Mc Manamon and Fredrick Mtenzi}, title = {Defending privacy: The development and deployment of a darknet}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678544/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ManamonM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MishraM10, author = {Ravi Bhushan Mishra and Bireshwar Dass Mazumdar}, title = {Cognitive parameters based seller agent selection in {B2C} E-Commerce}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--3}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678015/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MishraM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MohammedCVHB10, author = {Mohssen M. Z. E. Mohammed and H. Anthony Chan and Neco Ventura and Mohsin Hashim and Eihab Bashier}, title = {Fast and accurate detection for polymorphic worms}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678546/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MohammedCVHB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MoritzSM10, author = {Franka Moritz and Maria Siebert and Christoph Meinel}, title = {Improving community rating in the tele-lecturing context}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678013/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MoritzSM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MunYHC10, author = {Hyeran Mun and Chan Yeob Yeun and Kyusuk Han and Byung{-}Ho Chung}, title = {Enhancement of anonymous authentication scheme in wireless sensor network}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--4}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678041/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MunYHC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/NadiSJ10, author = {Shiva Nadi and Mohamadhosein Hussein Saraee and Mohamad Davarpanah Jazi}, title = {A fuzzy recommender system for dynamic prediction of user's behavior}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--5}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678109/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/NadiSJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/NarhimeneM10, author = {Boustia Narhimene and A{\"{\i}}cha Mokhtari}, title = {A contextual multilevel access control model with default and exception description logic}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678531/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/NarhimeneM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ODriscollD10, author = {Ciaran O'Driscoll and Paul Doyle}, title = {The cost of security for a completely private ubiquitous environment}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--2}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678047/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ODriscollD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/OmaryMWO10, author = {Zanifa Omary and Fredrick Mtenzi and Bing Wu and Ciaran O'Driscoll}, title = {Accessing sensitive patient information in ubiquitous healthcare systems}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--3}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678051/}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/OmaryMWO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/OthmanHM10, author = {Hanunah Othman and Habibah Hashim and Jamalul{-}lail Ab Manan}, title = {A conceptual framework providing Direct Anonymous Attestation {(DAA)} protocol in trusted location-based services {(LBS)}}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--7}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678526/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/OthmanHM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/OzdenizciACK10, author = {Busra Ozdenizci and Mehmet N. Aydin and Vedat Coskun and Kerem Ok}, title = {Design science in {NFC} research}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678014/}, timestamp = {Thu, 09 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/OzdenizciACK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/OzdenizciCAK10, author = {Busra Ozdenizci and Vedat Coskun and Mehmet N. Aydin and Kerem Ok}, title = {{NFC} loyal: {A} beneficial model to promote loyalty on smart cards of mobile devices}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678068/}, timestamp = {Thu, 09 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/OzdenizciCAK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Pathak10, author = {Vivek Pathak}, title = {Combating web plagiarism and improving internet safety by authenticating web content}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678095/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Pathak10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Peris-LopezMLE10, author = {Pedro Peris{-}Lopez and Enrique San Mill{\'{a}}n and Jan C. A. van der Lubbe and Luis Entrena}, title = {Cryptographically secure pseudo-random bit generator for {RFID} tags}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678035/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Peris-LopezMLE10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/PonnusamyA10, author = {Vasaki Ponnusamy and Azween Vitra Abdullah}, title = {A bio-inspired framework for wireless sensor network using mobile sensors}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678122/}, timestamp = {Mon, 28 Mar 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/PonnusamyA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/RaghavendraCK10, author = {Prakash S. Raghavendra and Shreya Roy Chowdhury and Srilekha Vedula Kameswari}, title = {Comparative study of neural networks and k-means classification in web usage mining}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--7}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678107/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/RaghavendraCK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ReddySD10, author = {V. Siva RamaKrishna Reddy and Durvasula V. L. N. Somayajulu and Ajay R. Dani}, title = {Sentiment Classification of text reviews using novel feature selection with reduced over-fitting}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--2}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678555/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ReddySD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ReillyWB10, author = {Denis J. Reilly and Chris Wren and Tom Berry}, title = {Cloud computing: Forensic challenges for law enforcement}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--7}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678033/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ReillyWB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/RezaeiMNA10, author = {Masoud Rezaei and Nafise Sadat Moosavi and Hamed Nemati and Reza Azmi}, title = {TCvisor: {A} hypervisor level secure storage}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--9}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678529/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/RezaeiMNA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/RonnigerFSG10, author = {Maximilian Ronniger and Florian Fankhauser and Christian Schanes and Thomas Grechenig}, title = {A robust and flexible test environment for VoIP security tests}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678010/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/RonnigerFSG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SiebertMHM10, author = {Maria Siebert and Franka Moritz and Frank Hambach and Christoph Meinel}, title = {Enriching E-Learning meta data with user generated playlists}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678550/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SiebertMHM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SingaraveluV10, author = {Pradheepkumar Singaravelu and Shekhar Verma}, title = {Viability of multivariate cryptosystems for {WSN}}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678098/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SingaraveluV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SinghL10, author = {Parminder Singh and G. S. Lehal}, title = {Statistical syllables selection approach for the preparation of Punjabi speech database}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--4}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678557/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SinghL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/StarnbergerFG10, author = {Guenther Starnberger and Lorenz Froihofer and Karl M. G{\"{o}}schka}, title = {Distributed timestamping with smart cards using efficient overlay routing}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678034/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/StarnbergerFG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/TolnaiS10, author = {Annette Tolnai and Sebastiaan H. von Solms}, title = {A Virtualized Environment Security {(VES)} model for a secure virtualized environment}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678027/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/TolnaiS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/VcelckKR10, author = {P. Vcelck and Jana Kleckov{\'{a}} and Vladimir Rohan}, title = {Cerebrovascular diseases research based on heterogeneous medical data mining and knowledge base}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678542/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/VcelckKR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/WangPWP10, author = {Jie Wang and Raphael Chung{-}Wei Phan and John N. Whitley and David J. Parish}, title = {Quality of detectability (QoD) and QoD-aware AAT-based attack detection}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678009/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/WangPWP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/WaqarK10, author = {Mohannmad Waqar and Zeeshan Shafi Khan}, title = {Web 2.0 content extraction}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--3}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678554/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/WaqarK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/WoodP10, author = {Katie Wood and Ella Pereira}, title = {An investigation into cloud configuration and security}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678036/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/WoodP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/YoonPKHY10, author = {Yeojeong Yoon and Chanil Park and Pyung Kim and Seongoun Hwang and Hyunsoo Yoon}, title = {An efficient identity-based proxy signcryption for secure broadcast}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678017/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/YoonPKHY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ZhaoLX10, author = {Fuchun Zhao and Hong Ling and Zhengchuan Xu}, title = {Inter-organizational trust and supply chain Flexibility: From a relational view of the firm}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--5}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678100/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ZhaoLX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icitst/2010, title = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/xpl/conhome/5672505/proceeding}, isbn = {978-1-4244-8862-9}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.