Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Niaz Morshed Chowdhury, Lewis M. Mackenzie |
Development of a Threat Model for Vehicular Ad-hoc Network based Accident Warning Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014, pp. 447, 2014, ACM, 978-1-4503-3033-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Xavier J. A. Bellekens, Christos Tachtatzis, Robert C. Atkinson, Craig Renfrew, Tony Kirkham |
GLoP: Enabling Massively Parallel Incident Response Through GPU Log Processing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014, pp. 295, 2014, ACM, 978-1-4503-3033-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Soumyadeb Chowdhury, Ron Poet, Lewis Mackenzie |
Exploring the Guessability of Image Passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014, pp. 264, 2014, ACM, 978-1-4503-3033-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Shahid Alam, Ibrahim Sogukpinar, Issa Traoré, Yvonne Coady |
In-Cloud Malware Analysis and Detection: State of the Art. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014, pp. 473, 2014, ACM, 978-1-4503-3033-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Tatiana V. Stepanova, Dmitry P. Zegzhda |
Applying Large-scale Adaptive Graphs to Modeling Internet of Things Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014, pp. 479, 2014, ACM, 978-1-4503-3033-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ludmila K. Babenko, Oleg B. Makarevich, Dmitry Bespalov, Roman Chesnokov, Yaroslav Trubnikov |
Instrumental System for Analysis of Information Systems Using Smart Cards Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014, pp. 339, 2014, ACM, 978-1-4503-3033-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Hui Lin 0005, Adam J. Slagell, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer |
Semantic Security Analysis of SCADA Networks to Detect Malicious Control Commands in Power Grids (Poster). ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014, pp. 492, 2014, ACM, 978-1-4503-3033-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Valeriy O. Osipyan |
Mathematical model of the polyalphabetic information security system based on the normal generalized knapsack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014, pp. 180, 2014, ACM, 978-1-4503-3033-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ahmed Saeed 0003, Ali Ahmadinia, Mike Just, Christophe Bobda |
An ID and Address Protection Unit for NoC based Communication Architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014, pp. 288, 2014, ACM, 978-1-4503-3033-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ali Reza Honarvar, Ashkan Sami |
CBR Clone Based Software Flaw Detection Issues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014, pp. 487, 2014, ACM, 978-1-4503-3033-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Nicolas Mayer, Jocelyn Aubert |
Sector-Specific Tool for Information Security Risk Management in the Context of Telecommunications Regulation (Tool demo). ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014, pp. 85, 2014, ACM, 978-1-4503-3033-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Sergey Agafin, Anton Krasnopevtsev |
Memory access time as entropy source for RNG. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014, pp. 176, 2014, ACM, 978-1-4503-3033-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ecir U. Küçüksille, Mehmet Ali Yalçinkaya, Ozan Uçar |
Physical Dangers in the Cyber Security and Precautions to be Taken. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014, pp. 310, 2014, ACM, 978-1-4503-3033-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yogachandran Rahulamathavan, Pramod S. Pawar, Pete Burnap, Muttukrishnan Rajarajan, Omer F. Rana, George Spanoudakis |
Analysing Security requirements in Cloud-based Service Level Agreements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014, pp. 73, 2014, ACM, 978-1-4503-3033-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Avani Sharma, Rajbir Kaur |
Non-cryptographic Detection Approach and Countermeasure for JFDV Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014, pp. 367, 2014, ACM, 978-1-4503-3033-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Greig Paul, James Irvine 0001 |
Privacy Implications of Wearable Health Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014, pp. 117, 2014, ACM, 978-1-4503-3033-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Naghmeh Moradpoor Sheykhkanloo |
Employing Neural Networks for the Detection of SQL Injection Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014, pp. 318, 2014, ACM, 978-1-4503-3033-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Maria Evangelopoulou, Christopher W. Johnson 0001 |
Implementation of Safety Techniques in a Cyber Domain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014, pp. 261, 2014, ACM, 978-1-4503-3033-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Maryam Farajzadeh-Zanjani, Seyed Masoud Alavi Abhari, Alexander G. Chefranov |
Group Key Exchange Protocol Based on Diffie-Hellman Technique in Ad-Hoc Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014, pp. 166, 2014, ACM, 978-1-4503-3033-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Bob Duncan, Mark Whittington |
Compliance with standards, assurance and audit: does this equal security? ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014, pp. 77, 2014, ACM, 978-1-4503-3033-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Edward Caprin, Yan Zhang 0003 |
Negotiation Based Framework for Attribute-Based Access Control Policy Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014, pp. 122, 2014, ACM, 978-1-4503-3033-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ekta Gandotra, Divya Bansal, Sanjeev Sofat |
Integrated Framework for Classification of Malwares. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014, pp. 417, 2014, ACM, 978-1-4503-3033-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Dusan Klinec, Vashek Matyás |
Traversing symmetric NAT with predictable port allocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014, pp. 543, 2014, ACM, 978-1-4503-3033-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Artem Garkusha, Evgeny Sergeevich Abramov, Oleg B. Makarevich |
An effectiveness of application of <> competitions concept within higher education (Student contribution). ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014, pp. 43, 2014, ACM, 978-1-4503-3033-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Emmanouil Vasilomanolakis, Shankar Karuppayah, Max Mühlhäuser, Mathias Fischer 0001 |
HosTaGe: a Mobile Honeypot for Collaborative Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014, pp. 330, 2014, ACM, 978-1-4503-3033-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jérôme Dossogne, Frédéric Lafitte, Dirk Van Heule |
Secure and practical threshold RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 79-85, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hosnieh Rafiee, Christoph Meinel |
Privacy and security in IPv6 networks: challenges and possible solutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 218-224, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Ali Orumiehchiha, Josef Pieprzyk, Elham Shakour, Ron Steinfeld |
Cryptanalysis of RC4(n, m) stream cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 165-172, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yüksel Arslan, Yildiray Yalman |
Visual steganalysis of LSB-encoded audio data based on frequency domain characteristics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 359-362, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Salim Khamadja, Kamel Adi, Luigi Logrippo |
Designing flexible access control models for the cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 225-232, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mohammed Gharib, Mohsen Minaei, Morteza Golkari, Ali Movaghar 0001 |
Expert key selection impact on the MANETs' performance using probabilistic key management algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 347-351, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mudassar Aslam, Christian Gehrmann, Mats Björkman |
Continuous security evaluation and auditing of remote platforms by combining trusted computing and security automation techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 136-143, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Dmitry Rublev, Vladimir Fedorov, Oleg B. Makarevich |
Digital camera identification system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 297-300, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sambit Bakshi, Tugkan Tuglular |
Security through human-factors and biometrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 463, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Aurathai Wareesa-ard |
EndNote vs Zotero in searching library catalog via Z39.50 of academic libraries in Thailand. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 411-412, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Evgeny Sergeevich Abramov, Elena Basan, Oleg B. Makarevich |
Development of a secure cluster-based wireless sensor network model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 372-375, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Salim Khamadja, Kamel Adi, Luigi Logrippo |
An access control framework for hybrid policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 282-286, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Muhammad Kazim, Rahat Masood, Muhammad Awais Shibli |
Securing the virtual machine images in cloud computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 425-428, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jérôme Dossogne, Frédéric Lafitte |
On authentication factors: "what you can" and "how you do it". ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 70-78, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Anil Saini, Manoj Singh Gaur, Vijay Laxmi |
The darker side of Firefox extension. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 316-320, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Christophe Feltus, Djamel Khadraoui |
Conviction model for incident reaction architecture monitoring based on automatic sensors alert detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 39-45, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Geong Sen Poh, Mohd Amril Nurman Mohd Nazir, Bok-Min Goi, Syh-Yuan Tan, Raphael Chung-Wei Phan, Maryam Safiyah Shamsudin |
An authentication framework for peer-to-peer cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 94-101, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Naïm Qachri, Frédéric Lafitte, Olivier Markowitch |
Authenticated key agreement in wireless networks with automated key management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 62-69, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Frédéric Lafitte, Olivier Markowitch, Dirk Van Heule |
SAT based analysis of LTE stream cipher ZUC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 110-116, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yulong Fu, Ousmane Koné |
A finite transition model for security protocol verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 368-371, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Valeriy O. Osipyan |
Information protection systems based on universal knapsack problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 343-346, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Alexander G. Chefranov, SeyedMasoud Alavi Abhari, Hooman Alavizadeh, Maryam Farajzadeh-Zanjani |
Secure true random number generator in WLAN/LAN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 331-335, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Orhan Ermis, Serif Bahtiyar, Emin Anarim, M. Ufuk Çaglayan |
An improved fault-tolerant conference-key agreement protocol with forward secrecy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 306-310, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Rohan Nanda, P. Venkata Krishna 0001 |
D0M-WLAN: a traffic analysis based approach for detecting malicious activities on wireless networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 421-424, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Bart Preneel |
The SHA-3 competition: lessons learned. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 16-19, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jérôme Dossogne, Frédéric Lafitte |
Blinded additively homomorphic encryption schemes for self-tallying voting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 173-180, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Shahid Alam, R. Nigel Horspool, Issa Traoré |
MAIL: Malware Analysis Intermediate Language: a step towards automating and optimizing malware detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 233-240, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Soumik Mondal, Patrick Bours, Syed Zulkarnain Syed Idrus |
Complexity measurement of a password for keystroke dynamics: preliminary study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 301-305, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ahmad AlSa'deh, Christoph Meinel, Florian Westphal, Marian Gawron, Björn Groneberg |
CGA integration into IPsec/IKEv2 authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 326-330, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Parvez Faruki, Vijay Ganmoor, Vijay Laxmi, Manoj Singh Gaur, Ammar Bharmal |
AndroSimilar: robust statistical feature signature for Android malware detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 152-159, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Somayeh Taheri, Salke Hartung, Dieter Hogrefe |
Anonymity and privacy in multicast mobile ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 241-250, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ali Aydin Selçuk |
Trusting SSL in practice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 15, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Duygu Sinanc, Seref Sagiroglu |
A review on cloud security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 321-325, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | R. K. Shyamasundar |
Security and protection of SCADA: a bigdata algorithmic approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 20-27, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Christophe Feltus |
Industry program panel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 465, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Pablo Lamilla Álvarez, Yoshiaki Takata |
An HBAC-based approximation for IBAC programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 277-281, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Saeid Tizpaz-Niari, Amir Hossein Jahangir |
Verification of OSPF vulnerabilities by colored Petri net. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 102-109, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Georges Ataya |
Linking business goals to information security plans and activities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 453, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Arif Sari, Behnam Rahnama |
Addressing security challenges in WiMAX environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 454-456, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ludmila K. Babenko |
Analysis of GOST 28147-89 security: methods and algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 6, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yulong Fu, Ousmane Koné |
Using transition systems to model and verify the implementation of security protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 210-217, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Aldjia Boucetta, Kamal Eddine Melkemi |
Hand shape recognition using Hu and Legendre moments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 272-276, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Casey Mortensen, Ryan Winkelmaier, Jun Zheng 0003 |
Exploring attack vectors facilitated by miniaturized computers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 203-209, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sattar B. Sadkhan, Nidaa A. Abbass |
Multidisciplinary prospective in cryptology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 464, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Marek Klonowski, Michal Koza, Miroslaw Kutylowski |
Efficient and robust data aggregation using untrusted infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 123-130, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Meriam Jemel, Nadia Ben Azzouna, Khaled Ghédira |
Towards a dynamic authorisation planning satisfying intra-instance and inter-instance constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 440-443, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Eman Hableel, Young-Ji Byon, Joonsang Baek |
Public key infrastructure for UAE: a case study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 336-340, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Behnam Rahnama, Yunus Kiran, Raz Dara |
Countering AES static s-box attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 256-260, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Leonid S. Bershtein, Alexey A. Tselykh |
A clique-based method for mining fuzzy graph patterns in anti-money laundering systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 384-387, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Vijay Laxmi, Deepanshu Mehta, Manoj Singh Gaur, Parvez Faruki, Chhagan Lal |
Impact analysis of JellyFish attack on TCP-based mobile ad-hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 189-195, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Christophe Feltus, Djamel Khadraoui |
On designing automatic reaction strategy for critical infrastructure SCADA system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 444-445, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Zahra Khani, Reza Azmi |
A protocol for simultaneous use of confidentiality and integrity in large-scale storage systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 400-403, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Juan Carlos Moreno, V. B. Surya Prasath, Hugo Proença 0001 |
Robust periocular recognition by fusing local to holistic sparse representations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 160-164, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Morteza Barati, Karim Faez, Zahra Hakimi |
A novel threshold-based scan detection method using genetic algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 436-439, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Cihangir Tezcan |
Improbable differential cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 457, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ludmila K. Babenko, Alexandr S. Basan, Oleg B. Makarevich |
Performance analysis of the developed mandatory access control system in the DBMS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 396-399, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Meriam Jemel, Nadia Ben Azzouna, Khaled Ghédira |
A novel approach for dynamic authorisation planning in constrained workflow systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 388-391, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hussain Nyeem, Wageeh W. Boles, Colin Boyd |
Counterfeiting attacks on block-wise dependent fragile watermarking schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 86-93, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Atilla Elçi, Manoj Singh Gaur, Mehmet A. Orgun, Oleg B. Makarevich (eds.) |
The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013 ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![ACM, 978-1-4503-2498-4 The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
1 | Artem S. Konoplev, Maxim O. Kalinin |
Security policy verification in grid systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 356-358, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Katharina Krombholz, Heidelinde Hobel, Markus Huber 0001, Edgar R. Weippl |
Social engineering attacks on the knowledge worker. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 28-35, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Valeriy O. Osipyan, A. S. Zhuck, A. H. Arutyunyan, Y. A. Karpenko |
Building of mathematical model of flow data processing system based on given selection of elements of the set. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 417-420, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Oleg B. Makarevich, Irina V. Mashkina, Alina Sentsova |
The method of the information security risk assessment in cloud computing systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 446-447, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Abdulaziz Almehmadi, Khalil El-Khatib |
Authorized! access denied, unauthorized! access granted. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 363-367, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Pyatkov Anton, Vyacheslav Zolotarev |
About responsibilities distribution for information security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 380-383, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hosnieh Rafiee, Christoph Mueller, Lukas Niemeier, Jannik Streek, Christoph Sterz, Christoph Meinel |
A flexible framework for detecting IPv6 vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 196-202, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hossain Shahriar, Vamshee Krishna Devendran, Hisham Haddad |
ProClick: a framework for testing clickjacking attacks in web applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 144-151, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hossain Shahriar |
Security vulnerabilities and mitigation techniques of web applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 459, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Edward Caprin, Yan Zhang 0003, Khaled M. Khan |
Social access control language (SocACL). ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 261-265, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ksenia Tsyganok, Evgeny Tumoyan, Lyudmila K. Babenko |
Development the method of detection the malicious pages interconnection in the internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 433-435, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Isao Nakanishi, Hironao Fukuda, Shigang Li 0001 |
Biometric verification using brain waves toward on-demand user management systems: performance differences between divided regions in α - β wave band. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 131-135, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sarmad Ullah Khan, Rafiullah Khan |
Content-location based key management scheme for content centric networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 376-379, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Md. Sadek Ferdous, Ron Poet |
Analysing attribute aggregation models in federated identity management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 181-188, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Manoj Singh Gaur, Dhiren R. Patel, Anil Saini |
Insecurities within browser: issues and challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 458, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Wolter Pieters, Julian A. Padget, Francien Dechesne, Virginia Dignum, Huib Aldewereld |
Obligations to enforce prohibitions: on the adequacy of security policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 54-61, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|