Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Guenther Starnberger, Lorenz Froihofer, Karl M. Göschka |
Distributed timestamping with smart cards using efficient overlay routing. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Pradheepkumar Singaravelu, Shekhar Verma |
Viability of multivariate cryptosystems for WSN. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | P. Vcelck, Jana Klecková, Vladimir Rohan |
Cerebrovascular diseases research based on heterogeneous medical data mining and knowledge base. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Mohammed Alzomai, Bander AlFayyadh, Audun Jøsang |
Display security for online transactions: SMS-based authentication scheme. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Zeeshan Shafi Khan, Nabila Akram, Khaled Alghathbar, Muhammad Sher, Rashid Mehmood |
Secure single packet IP Traceback mechanism to identify the source. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Maximilian Ronniger, Florian Fankhauser, Christian Schanes, Thomas Grechenig |
A robust and flexible test environment for VoIP security tests. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Fadi A. Aloul |
Information security awareness in UAE: A survey paper. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Dang Nguyen Duc, Kwangjo Kim, Chan Yeob Yeun |
Reconsidering Ryu-Takagi RFID authentication protocol. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Abdelhaq Belkadi, Abdelaziz El Fazziki, Ait Ouahman Abdallah, Ibourk Aomar |
Toward an agent based approach for decisional systems modeling. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Hanunah Othman, Habibah Hashim, Jamalul-lail Ab Manan |
A conceptual framework providing Direct Anonymous Attestation (DAA) protocol in trusted location-based services (LBS). |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Conor Mc Manamon, Fredrick Mtenzi |
Defending privacy: The development and deployment of a darknet. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Vasaki Ponnusamy, Azween Vitra Abdullah |
A bio-inspired framework for wireless sensor network using mobile sensors. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Boustia Narhimene, Aïcha Mokhtari |
A contextual multilevel access control model with default and exception description logic. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Gregory Epiphaniou, Carsten Maple, Paul Sant, Peter Norrington |
The effects of encryption on VoIP streams under the code-excited linear prediction coder G.729. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Elena Castro Galán, Almudena Alcaide, Agustín Orfila, Jorge Blasco Alís |
A multi-agent scanner to detect stored-XSS vulnerabilities. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Mete Akgün, Ali Özhan Gürel, Mehmet Ufuk Çaglayan |
Attacks to a lightweight RFID mutual authentication protocol. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Andreas Leicher, Andreas U. Schmidt, Yogendra Shah, Inhyok Cha |
Trusted Computing enhanced OpenID. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Maria Siebert, Franka Moritz, Frank Hambach, Christoph Meinel |
Enriching E-Learning meta data with user generated playlists. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Parminder Singh, G. S. Lehal |
Statistical syllables selection approach for the preparation of Punjabi speech database. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Fuchun Zhao, Hong Ling, Zhengchuan Xu |
Inter-organizational trust and supply chain Flexibility: From a relational view of the firm. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Sandra Dominikus, Manfred Josef Aigner, Stefan Kraxberger |
Passive RFID technology for the internet of things. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Busra Ozdenizci, Vedat Coskun, Mehmet N. Aydin 0001, Kerem Ok |
NFC loyal: A beneficial model to promote loyalty on smart cards of mobile devices. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Dae-il Jang, Kang-yu Cho, Minsoo Kim, Hyun-Chul Jung, Bong-Nan Noh |
Evasion technique and detection of malicious botnet. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Said Jafari, Fredrick Mtenzi, Ciaran O'Driscoll, Ronan Fitzpatrick, Brendan O'Shea |
Privacy metrics in ubiquitous computing applications. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Fazl-e Hadi, Fahad Bin Muhaya, Atif R. Naseer |
Secure multimedia communication in wireless mesh networks. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Laurentiu Ionescu, Constantin Anton, Ion Tutanescu, Alin Mazare, Gheorghe Serban |
On a FPGA implementation of BCH codes. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Taiwo Ayodele |
Unsupervised email vector space model (UEVSM). |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Busra Ozdenizci, Mehmet N. Aydin 0001, Vedat Coskun, Kerem Ok |
Design science in NFC research. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Hamid Hatim, Hanane El Bakkali, Ilham Berrada |
Workflow access control: From role engineering to task engineering. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Zanifa Omary, Fredrick Mtenzi, Bing Wu 0004, Ciaran O'Driscoll |
Accessing sensitive patient information in ubiquitous healthcare systems. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Saman Hina, Eric Atwell, Owen A. Johnson |
Secure information extraction from clinical documents using SNOMED CT gazetteer and natural language processing. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Bachar Alrouh, Adel Almohammad, Gheorghita Ghinea |
SOAP message-based steganography. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Abdullah Mohammed Alaraj |
Ownership transfer protocol. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Franka Moritz, Maria Siebert, Christoph Meinel |
Improving community rating in the tele-lecturing context. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Sabah S. Al-Fedaghi |
Diagrammatical framework for information system attacks. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Aini Aman, Hasmiah Kasimin |
E-government evaluation: The case of e-procurement in Malaysia government. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Giuliano Benelli, Alessandro Pozzebon |
An automated payment system for car parks based on Near Field Communication technology. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Jie Wang 0001, Raphael Chung-Wei Phan, John N. Whitley, David J. Parish |
Quality of detectability (QoD) and QoD-aware AAT-based attack detection. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Najeeb Elahi, Randi Karlsen, Waqas Younas |
Semantic image annotation with social context. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Kamal A. ElDahshan, Hany M. S. Lala |
Mining uncertain data warehouse. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Young Sam Kim, Seung-Hyun Hyun Kim, Seung-Hun Hun Jin |
SRS-based automatic secure device pairing on audio channels. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Pilar Castro Garrido, Guillermo Matas Miraz, Irene Luque Ruiz, Miguel Ángel Gómez-Nieto |
Near Field Communication in the development of ubiquitous games. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Ion Bica, Mihai Togan, Stefan-Vladimir Ghita |
Gossip membership protocol for peer-to-peer streaming overlay construction. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Safdar Ali, Waseem Shahzad, Farrukh Aslam Khan |
Remote-to-Local attacks detection using incremental genetic algorithm. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Mohannmad Waqar, Zeeshan Shafi Khan |
Web 2.0 content extraction. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Martin Feldhofer, Manfred Josef Aigner, Thomas Baier 0002, Michael Hutter, Thomas Plos, Erich Wenger |
Semi-passive RFID development platform for implementing and attacking security tags. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Daniel Caragata, Anca-Livia Radu, Safwan El Assad, Cristian-Gabriel Apostol |
Chaos based fragile watermarking algorithm for JPEG images. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Ciaran O'Driscoll, Paul Doyle |
The cost of security for a completely private ubiquitous environment. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | |
5th International Conference for Internet Technology and Secured Transactions, ICITST 2010, London, United Kingdom, November 8-10, 2010 |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | V. Siva RamaKrishna Reddy, Durvasula V. L. N. Somayajulu, Ajay R. Dani |
Sentiment Classification of text reviews using novel feature selection with reduced over-fitting. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
1 | Alkesh Patel, Ajit Balakrishnan |
Generic framework for recommendation system using collective intelligence. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Saidah Saad, Naomie Salim, Hakim Zainal |
Islamic knowledge ontology creation. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Junfeng Fan, Lejla Batina, Ingrid Verbauwhede |
Light-weight implementation options for curve-based cryptography: HECC is also ready for RFID. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Najwa Hayaati Mohd Alwi, Ip-Shing Fan |
Information security management in e-learning. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Andreas Finger, Holger Meyer 0001, Tim Rieger, Andreas Heuer 0001 |
Transactions and service level agreements for online music distribution. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Gao Yi, Lin Xinda, Wang Dong |
A computer based strategy design for automobile spare part logistics network optimization. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Mahmoodreza Arefi, Amir Masoud Amini |
The elements influencing the online price dispersion on Iranian electronic retailers. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Dang Nguyen Duc, Hyunrok Lee, Divyan M. Konidala, Kwangjo Kim |
Open issues in RFID security. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Jarle Hansen, Gheorghita Ghinea |
Multi-platform Bluetooth remote control. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Rasha Fares, Mike Woodward |
A new algorithm for controlling the mean queue length in a buffer with time varying arrival rate. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Samir B. Patel, Tejas B. Mehta, Shrikant N. Pradhan |
A novel approach using transformation techniques and decision tree algorithm on images for performing Digital Watermarking. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Rares Vasilescu |
Architectural model for a high performance content management system. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Jean Stephan, Nagi Wakim, Youakim Badr |
E-profile-based security for critical transactions in web applications. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Rashiq Rafiq Marie, Jonathan M. Blackledge, Helmut E. Bez |
On the fractal characteristics of Internet network traffic and its utilization in covert communications. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Wen-Shan Lin |
An integrated framework For modelling the adoptive behaviour of online product recommendations. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Caragata, Safwan El Assad, Ion Tutanescu, Emil Sofron |
Secure TCP/IP communications over DVB-S/DVB-RCS using chaotic sequences. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Yi-Tung F. Chan, Charles A. Shoniregun, Galyna A. Akmayeva |
Mixed load balance strategy to improve performance efficacy for three tiers Peer-to-Peer network topology. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Peter Paul Beran, Erich Schikuta |
An extended multi-layered blackboard approach for the optimization of world-spanning query execution plans. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Michal Radecký, Petr Gajdos |
Traffic simulation and intelligent agents. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Mazdak Zamani, Azizah Bt Abdul Manaf, Rabiah Bt Ahmad, Farhang Jaryani, Hamed Taherdoost, Akram M. Zeki |
A secure audio steganography approach. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Rebecca Wilkins, Abel Nyamapfene |
Usability driven website design - An equine sports case study. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Cyril Ehijie Azenabor, Mohammad Dastbaz, Charles A. Shoniregun, Chris Imafidon |
The society and electronic government usage. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Kaouthar Boumhamdi, Zahi Jarir |
Yet another approach for dynamic web service composition. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Abdul Ghafoor Abbasi, Sead Muftic, Gernot Schmölzer |
A model and design of a security provider for Java applications. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Christian Willems, Wesam Dawoud, Thomas Klingbeil, Christoph Meinel |
Security in Tele-Lab - Protecting an online virtual lab for security training. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Chee Er Chang, Faisal Mohd-Yasin, Azhar Kassim Mustapha |
RBStreX: Hardware XML parser for embedded system. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Ali Harb, Michel Beigbeder, Jean-Jacques Girardot |
Evaluation of question classification systems using differing features. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Bilal Rauf, M. Faisal Amjad, Kabeer Ahmed Bhatti |
Performance evaluation of IEEE 802.11 DCF in comparison with IEEE 802.11e EDCA. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Ahmad Roshidi Amran, Raphael C.-W. Phan, David J. Parish |
Metrics for network forensics conviction evidence. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Rahman, Karim Mohammed Rezaul, Aliar Hossain |
Finding an effective and secured information system in e-commerce environment. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Pornpit Wongthongtham, Behrang Zadjabbari |
Signifying ontology complexity for knowledge sharing. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Myrto Arapinis, Tom Chothia, Eike Ritter, Mark Ryan 0001 |
Untraceability in the applied pi-calculus. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | André Filipe de Moraes Batista, Maria das Graças Bruno Marietto, Gislene Cristina de O. Barbosa, Robson dos Santos França, Guiou Kobayashi |
Multi-agent systems to build a computational middleware: A chatterbot case study. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Maya I. Chehab, Ali E. Abdallah |
Architectures for identity management. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Tor-Morten Grønli, George Ghinea |
Web 2.0 integration in a context-aware mobile PIM application. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Wei Zhou 0001, Gaurav Kapoor, Selwyn Piramuthu |
Modified Slotted ALOHA protocol for RFID tag collisions. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Khaled Alghathbar, Hanan A. Mahmoud |
Noisy password security technique. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Emmanuel Hooper |
Intelligent strategies and techniques for effective cyber security, infrastructure protection and privacy. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Sadegh Kharazmi, Ali Farahmand Nejad, Hassan Abolhassani |
Freshness of Web search engines: Improving performance of Web search engines using data mining techniques. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Deniz Cokuslu, Abdelkader Hameurlain, Kayhan Erciyes |
Grid resource discovery based on web services. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Khaled Alghathbar |
Low power design for silent pass authentication system. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Ryan Ribeiro de Azevedo, Eric Rommel Dantas Galvão, Rubean Caitano dos Santos, Cleyton Mário de Oliveira Rodrigues, Fred Freitas, Marcelo J. Siqueira |
An autonomic multiagent system ontology-based for management of security of information. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Lishoy Francis, Gerhard P. Hancke 0002, Keith Mayes, Konstantinos Markantonakis |
Potential misuse of NFC enabled mobile phones with embedded security elements as contactless attack platforms. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Mathias Kretschmer, Gheorghita Ghinea |
Seamless integration of unidirectional broadcast links into QoS-constrained broadband Wireless Mesh Access Networks. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Pijitra Jomsri, Siripun Sanguansintukul, Worasit Choochaiwattana |
A comparison of search engine using "tag title and abstract" with CiteULike - An initial evaluation. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Fischer 0003, Bernd Markscheffel |
State of the art in wireless LAN security - Results and implications of an empirical study concerning German companies and federal authorities. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Amina Gamlo, Omaima Bamasak |
Towards securing e-transactions in e-government systems of Saudi Arabia. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Tsang-Hung Wu, Shyh-Chang Liu |
A research on the establishment of enterprise information architecture. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Jeffy Mwakalinga, Stewart Kowalski, Louise Yngström |
Secure e-learning using a holistic and immune security framework. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Xinxin Fan, Honggang Hu, Guang Gong, Eric M. Smith, Daniel W. Engels |
Lightweight implementation of Hummingbird cryptographic algorithm on 4-bit microcontrollers. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|