Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Bo Mi, Jianqiu Cao |
A novel key establishment scheme for wireless sensor networks based on complex network synchronization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 137-141, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Kris Scott, Rachid Benlamri |
Context-aware real-time framework for local collaboration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 531-535, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Daniel Caragata, Safwan El Assad, Charles A. Shoniregun, Galyna A. Akmayeva |
UMTS security: Enhancement of identification, authentication and key agreement protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 278-282, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Muhammad Qasim Saeed, Colin D. Walter |
A Record Composition/Decomposition attack on the NDEF Signature Record Type Definition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 283-287, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Sami Noponen, Jarno Salonen, Hanna-Miina Sihvonen, Taina A. Kurki |
Systematic literature review of virtual role. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 738-743, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | G. Hughes, Dhiya Al-Jumeily, Abir Jaafar Hussain |
Research, design and development review of the Cloud Computing Management System (CCMS). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 128-131, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Yonglin Sun, Yongjun Wang, Xin Hu, Zhanrui Ren, Jie Liu |
A new perspective of network vulnerability analysis using Network Security Gradient. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 159-163, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Amr Sayed Abdel Fattah, Salwa H. El-Ramly, Magdy M. Ibrahim, Ahmed Abdel-Hafez |
Synchronization recovery of chaotic signal through imperfect channel using optimization approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 73-78, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Xian Zhang, Martin Leucker, Wei Dong 0006 |
An event pattern language for runtime monitoring based on AOP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 744-751, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | S. Jeyalatha, B. Vijayakumar |
Design and implementation of a web structure mining algorithm using breadth first search strategy for academic search application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 648-654, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Woo Ram Kim, Yoon Seok Chang |
A study on RFID code structure for traceability system of electric vehicle batteries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 490-494, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Aymen Boudguiga, Maryline Laurent |
An EAP ID-based authentication method for wireless networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 232-239, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Hanno Hildmann, Sebastien Nicolas, Fabrice Saffre |
Demand-side management for air conditioning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 519-524, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Ali Safari Mamaghani, Mohammad Reza Meybodi |
An application of Imperialist Competitive Algorithm to solve the quadratic assignment problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 562-565, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Michael Naseimo Daikpor, Oluwole Adegbenro |
Concurrent realization of the multiply-by-7 Elliptic Curve Scalar Multiplication algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 797-804, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Kassem Ahmad, Bassem Bakhache, Safwan El Assad, Daniel Caragata, Maryline Chetto |
Multicast security protocol over satellite DVB based on chaotic sequences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 97-102, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Ramez Shamseldin |
Dynamically complex system using adaptive simulation for interconnected nodes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 266-273, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Eduardo Rocha, Paulo Salvador 0001, António Manuel Duarte Nogueira |
A real-time traffic classification approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 620-626, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Ahmed B. Mahmood, Robert D. Dony |
Segmentation based encryption method for medical images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 596-601, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Muna Abdulla Al Shehhi, Joonsang Baek, Chan Yeob Yeun |
The use of Boolean functions in stream ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 29-33, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Youssef Gahi, Mouhcine Guennoun, Zouhair Guennoun, Khalil El-Khatib |
Encrypted processes for oblivious data retrieval. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 514-518, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Jong-Hoon Hoon Lee, Jung-Tae Tae Kim, HeeKyung Lee, Eui-Hyun H. Paik |
Design and implementation of the Geo-Context Engine for semantic social media service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 383-387, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Jane Saetent, Nattawut Vejkanchana, Suphamit Chittayasothorn |
A thin client application development using OCL and conceptual schema. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 260-265, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Hiroyuki Yoshimura |
Fingerprint templates with high recognition accuracy and high security generated by discrete fractional sine transform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 185-190, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Salwa Belaqziz, Abdelaziz El Fazziki, Mohammed El Adnani, Michel Le Page |
An Agent-Based Modeling approach for decision-making in Gravity Irrigation Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 673-680, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Mohammad Reza Sohizadeh Abyaneh |
On the privacy of two tag ownership transfer protocols for RFIDs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 683-688, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Hassan Shakeri, Abbas Ghaemi Bafghi |
Propagation of trust and confidence using intervals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 436-441, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Nitha Rachel Suresh, Suresh V. Mathew |
Security concerns for cloud computing in aircraft data networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 132-136, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Lezhen Ling, Junguo Liao |
Anonymous electronic voting protocol with traceability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 59-66, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Soulaf Saab, Wassim Itani, Ayman I. Kayssi, Ali Chehab, Cesar Ghali |
Secure delay-tolerant communications in the presence of oppressive governments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 302-307, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Jared D. DeMott, Richard J. Enbody, William F. Punch III |
Towards an automatic exploit pipeline. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 323-329, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Masoumeh Safkhani, Nasour Bagheri, Majid Naderi, Somitra Kumar Sanadhya |
Security analysis of LMAP++, an RFID authentication protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 689-694, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Ramzi Bassil, Wissam El-Beaino, Ayman I. Kayssi, Ali Chehab |
A PUF-based ultra-lightweight mutual-authentication RFID protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 495-499, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Léa D. Cot, Christian Bès |
Study of the robustness of an enhanced CSK system by using the Extended Kalman Filter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 202-207, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Mahmoud Khonji, Youssef Iraqi, Andrew Jones 0002 |
Mitigation of spear phishing attacks: A Content-based Authorship Identification framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 416-421, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Umm-e Laila, Syed Zain Ali Shah, Nadia Ishaque |
Using Keystroke-Level Model to analyze IOS optimization techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 373-377, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Waleed Halboob, Muhammad Abulaish, Khaled Alghathbar |
Quaternary privacy-levels preservation in computer forensics investigation process. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 777-782, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Arben Asllani, Amjad Ali |
Securing information systems in airports: A practical approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 314-318, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Martin Kuba |
Automated trust negotiation in identity federations using OWL-based abduction of missing credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 164-169, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Hend Al Tair, Mohamed Jamal Zemerly, Mahmoud Al-Qutayri, Marcello Leida |
Pro-active multi-agent recommender system for travelers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 466-471, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Ayman Mukaddam, Imad H. Elhajj |
Hop count variability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 240-244, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Ghazi Ben Ayed, Solange Ghernaouti-Helie |
Privacy requirements specification for digital identity management systems implementation: Towards a digital society of privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 602-607, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Khaled Salah 0001, M. Al-Saba, M. Akhdhor, O. Shaaban, M. I. Buhari |
Performance evaluation of popular Cloud IaaS providers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 345-349, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Jarkko Ekberg, Jorma Ylinen, Pekka Loula |
Network behaviour anomaly detection using Holt-Winters algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 627-631, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Markus Jung, Georg Kienesberger, Wolfgang Granzer, Martin Unger, Wolfgang Kastner |
Privacy enabled web service access control using SAML and XACML for home automation gateways. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 584-591, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Hilal Houssain, Mohamad Badra, Turki F. Al-Somani |
Hardware implementations of Elliptic Curve Cryptography in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 1-6, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Daniele Fournier-Prunaret, Pascal Chargé, Laura Gardini |
Chaos generation from 1D or 2D circuits including switches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 86-90, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Jung-Tae Tae Kim, Jong-Hoon Hoon Lee, HeeKyung Lee, Eui-Hyun H. Paik |
Location-based personalized social media service for the Smart Phone: Distributed social contents sharings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 655-659, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | P. R. Lakshmi Eswari |
A process framework for securing an e-Learning ecosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 403-407, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Pavel Lozhnikov, Oksana Chernikova |
Handwriting dynamics as a means of authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 176-179, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | M. Bavafa, Zahra Taheri Hanjani, N. Navidi |
A survey on space-time & high-rate redundant. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 154-158, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Salem Benferhat, Khalid Bouriche, Mohamed Ouzarf |
Encoding default-based SELinux-security policy in Organization-Based Access Control Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 608-613, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Arianna Del Soldato, Pasquale Lazzareschi, Maurizio Martinelli, Giuseppe Vasarelli |
The use of detection systems to improve the quality of the Italian Public Administration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 724-725, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Boustia Narhimene, Aïcha Mokhtari |
Temporal context in multilevel access control model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 758-763, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Jumpei Arakawa, Koichi Sasada |
A decentralized access control mechanism using authorization certificate for distributed file systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 148-153, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Mahmood Salehi, Hamed Samavati, Mehdi Dehghan 0001 |
Performance assessment of OLSR protocol under routing attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 791-796, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Theodoros Tzouramanis |
A robust watermarking scheme for relational databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 783-790, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Hun-lung Lim, Tai-Myoung Myoung Chung |
Performace evaluation of relative positioning based on low-cost GPS and VANET. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 542-543, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Hassan Noura 0001, Safwan El Assad, Calin Vladeanu, Daniel Caragata |
An efficient and secure SPN cryptosystem based on chaotic control parameters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 226-231, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Nai-Wei Lo, Shiou-Huei Ruan, Tzong-Chen Wu |
Ownership transfer protocol for RFID objects using lightweight computing operators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 484-489, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Xin Hu, Yonglin Sun, Yongjun Wang, Zhanrui Ren, Jie Liu |
Two algorithms for Network Security Gradient marking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 142-147, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Farshad Rahimiasl, Reza Azmi |
SeKMAC: A secure model for key management and access control in cryptographic file system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 732-737, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Mohamed B. Abdelhalim, Mohamed S. El-Mahallawy, M. Ayyad, Adel ElHennawy |
Implementation of a modified lightweight cryptographic TEA algorithm in RFID system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 509-513, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Thomas Bosch, Brigitte Mathiak |
XSLT transformation generating OWL ontologies automatically based on XML Schemas. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 660-667, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Noura Al Ebri, Joonsang Baek, Chan Yeob Yeun |
Study on Secret Sharing Schemes (SSS) and their applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 40-45, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | René Lozi, Estelle Cherrier |
Noise-resisting ciphering based on a chaotic multi-stream pseudo-random number generator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 91-96, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Annette Tolnai, Sebastiaan H. von Solms |
A Virtualized Environment Security (VES) model for a secure virtualized environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 5th International Conference for Internet Technology and Secured Transactions, ICITST 2010, London, United Kingdom, November 8-10, 2010, pp. 1-6, 2010, IEEE, 978-1-4244-8862-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
1 | Mark E. Culverhouse, Bogdan V. Ghita, Paul L. Reynolds, Xingang Wang |
Optimising Quality of Service through the controlled aggregation of traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 5th International Conference for Internet Technology and Secured Transactions, ICITST 2010, London, United Kingdom, November 8-10, 2010, pp. 1-7, 2010, IEEE, 978-1-4244-8862-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
1 | Saeed Ezzati, Hamid Reaza Naji, Amir Chegini, Payam Habibimehr |
A new method of hardware firewall implementation on SOC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 5th International Conference for Internet Technology and Secured Transactions, ICITST 2010, London, United Kingdom, November 8-10, 2010, pp. 1-7, 2010, IEEE, 978-1-4244-8862-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
1 | Hisham Al-Assam, Harin Sellahewa, Sabah Jassim |
On security of multi-factor biometric authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 5th International Conference for Internet Technology and Secured Transactions, ICITST 2010, London, United Kingdom, November 8-10, 2010, pp. 1-6, 2010, IEEE, 978-1-4244-8862-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
1 | Paul T. Edelman, Michael J. Donahoo, David B. Sturgill |
Secure group communications for Delay-Tolerant Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 5th International Conference for Internet Technology and Secured Transactions, ICITST 2010, London, United Kingdom, November 8-10, 2010, pp. 1-8, 2010, IEEE, 978-1-4244-8862-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
1 | Muhammad Asif Habib |
Mutual exclusion and role inheritance affecting least privilege in RBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 5th International Conference for Internet Technology and Secured Transactions, ICITST 2010, London, United Kingdom, November 8-10, 2010, pp. 1-6, 2010, IEEE, 978-1-4244-8862-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
1 | Masoud Rezaei, Nafise Sadat Moosavi, Hamed Nemati, Reza Azmi |
TCvisor: A hypervisor level secure storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 5th International Conference for Internet Technology and Secured Transactions, ICITST 2010, London, United Kingdom, November 8-10, 2010, pp. 1-9, 2010, IEEE, 978-1-4244-8862-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
1 | Robert E. Johnson III |
Survey of SCADA security challenges and potential attack vectors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 5th International Conference for Internet Technology and Secured Transactions, ICITST 2010, London, United Kingdom, November 8-10, 2010, pp. 1-5, 2010, IEEE, 978-1-4244-8862-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
1 | Shiva Nadi, Mohamadhosein Hussein Saraee, Mohamad Davarpanah Jazi |
A fuzzy recommender system for dynamic prediction of user's behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 5th International Conference for Internet Technology and Secured Transactions, ICITST 2010, London, United Kingdom, November 8-10, 2010, pp. 1-5, 2010, IEEE, 978-1-4244-8862-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
1 | Tristan Lavarack, Marijke Coetzee |
A Web Services security policy assistant. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 5th International Conference for Internet Technology and Secured Transactions, ICITST 2010, London, United Kingdom, November 8-10, 2010, pp. 1-6, 2010, IEEE, 978-1-4244-8862-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
1 | Filip Krizka, Michal Krátký |
On the efficient indexing of ordered multidimensional tuples. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 5th International Conference for Internet Technology and Secured Transactions, ICITST 2010, London, United Kingdom, November 8-10, 2010, pp. 1-8, 2010, IEEE, 978-1-4244-8862-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
1 | Usha Jayahkudy, Chong Eng Tan |
Link signal strength based path selection scheme for ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 5th International Conference for Internet Technology and Secured Transactions, ICITST 2010, London, United Kingdom, November 8-10, 2010, pp. 1-6, 2010, IEEE, 978-1-4244-8862-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
1 | Pieter Burghouwt, Marcel E. M. Spruit, Henk J. Sips |
Detection of botnet collusion by degree distribution of domains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 5th International Conference for Internet Technology and Secured Transactions, ICITST 2010, London, United Kingdom, November 8-10, 2010, pp. 1-8, 2010, IEEE, 978-1-4244-8862-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
1 | Mohssen M. Z. E. Mohammed, H. Anthony Chan, Neco Ventura, Mohsin Hashim, Eihab Bashier |
Fast and accurate detection for polymorphic worms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 5th International Conference for Internet Technology and Secured Transactions, ICITST 2010, London, United Kingdom, November 8-10, 2010, pp. 1-6, 2010, IEEE, 978-1-4244-8862-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
1 | Iftikhar Ahmad 0002, Azween Vitra Abdullah, Abdullah Sharaf Alghamdi |
Remote to Local attack detection using supervised neural network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 5th International Conference for Internet Technology and Secured Transactions, ICITST 2010, London, United Kingdom, November 8-10, 2010, pp. 1-6, 2010, IEEE, 978-1-4244-8862-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
1 | Khawla Alghafli 0001, Chan Yeob Yeun |
New authentication protocol for IP CAS of IPTV. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 5th International Conference for Internet Technology and Secured Transactions, ICITST 2010, London, United Kingdom, November 8-10, 2010, pp. 1-6, 2010, IEEE, 978-1-4244-8862-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
1 | Areej Al-Wabil, Ebtisam Alabdulqader, Latifa Al-Abdulkarim, Nora Al-Twairesh |
Measuring the user experience of digital books with children: An eyetracking study of interaction with digital libraries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 5th International Conference for Internet Technology and Secured Transactions, ICITST 2010, London, United Kingdom, November 8-10, 2010, pp. 1-7, 2010, IEEE, 978-1-4244-8862-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
1 | Kyusuk Han, Hyeran Mun, Taeshik Shon |
Design of secure key agreement protocol for pairing in RF4CE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 5th International Conference for Internet Technology and Secured Transactions, ICITST 2010, London, United Kingdom, November 8-10, 2010, pp. 1-5, 2010, IEEE, 978-1-4244-8862-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
1 | Peter Chovanec, Michal Krátký, Jirí Walder |
Lossless R-tree compression using variable-length codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 5th International Conference for Internet Technology and Secured Transactions, ICITST 2010, London, United Kingdom, November 8-10, 2010, pp. 1-8, 2010, IEEE, 978-1-4244-8862-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
1 | Mohammad Ahmadi Livani, Mahdi Abadi |
Distributed PCA-based anomaly detection in wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 5th International Conference for Internet Technology and Secured Transactions, ICITST 2010, London, United Kingdom, November 8-10, 2010, pp. 1-8, 2010, IEEE, 978-1-4244-8862-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
1 | Yeojeong Yoon, Chanil Park, Pyung Kim, Seongoun Hwang, Hyunsoo Yoon |
An efficient identity-based proxy signcryption for secure broadcast. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 5th International Conference for Internet Technology and Secured Transactions, ICITST 2010, London, United Kingdom, November 8-10, 2010, pp. 1-6, 2010, IEEE, 978-1-4244-8862-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
1 | Denis J. Reilly, Chris Wren, Tom Berry |
Cloud computing: Forensic challenges for law enforcement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 5th International Conference for Internet Technology and Secured Transactions, ICITST 2010, London, United Kingdom, November 8-10, 2010, pp. 1-7, 2010, IEEE, 978-1-4244-8862-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
1 | Hyeran Mun, Chan Yeob Yeun, Kyusuk Han, Byung-Ho Chung |
Enhancement of anonymous authentication scheme in wireless sensor network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 5th International Conference for Internet Technology and Secured Transactions, ICITST 2010, London, United Kingdom, November 8-10, 2010, pp. 1-4, 2010, IEEE, 978-1-4244-8862-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
1 | Katie Wood, Ella Pereira |
An investigation into cloud configuration and security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 5th International Conference for Internet Technology and Secured Transactions, ICITST 2010, London, United Kingdom, November 8-10, 2010, pp. 1-6, 2010, IEEE, 978-1-4244-8862-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
1 | Manar Iskandar, Noor Akma Mohd Salleh |
IT governance in e-commerce environment: Cases from airline industry. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 5th International Conference for Internet Technology and Secured Transactions, ICITST 2010, London, United Kingdom, November 8-10, 2010, pp. 1-6, 2010, IEEE, 978-1-4244-8862-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
1 | Prakash S. Raghavendra, Shreya Roy Chowdhury, Srilekha Vedula Kameswari |
Comparative study of neural networks and k-means classification in web usage mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 5th International Conference for Internet Technology and Secured Transactions, ICITST 2010, London, United Kingdom, November 8-10, 2010, pp. 1-7, 2010, IEEE, 978-1-4244-8862-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
1 | Ravi Bhushan Mishra, Bireshwar Dass Mazumdar |
Cognitive parameters based seller agent selection in B2C E-Commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 5th International Conference for Internet Technology and Secured Transactions, ICITST 2010, London, United Kingdom, November 8-10, 2010, pp. 1-3, 2010, IEEE, 978-1-4244-8862-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
1 | Dennis M. Lupiana, Fredrick Mtenzi, Ciaran O'Driscoll, Brendan O'Shea |
Strictly alphanumeric data: Improving privacy in smart environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 5th International Conference for Internet Technology and Secured Transactions, ICITST 2010, London, United Kingdom, November 8-10, 2010, pp. 1-3, 2010, IEEE, 978-1-4244-8862-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
1 | Huseyin Kusetogullari, Amir Yavariabdi, Mark S. Leeson, Evor L. Hines |
Genetic algorithm based rainbow network flow optimization for multiple description coding in lossy network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 5th International Conference for Internet Technology and Secured Transactions, ICITST 2010, London, United Kingdom, November 8-10, 2010, pp. 1-6, 2010, IEEE, 978-1-4244-8862-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
1 | Emmanuel Hooper |
Strategic and intelligent smart grid systems engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 5th International Conference for Internet Technology and Secured Transactions, ICITST 2010, London, United Kingdom, November 8-10, 2010, pp. 1-6, 2010, IEEE, 978-1-4244-8862-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
1 | Pedro Peris-Lopez, Enrique San Millán, Jan C. A. van der Lubbe, Luis Entrena |
Cryptographically secure pseudo-random bit generator for RFID tags. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 5th International Conference for Internet Technology and Secured Transactions, ICITST 2010, London, United Kingdom, November 8-10, 2010, pp. 1-6, 2010, IEEE, 978-1-4244-8862-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
1 | Vivek Pathak |
Combating web plagiarism and improving internet safety by authenticating web content. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 5th International Conference for Internet Technology and Secured Transactions, ICITST 2010, London, United Kingdom, November 8-10, 2010, pp. 1-6, 2010, IEEE, 978-1-4244-8862-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
1 | Onyeka Emebo, Olawande J. Daramola, Charles Ayo |
A Grid-based e-learning model for Open Universities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 5th International Conference for Internet Technology and Secured Transactions, ICITST 2010, London, United Kingdom, November 8-10, 2010, pp. 1-4, 2010, IEEE, 978-1-4244-8862-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
1 | David J. Lutz, Dominik Lamp, Patrick Mandic, Fabio Victora Hecht, Burkhard Stiller |
Charging of SAML-based federated VoIP services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 5th International Conference for Internet Technology and Secured Transactions, ICITST 2010, London, United Kingdom, November 8-10, 2010, pp. 1-8, 2010, IEEE, 978-1-4244-8862-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|