The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ICITST"( http://dblp.L3S.de/Venues/ICITST )

URL (DBLP): http://dblp.uni-trier.de/db/conf/icitst

Publication years (Num. hits)
2009 (148) 2010 (84) 2011 (141) 2012 (140) 2013 (115) 2014 (74) 2015 (77) 2016 (86) 2017 (105) 2020 (28)
Publication types (Num. hits)
inproceedings(988) proceedings(10)
Venues (Conferences, Journals, ...)
ICITST(998)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 998 publication records. Showing 998 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Bo Mi, Jianqiu Cao A novel key establishment scheme for wireless sensor networks based on complex network synchronization. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Kris Scott, Rachid Benlamri Context-aware real-time framework for local collaboration. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Daniel Caragata, Safwan El Assad, Charles A. Shoniregun, Galyna A. Akmayeva UMTS security: Enhancement of identification, authentication and key agreement protocols. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Muhammad Qasim Saeed, Colin D. Walter A Record Composition/Decomposition attack on the NDEF Signature Record Type Definition. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Sami Noponen, Jarno Salonen, Hanna-Miina Sihvonen, Taina A. Kurki Systematic literature review of virtual role. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1G. Hughes, Dhiya Al-Jumeily, Abir Jaafar Hussain Research, design and development review of the Cloud Computing Management System (CCMS). Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Yonglin Sun, Yongjun Wang, Xin Hu, Zhanrui Ren, Jie Liu A new perspective of network vulnerability analysis using Network Security Gradient. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Amr Sayed Abdel Fattah, Salwa H. El-Ramly, Magdy M. Ibrahim, Ahmed Abdel-Hafez Synchronization recovery of chaotic signal through imperfect channel using optimization approach. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Xian Zhang, Martin Leucker, Wei Dong 0006 An event pattern language for runtime monitoring based on AOP. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1S. Jeyalatha, B. Vijayakumar Design and implementation of a web structure mining algorithm using breadth first search strategy for academic search application. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Woo Ram Kim, Yoon Seok Chang A study on RFID code structure for traceability system of electric vehicle batteries. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Aymen Boudguiga, Maryline Laurent An EAP ID-based authentication method for wireless networks. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Hanno Hildmann, Sebastien Nicolas, Fabrice Saffre Demand-side management for air conditioning. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Ali Safari Mamaghani, Mohammad Reza Meybodi An application of Imperialist Competitive Algorithm to solve the quadratic assignment problem. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Michael Naseimo Daikpor, Oluwole Adegbenro Concurrent realization of the multiply-by-7 Elliptic Curve Scalar Multiplication algorithm. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Kassem Ahmad, Bassem Bakhache, Safwan El Assad, Daniel Caragata, Maryline Chetto Multicast security protocol over satellite DVB based on chaotic sequences. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Ramez Shamseldin Dynamically complex system using adaptive simulation for interconnected nodes. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Eduardo Rocha, Paulo Salvador 0001, António Manuel Duarte Nogueira A real-time traffic classification approach. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Ahmed B. Mahmood, Robert D. Dony Segmentation based encryption method for medical images. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Muna Abdulla Al Shehhi, Joonsang Baek, Chan Yeob Yeun The use of Boolean functions in stream ciphers. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Youssef Gahi, Mouhcine Guennoun, Zouhair Guennoun, Khalil El-Khatib Encrypted processes for oblivious data retrieval. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Jong-Hoon Hoon Lee, Jung-Tae Tae Kim, HeeKyung Lee, Eui-Hyun H. Paik Design and implementation of the Geo-Context Engine for semantic social media service. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Jane Saetent, Nattawut Vejkanchana, Suphamit Chittayasothorn A thin client application development using OCL and conceptual schema. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Hiroyuki Yoshimura Fingerprint templates with high recognition accuracy and high security generated by discrete fractional sine transform. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Salwa Belaqziz, Abdelaziz El Fazziki, Mohammed El Adnani, Michel Le Page An Agent-Based Modeling approach for decision-making in Gravity Irrigation Systems. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Mohammad Reza Sohizadeh Abyaneh On the privacy of two tag ownership transfer protocols for RFIDs. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Hassan Shakeri, Abbas Ghaemi Bafghi Propagation of trust and confidence using intervals. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Nitha Rachel Suresh, Suresh V. Mathew Security concerns for cloud computing in aircraft data networks. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Lezhen Ling, Junguo Liao Anonymous electronic voting protocol with traceability. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Soulaf Saab, Wassim Itani, Ayman I. Kayssi, Ali Chehab, Cesar Ghali Secure delay-tolerant communications in the presence of oppressive governments. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Jared D. DeMott, Richard J. Enbody, William F. Punch III Towards an automatic exploit pipeline. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Masoumeh Safkhani, Nasour Bagheri, Majid Naderi, Somitra Kumar Sanadhya Security analysis of LMAP++, an RFID authentication protocol. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Ramzi Bassil, Wissam El-Beaino, Ayman I. Kayssi, Ali Chehab A PUF-based ultra-lightweight mutual-authentication RFID protocol. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Léa D. Cot, Christian Bès Study of the robustness of an enhanced CSK system by using the Extended Kalman Filter. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Mahmoud Khonji, Youssef Iraqi, Andrew Jones 0002 Mitigation of spear phishing attacks: A Content-based Authorship Identification framework. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Umm-e Laila, Syed Zain Ali Shah, Nadia Ishaque Using Keystroke-Level Model to analyze IOS optimization techniques. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Waleed Halboob, Muhammad Abulaish, Khaled Alghathbar Quaternary privacy-levels preservation in computer forensics investigation process. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Arben Asllani, Amjad Ali Securing information systems in airports: A practical approach. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Martin Kuba Automated trust negotiation in identity federations using OWL-based abduction of missing credentials. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Hend Al Tair, Mohamed Jamal Zemerly, Mahmoud Al-Qutayri, Marcello Leida Pro-active multi-agent recommender system for travelers. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Ayman Mukaddam, Imad H. Elhajj Hop count variability. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Ghazi Ben Ayed, Solange Ghernaouti-Helie Privacy requirements specification for digital identity management systems implementation: Towards a digital society of privacy. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Khaled Salah 0001, M. Al-Saba, M. Akhdhor, O. Shaaban, M. I. Buhari Performance evaluation of popular Cloud IaaS providers. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Jarkko Ekberg, Jorma Ylinen, Pekka Loula Network behaviour anomaly detection using Holt-Winters algorithm. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Markus Jung, Georg Kienesberger, Wolfgang Granzer, Martin Unger, Wolfgang Kastner Privacy enabled web service access control using SAML and XACML for home automation gateways. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Hilal Houssain, Mohamad Badra, Turki F. Al-Somani Hardware implementations of Elliptic Curve Cryptography in Wireless Sensor Networks. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Daniele Fournier-Prunaret, Pascal Chargé, Laura Gardini Chaos generation from 1D or 2D circuits including switches. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Jung-Tae Tae Kim, Jong-Hoon Hoon Lee, HeeKyung Lee, Eui-Hyun H. Paik Location-based personalized social media service for the Smart Phone: Distributed social contents sharings. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1P. R. Lakshmi Eswari A process framework for securing an e-Learning ecosystem. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Pavel Lozhnikov, Oksana Chernikova Handwriting dynamics as a means of authentication. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1M. Bavafa, Zahra Taheri Hanjani, N. Navidi A survey on space-time & high-rate redundant. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Salem Benferhat, Khalid Bouriche, Mohamed Ouzarf Encoding default-based SELinux-security policy in Organization-Based Access Control Model. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Arianna Del Soldato, Pasquale Lazzareschi, Maurizio Martinelli, Giuseppe Vasarelli The use of detection systems to improve the quality of the Italian Public Administration. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Boustia Narhimene, Aïcha Mokhtari Temporal context in multilevel access control model. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Jumpei Arakawa, Koichi Sasada A decentralized access control mechanism using authorization certificate for distributed file systems. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Mahmood Salehi, Hamed Samavati, Mehdi Dehghan 0001 Performance assessment of OLSR protocol under routing attacks. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Theodoros Tzouramanis A robust watermarking scheme for relational databases. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Hun-lung Lim, Tai-Myoung Myoung Chung Performace evaluation of relative positioning based on low-cost GPS and VANET. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Hassan Noura 0001, Safwan El Assad, Calin Vladeanu, Daniel Caragata An efficient and secure SPN cryptosystem based on chaotic control parameters. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Nai-Wei Lo, Shiou-Huei Ruan, Tzong-Chen Wu Ownership transfer protocol for RFID objects using lightweight computing operators. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Xin Hu, Yonglin Sun, Yongjun Wang, Zhanrui Ren, Jie Liu Two algorithms for Network Security Gradient marking. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Farshad Rahimiasl, Reza Azmi SeKMAC: A secure model for key management and access control in cryptographic file system. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Mohamed B. Abdelhalim, Mohamed S. El-Mahallawy, M. Ayyad, Adel ElHennawy Implementation of a modified lightweight cryptographic TEA algorithm in RFID system. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Thomas Bosch, Brigitte Mathiak XSLT transformation generating OWL ontologies automatically based on XML Schemas. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Noura Al Ebri, Joonsang Baek, Chan Yeob Yeun Study on Secret Sharing Schemes (SSS) and their applications. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1René Lozi, Estelle Cherrier Noise-resisting ciphering based on a chaotic multi-stream pseudo-random number generator. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Annette Tolnai, Sebastiaan H. von Solms A Virtualized Environment Security (VES) model for a secure virtualized environment. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Mark E. Culverhouse, Bogdan V. Ghita, Paul L. Reynolds, Xingang Wang Optimising Quality of Service through the controlled aggregation of traffic. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Saeed Ezzati, Hamid Reaza Naji, Amir Chegini, Payam Habibimehr A new method of hardware firewall implementation on SOC. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Hisham Al-Assam, Harin Sellahewa, Sabah Jassim On security of multi-factor biometric authentication. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Paul T. Edelman, Michael J. Donahoo, David B. Sturgill Secure group communications for Delay-Tolerant Networks. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Muhammad Asif Habib Mutual exclusion and role inheritance affecting least privilege in RBAC. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Masoud Rezaei, Nafise Sadat Moosavi, Hamed Nemati, Reza Azmi TCvisor: A hypervisor level secure storage. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Robert E. Johnson III Survey of SCADA security challenges and potential attack vectors. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Shiva Nadi, Mohamadhosein Hussein Saraee, Mohamad Davarpanah Jazi A fuzzy recommender system for dynamic prediction of user's behavior. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Tristan Lavarack, Marijke Coetzee A Web Services security policy assistant. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Filip Krizka, Michal Krátký On the efficient indexing of ordered multidimensional tuples. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Usha Jayahkudy, Chong Eng Tan Link signal strength based path selection scheme for ad hoc networks. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Pieter Burghouwt, Marcel E. M. Spruit, Henk J. Sips Detection of botnet collusion by degree distribution of domains. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Mohssen M. Z. E. Mohammed, H. Anthony Chan, Neco Ventura, Mohsin Hashim, Eihab Bashier Fast and accurate detection for polymorphic worms. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Iftikhar Ahmad 0002, Azween Vitra Abdullah, Abdullah Sharaf Alghamdi Remote to Local attack detection using supervised neural network. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Khawla Alghafli 0001, Chan Yeob Yeun New authentication protocol for IP CAS of IPTV. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Areej Al-Wabil, Ebtisam Alabdulqader, Latifa Al-Abdulkarim, Nora Al-Twairesh Measuring the user experience of digital books with children: An eyetracking study of interaction with digital libraries. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Kyusuk Han, Hyeran Mun, Taeshik Shon Design of secure key agreement protocol for pairing in RF4CE. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Peter Chovanec, Michal Krátký, Jirí Walder Lossless R-tree compression using variable-length codes. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Mohammad Ahmadi Livani, Mahdi Abadi Distributed PCA-based anomaly detection in wireless sensor networks. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Yeojeong Yoon, Chanil Park, Pyung Kim, Seongoun Hwang, Hyunsoo Yoon An efficient identity-based proxy signcryption for secure broadcast. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Denis J. Reilly, Chris Wren, Tom Berry Cloud computing: Forensic challenges for law enforcement. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Hyeran Mun, Chan Yeob Yeun, Kyusuk Han, Byung-Ho Chung Enhancement of anonymous authentication scheme in wireless sensor network. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Katie Wood, Ella Pereira An investigation into cloud configuration and security. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Manar Iskandar, Noor Akma Mohd Salleh IT governance in e-commerce environment: Cases from airline industry. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Prakash S. Raghavendra, Shreya Roy Chowdhury, Srilekha Vedula Kameswari Comparative study of neural networks and k-means classification in web usage mining. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Ravi Bhushan Mishra, Bireshwar Dass Mazumdar Cognitive parameters based seller agent selection in B2C E-Commerce. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Dennis M. Lupiana, Fredrick Mtenzi, Ciaran O'Driscoll, Brendan O'Shea Strictly alphanumeric data: Improving privacy in smart environments. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Huseyin Kusetogullari, Amir Yavariabdi, Mark S. Leeson, Evor L. Hines Genetic algorithm based rainbow network flow optimization for multiple description coding in lossy network. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Emmanuel Hooper Strategic and intelligent smart grid systems engineering. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Pedro Peris-Lopez, Enrique San Millán, Jan C. A. van der Lubbe, Luis Entrena Cryptographically secure pseudo-random bit generator for RFID tags. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Vivek Pathak Combating web plagiarism and improving internet safety by authenticating web content. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Onyeka Emebo, Olawande J. Daramola, Charles Ayo A Grid-based e-learning model for Open Universities. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1David J. Lutz, Dominik Lamp, Patrick Mandic, Fabio Victora Hecht, Burkhard Stiller Charging of SAML-based federated VoIP services. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
Displaying result #701 - #800 of 998 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license