Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Bo Mi, Jianqiu Cao |
A novel key establishment scheme for wireless sensor networks based on complex network synchronization. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Kris Scott, Rachid Benlamri |
Context-aware real-time framework for local collaboration. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Daniel Caragata, Safwan El Assad, Charles A. Shoniregun, Galyna A. Akmayeva |
UMTS security: Enhancement of identification, authentication and key agreement protocols. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Muhammad Qasim Saeed, Colin D. Walter |
A Record Composition/Decomposition attack on the NDEF Signature Record Type Definition. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Sami Noponen, Jarno Salonen, Hanna-Miina Sihvonen, Taina A. Kurki |
Systematic literature review of virtual role. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | G. Hughes, Dhiya Al-Jumeily, Abir Jaafar Hussain |
Research, design and development review of the Cloud Computing Management System (CCMS). |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Yonglin Sun, Yongjun Wang, Xin Hu, Zhanrui Ren, Jie Liu |
A new perspective of network vulnerability analysis using Network Security Gradient. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Amr Sayed Abdel Fattah, Salwa H. El-Ramly, Magdy M. Ibrahim, Ahmed Abdel-Hafez |
Synchronization recovery of chaotic signal through imperfect channel using optimization approach. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Xian Zhang, Martin Leucker, Wei Dong 0006 |
An event pattern language for runtime monitoring based on AOP. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | S. Jeyalatha, B. Vijayakumar |
Design and implementation of a web structure mining algorithm using breadth first search strategy for academic search application. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Woo Ram Kim, Yoon Seok Chang |
A study on RFID code structure for traceability system of electric vehicle batteries. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Aymen Boudguiga, Maryline Laurent |
An EAP ID-based authentication method for wireless networks. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Hanno Hildmann, Sebastien Nicolas, Fabrice Saffre |
Demand-side management for air conditioning. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Ali Safari Mamaghani, Mohammad Reza Meybodi |
An application of Imperialist Competitive Algorithm to solve the quadratic assignment problem. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Michael Naseimo Daikpor, Oluwole Adegbenro |
Concurrent realization of the multiply-by-7 Elliptic Curve Scalar Multiplication algorithm. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Kassem Ahmad, Bassem Bakhache, Safwan El Assad, Daniel Caragata, Maryline Chetto |
Multicast security protocol over satellite DVB based on chaotic sequences. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Ramez Shamseldin |
Dynamically complex system using adaptive simulation for interconnected nodes. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Eduardo Rocha, Paulo Salvador 0001, António Manuel Duarte Nogueira |
A real-time traffic classification approach. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Ahmed B. Mahmood, Robert D. Dony |
Segmentation based encryption method for medical images. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Muna Abdulla Al Shehhi, Joonsang Baek, Chan Yeob Yeun |
The use of Boolean functions in stream ciphers. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Youssef Gahi, Mouhcine Guennoun, Zouhair Guennoun, Khalil El-Khatib |
Encrypted processes for oblivious data retrieval. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Jong-Hoon Hoon Lee, Jung-Tae Tae Kim, HeeKyung Lee, Eui-Hyun H. Paik |
Design and implementation of the Geo-Context Engine for semantic social media service. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Jane Saetent, Nattawut Vejkanchana, Suphamit Chittayasothorn |
A thin client application development using OCL and conceptual schema. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Hiroyuki Yoshimura |
Fingerprint templates with high recognition accuracy and high security generated by discrete fractional sine transform. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Salwa Belaqziz, Abdelaziz El Fazziki, Mohammed El Adnani, Michel Le Page |
An Agent-Based Modeling approach for decision-making in Gravity Irrigation Systems. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Mohammad Reza Sohizadeh Abyaneh |
On the privacy of two tag ownership transfer protocols for RFIDs. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Hassan Shakeri, Abbas Ghaemi Bafghi |
Propagation of trust and confidence using intervals. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Nitha Rachel Suresh, Suresh V. Mathew |
Security concerns for cloud computing in aircraft data networks. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Lezhen Ling, Junguo Liao |
Anonymous electronic voting protocol with traceability. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Soulaf Saab, Wassim Itani, Ayman I. Kayssi, Ali Chehab, Cesar Ghali |
Secure delay-tolerant communications in the presence of oppressive governments. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Jared D. DeMott, Richard J. Enbody, William F. Punch III |
Towards an automatic exploit pipeline. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Masoumeh Safkhani, Nasour Bagheri, Majid Naderi, Somitra Kumar Sanadhya |
Security analysis of LMAP++, an RFID authentication protocol. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Ramzi Bassil, Wissam El-Beaino, Ayman I. Kayssi, Ali Chehab |
A PUF-based ultra-lightweight mutual-authentication RFID protocol. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Léa D. Cot, Christian Bès |
Study of the robustness of an enhanced CSK system by using the Extended Kalman Filter. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Mahmoud Khonji, Youssef Iraqi, Andrew Jones 0002 |
Mitigation of spear phishing attacks: A Content-based Authorship Identification framework. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Umm-e Laila, Syed Zain Ali Shah, Nadia Ishaque |
Using Keystroke-Level Model to analyze IOS optimization techniques. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Waleed Halboob, Muhammad Abulaish, Khaled Alghathbar |
Quaternary privacy-levels preservation in computer forensics investigation process. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Arben Asllani, Amjad Ali |
Securing information systems in airports: A practical approach. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Martin Kuba |
Automated trust negotiation in identity federations using OWL-based abduction of missing credentials. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Hend Al Tair, Mohamed Jamal Zemerly, Mahmoud Al-Qutayri, Marcello Leida |
Pro-active multi-agent recommender system for travelers. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Ayman Mukaddam, Imad H. Elhajj |
Hop count variability. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Ghazi Ben Ayed, Solange Ghernaouti-Helie |
Privacy requirements specification for digital identity management systems implementation: Towards a digital society of privacy. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Khaled Salah 0001, M. Al-Saba, M. Akhdhor, O. Shaaban, M. I. Buhari |
Performance evaluation of popular Cloud IaaS providers. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Jarkko Ekberg, Jorma Ylinen, Pekka Loula |
Network behaviour anomaly detection using Holt-Winters algorithm. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Markus Jung, Georg Kienesberger, Wolfgang Granzer, Martin Unger, Wolfgang Kastner |
Privacy enabled web service access control using SAML and XACML for home automation gateways. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Hilal Houssain, Mohamad Badra, Turki F. Al-Somani |
Hardware implementations of Elliptic Curve Cryptography in Wireless Sensor Networks. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Daniele Fournier-Prunaret, Pascal Chargé, Laura Gardini |
Chaos generation from 1D or 2D circuits including switches. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Jung-Tae Tae Kim, Jong-Hoon Hoon Lee, HeeKyung Lee, Eui-Hyun H. Paik |
Location-based personalized social media service for the Smart Phone: Distributed social contents sharings. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | P. R. Lakshmi Eswari |
A process framework for securing an e-Learning ecosystem. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Pavel Lozhnikov, Oksana Chernikova |
Handwriting dynamics as a means of authentication. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | M. Bavafa, Zahra Taheri Hanjani, N. Navidi |
A survey on space-time & high-rate redundant. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Salem Benferhat, Khalid Bouriche, Mohamed Ouzarf |
Encoding default-based SELinux-security policy in Organization-Based Access Control Model. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Arianna Del Soldato, Pasquale Lazzareschi, Maurizio Martinelli, Giuseppe Vasarelli |
The use of detection systems to improve the quality of the Italian Public Administration. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Boustia Narhimene, Aïcha Mokhtari |
Temporal context in multilevel access control model. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Jumpei Arakawa, Koichi Sasada |
A decentralized access control mechanism using authorization certificate for distributed file systems. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Mahmood Salehi, Hamed Samavati, Mehdi Dehghan 0001 |
Performance assessment of OLSR protocol under routing attacks. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Theodoros Tzouramanis |
A robust watermarking scheme for relational databases. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Hun-lung Lim, Tai-Myoung Myoung Chung |
Performace evaluation of relative positioning based on low-cost GPS and VANET. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Hassan Noura 0001, Safwan El Assad, Calin Vladeanu, Daniel Caragata |
An efficient and secure SPN cryptosystem based on chaotic control parameters. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Nai-Wei Lo, Shiou-Huei Ruan, Tzong-Chen Wu |
Ownership transfer protocol for RFID objects using lightweight computing operators. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Xin Hu, Yonglin Sun, Yongjun Wang, Zhanrui Ren, Jie Liu |
Two algorithms for Network Security Gradient marking. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Farshad Rahimiasl, Reza Azmi |
SeKMAC: A secure model for key management and access control in cryptographic file system. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Mohamed B. Abdelhalim, Mohamed S. El-Mahallawy, M. Ayyad, Adel ElHennawy |
Implementation of a modified lightweight cryptographic TEA algorithm in RFID system. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Thomas Bosch, Brigitte Mathiak |
XSLT transformation generating OWL ontologies automatically based on XML Schemas. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Noura Al Ebri, Joonsang Baek, Chan Yeob Yeun |
Study on Secret Sharing Schemes (SSS) and their applications. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | René Lozi, Estelle Cherrier |
Noise-resisting ciphering based on a chaotic multi-stream pseudo-random number generator. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Annette Tolnai, Sebastiaan H. von Solms |
A Virtualized Environment Security (VES) model for a secure virtualized environment. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Mark E. Culverhouse, Bogdan V. Ghita, Paul L. Reynolds, Xingang Wang |
Optimising Quality of Service through the controlled aggregation of traffic. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Saeed Ezzati, Hamid Reaza Naji, Amir Chegini, Payam Habibimehr |
A new method of hardware firewall implementation on SOC. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Hisham Al-Assam, Harin Sellahewa, Sabah Jassim |
On security of multi-factor biometric authentication. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Paul T. Edelman, Michael J. Donahoo, David B. Sturgill |
Secure group communications for Delay-Tolerant Networks. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Muhammad Asif Habib |
Mutual exclusion and role inheritance affecting least privilege in RBAC. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Masoud Rezaei, Nafise Sadat Moosavi, Hamed Nemati, Reza Azmi |
TCvisor: A hypervisor level secure storage. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Robert E. Johnson III |
Survey of SCADA security challenges and potential attack vectors. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Shiva Nadi, Mohamadhosein Hussein Saraee, Mohamad Davarpanah Jazi |
A fuzzy recommender system for dynamic prediction of user's behavior. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Tristan Lavarack, Marijke Coetzee |
A Web Services security policy assistant. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Filip Krizka, Michal Krátký |
On the efficient indexing of ordered multidimensional tuples. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Usha Jayahkudy, Chong Eng Tan |
Link signal strength based path selection scheme for ad hoc networks. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Pieter Burghouwt, Marcel E. M. Spruit, Henk J. Sips |
Detection of botnet collusion by degree distribution of domains. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Mohssen M. Z. E. Mohammed, H. Anthony Chan, Neco Ventura, Mohsin Hashim, Eihab Bashier |
Fast and accurate detection for polymorphic worms. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Iftikhar Ahmad 0002, Azween Vitra Abdullah, Abdullah Sharaf Alghamdi |
Remote to Local attack detection using supervised neural network. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Khawla Alghafli 0001, Chan Yeob Yeun |
New authentication protocol for IP CAS of IPTV. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Areej Al-Wabil, Ebtisam Alabdulqader, Latifa Al-Abdulkarim, Nora Al-Twairesh |
Measuring the user experience of digital books with children: An eyetracking study of interaction with digital libraries. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Kyusuk Han, Hyeran Mun, Taeshik Shon |
Design of secure key agreement protocol for pairing in RF4CE. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Peter Chovanec, Michal Krátký, Jirí Walder |
Lossless R-tree compression using variable-length codes. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Mohammad Ahmadi Livani, Mahdi Abadi |
Distributed PCA-based anomaly detection in wireless sensor networks. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Yeojeong Yoon, Chanil Park, Pyung Kim, Seongoun Hwang, Hyunsoo Yoon |
An efficient identity-based proxy signcryption for secure broadcast. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Denis J. Reilly, Chris Wren, Tom Berry |
Cloud computing: Forensic challenges for law enforcement. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Hyeran Mun, Chan Yeob Yeun, Kyusuk Han, Byung-Ho Chung |
Enhancement of anonymous authentication scheme in wireless sensor network. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Katie Wood, Ella Pereira |
An investigation into cloud configuration and security. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Manar Iskandar, Noor Akma Mohd Salleh |
IT governance in e-commerce environment: Cases from airline industry. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Prakash S. Raghavendra, Shreya Roy Chowdhury, Srilekha Vedula Kameswari |
Comparative study of neural networks and k-means classification in web usage mining. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Ravi Bhushan Mishra, Bireshwar Dass Mazumdar |
Cognitive parameters based seller agent selection in B2C E-Commerce. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Dennis M. Lupiana, Fredrick Mtenzi, Ciaran O'Driscoll, Brendan O'Shea |
Strictly alphanumeric data: Improving privacy in smart environments. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Huseyin Kusetogullari, Amir Yavariabdi, Mark S. Leeson, Evor L. Hines |
Genetic algorithm based rainbow network flow optimization for multiple description coding in lossy network. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Emmanuel Hooper |
Strategic and intelligent smart grid systems engineering. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Pedro Peris-Lopez, Enrique San Millán, Jan C. A. van der Lubbe, Luis Entrena |
Cryptographically secure pseudo-random bit generator for RFID tags. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Vivek Pathak |
Combating web plagiarism and improving internet safety by authenticating web content. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Onyeka Emebo, Olawande J. Daramola, Charles Ayo |
A Grid-based e-learning model for Open Universities. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | David J. Lutz, Dominik Lamp, Patrick Mandic, Fabio Victora Hecht, Burkhard Stiller |
Charging of SAML-based federated VoIP services. |
ICITST |
2010 |
DBLP BibTeX RDF |
|