- Rasib Hassan Khan, Jukka Ylitalo, Abu Shohel Ahmed:
OpenID authentication as a service in OpenStack. IAS 2011: 372-377 - Mohammad Javad Khosravi, Samaneh Ghandali:
A secure joint wavelet based steganography and secret sharing method. IAS 2011: 222-227 - Sheng Li, Alex C. Kot:
A novel system for fingerprint privacy protection1. IAS 2011: 262-266 - Kuan Jen Lin, Chih Ping Weng, Tsai Kun Hou:
Enhance hardware security using FIFO in pipelines. IAS 2011: 344-349 - Reine Lundin, Stefan Lindskog:
Guesswork changes in multi-processor attacks. IAS 2011: 145-150 - Federico Maggi, Simone Gasparini, Giacomo Boracchi:
A fast eavesdropping attack against touchscreens. IAS 2011: 320-325 - Ahmad Kamran Malik, Schahram Dustdar:
Enhanced sharing and privacy in distributed information sharing environments. IAS 2011: 286-291 - Siddharth Malik, Anjali Sardana:
Secure Vault: A privacy preserving reliable architecture for Secure Social Networking. IAS 2011: 116-121 - Yuxin Meng, Lam-for Kwok:
Adaptive context-aware packet filter scheme using statistic-based blacklist generation in network intrusion detection. IAS 2011: 74-79 - Chandrashekhar Meshram, Suchitra A. Meshram:
An identity based beta cryptosystem. IAS 2011: 298-303 - Abidalrahman Moh'd, Yaser Jararweh, Lo'ai Ali Tawalbeh:
AES-512: 512-bit Advanced Encryption Standard algorithm design and evaluation. IAS 2011: 292-297 - Mohd Faizal Mubarak, Jamalul-lail Ab Manan, Saadiah Yahya:
Trusted anonymizer-based RFID system with integrity verification. IAS 2011: 98-103 - Zaiton Muda, Warusia Yassin, Md Nasir Sulaiman, Nur Izura Udzir:
Intrusion detection based on k-means clustering and OneR classification. IAS 2011: 192-197 - Elham Nosrati, S. Navid Hashemi Tonekaboni, S. Majid Hashemi Tonekaboni:
Examining CSCF entity attacks scenarios and vulnerabilities in IP Multimedia Subsystems. IAS 2011: 304-307 - Moussa Ouedraogo, Haralambos Mouratidis, Artur Hecker, Cédric Bonhomme, Djamel Khadraoui, Eric Dubois, David Preston:
A new approach to evaluating security assurance. IAS 2011: 215-221 - Mithun Paul, Nitin Singh Chauhan, Ashutosh Saxena:
A security analysis of smartphone data flow and feasible solutions for lawful interception. IAS 2011: 19-24 - Massimiliano Rak, Loredana Liccardo, Rocco Aversa:
A SLA-based interface for security management in cloud and GRID integrations. IAS 2011: 378-383 - Sofia Najwa Ramli, Rabiah Ahmad:
Surveying the Wireless Body Area Network in the realm of wireless communication. IAS 2011: 58-61 - Murad A. Rassam, Mohd Aizaini Maarof, Anazida Zainal:
A novel intrusion detection framework for Wireless Sensor Networks. IAS 2011: 350-353 - Sherif Saad, Issa Traoré:
A semantic analysis approach to manage IDS alerts flooding. IAS 2011: 156-161 - Karima Ait Saadi, Ahmed Bouridane, Abdelrazek Guessoum:
H.264/AVC digital fingerprinting based on content adaptive embedding. IAS 2011: 360-365 - Fatin Norsyafawati Mohd Sabri, Norita Md Norwawi, Kamaruzzaman Seman:
Hybrid of rough set theory and Artificial Immune Recognition System as a solution to decrease false alarm rate in intrusion detection system. IAS 2011: 134-138 - Sairul Izwan Safie, John J. Soraghan, Lykourgos Petropoulakis:
Pulse Active Mean (PAM): A PIN supporting feature extraction algorithm for doubly secure authentication. IAS 2011: 210-214 - Simona Samardjiska, Yanling Chen, Danilo Gligoroski:
Construction of Multivariate Quadratic Quasigroups (MQQs) in arbitrary Galois fields. IAS 2011: 314-319 - Haider Ismael Shahadi, Razali Jidin:
High capacity and inaudibility audio steganography scheme. IAS 2011: 104-109 - Mohammad Ali Arsyad bin Mohd Shuhaimi, Zaheera binti Zainal Abidin, Irda binti Roslan, Syarulnaziah binti Anawar:
The new services in Nagios: Network bandwidth utility, email notification and sms alert in improving the network performance. IAS 2011: 86-91 - Subhranil Som, Niladri Shekhar Chatergee, J. K. Mandal:
Key based bit level genetic cryptographic technique (KBGCT). IAS 2011: 240-245 - Hamid Reza Taremian, Mahdi Pakdaman Naeini:
Hybrid Intelligent Decision Support System for credit risk assessment. IAS 2011: 167-172 - Sui-Guan Teo, Kenneth Koon-Ho Wong, Ed Dawson, Leonie Simpson:
State convergence and the effectiveness of time-memory-data tradeoffs. IAS 2011: 92-97 - Ravi Sankar Veerubhotla, Ashutosh Saxena:
A DRM framework towards preventing digital piracy. IAS 2011: 1-6