The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ICITST"( http://dblp.L3S.de/Venues/ICITST )

URL (DBLP): http://dblp.uni-trier.de/db/conf/icitst

Publication years (Num. hits)
2009 (148) 2010 (84) 2011 (141) 2012 (140) 2013 (115) 2014 (74) 2015 (77) 2016 (86) 2017 (105) 2020 (28)
Publication types (Num. hits)
inproceedings(988) proceedings(10)
Venues (Conferences, Journals, ...)
ICITST(998)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 998 publication records. Showing 998 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Guenther Starnberger, Lorenz Froihofer, Karl M. Göschka Distributed timestamping with smart cards using efficient overlay routing. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Pradheepkumar Singaravelu, Shekhar Verma Viability of multivariate cryptosystems for WSN. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1P. Vcelck, Jana Klecková, Vladimir Rohan Cerebrovascular diseases research based on heterogeneous medical data mining and knowledge base. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Mohammed Alzomai, Bander AlFayyadh, Audun Jøsang Display security for online transactions: SMS-based authentication scheme. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Zeeshan Shafi Khan, Nabila Akram, Khaled Alghathbar, Muhammad Sher, Rashid Mehmood Secure single packet IP Traceback mechanism to identify the source. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Maximilian Ronniger, Florian Fankhauser, Christian Schanes, Thomas Grechenig A robust and flexible test environment for VoIP security tests. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Fadi A. Aloul Information security awareness in UAE: A survey paper. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Dang Nguyen Duc, Kwangjo Kim, Chan Yeob Yeun Reconsidering Ryu-Takagi RFID authentication protocol. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Abdelhaq Belkadi, Abdelaziz El Fazziki, Ait Ouahman Abdallah, Ibourk Aomar Toward an agent based approach for decisional systems modeling. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Hanunah Othman, Habibah Hashim, Jamalul-lail Ab Manan A conceptual framework providing Direct Anonymous Attestation (DAA) protocol in trusted location-based services (LBS). Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Conor Mc Manamon, Fredrick Mtenzi Defending privacy: The development and deployment of a darknet. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Vasaki Ponnusamy, Azween Vitra Abdullah A bio-inspired framework for wireless sensor network using mobile sensors. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Boustia Narhimene, Aïcha Mokhtari A contextual multilevel access control model with default and exception description logic. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Gregory Epiphaniou, Carsten Maple, Paul Sant, Peter Norrington The effects of encryption on VoIP streams under the code-excited linear prediction coder G.729. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Elena Castro Galán, Almudena Alcaide, Agustín Orfila, Jorge Blasco Alís A multi-agent scanner to detect stored-XSS vulnerabilities. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Mete Akgün, Ali Özhan Gürel, Mehmet Ufuk Çaglayan Attacks to a lightweight RFID mutual authentication protocol. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Andreas Leicher, Andreas U. Schmidt, Yogendra Shah, Inhyok Cha Trusted Computing enhanced OpenID. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Maria Siebert, Franka Moritz, Frank Hambach, Christoph Meinel Enriching E-Learning meta data with user generated playlists. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Parminder Singh, G. S. Lehal Statistical syllables selection approach for the preparation of Punjabi speech database. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Fuchun Zhao, Hong Ling, Zhengchuan Xu Inter-organizational trust and supply chain Flexibility: From a relational view of the firm. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Sandra Dominikus, Manfred Josef Aigner, Stefan Kraxberger Passive RFID technology for the internet of things. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Busra Ozdenizci, Vedat Coskun, Mehmet N. Aydin 0001, Kerem Ok NFC loyal: A beneficial model to promote loyalty on smart cards of mobile devices. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Dae-il Jang, Kang-yu Cho, Minsoo Kim, Hyun-Chul Jung, Bong-Nan Noh Evasion technique and detection of malicious botnet. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Said Jafari, Fredrick Mtenzi, Ciaran O'Driscoll, Ronan Fitzpatrick, Brendan O'Shea Privacy metrics in ubiquitous computing applications. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Fazl-e Hadi, Fahad Bin Muhaya, Atif R. Naseer Secure multimedia communication in wireless mesh networks. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Laurentiu Ionescu, Constantin Anton, Ion Tutanescu, Alin Mazare, Gheorghe Serban On a FPGA implementation of BCH codes. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Taiwo Ayodele Unsupervised email vector space model (UEVSM). Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Busra Ozdenizci, Mehmet N. Aydin 0001, Vedat Coskun, Kerem Ok Design science in NFC research. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Hamid Hatim, Hanane El Bakkali, Ilham Berrada Workflow access control: From role engineering to task engineering. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Zanifa Omary, Fredrick Mtenzi, Bing Wu 0004, Ciaran O'Driscoll Accessing sensitive patient information in ubiquitous healthcare systems. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Saman Hina, Eric Atwell, Owen A. Johnson Secure information extraction from clinical documents using SNOMED CT gazetteer and natural language processing. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Bachar Alrouh, Adel Almohammad, Gheorghita Ghinea SOAP message-based steganography. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Abdullah Mohammed Alaraj Ownership transfer protocol. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Franka Moritz, Maria Siebert, Christoph Meinel Improving community rating in the tele-lecturing context. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Sabah S. Al-Fedaghi Diagrammatical framework for information system attacks. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Aini Aman, Hasmiah Kasimin E-government evaluation: The case of e-procurement in Malaysia government. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Giuliano Benelli, Alessandro Pozzebon An automated payment system for car parks based on Near Field Communication technology. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Jie Wang 0001, Raphael Chung-Wei Phan, John N. Whitley, David J. Parish Quality of detectability (QoD) and QoD-aware AAT-based attack detection. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Najeeb Elahi, Randi Karlsen, Waqas Younas Semantic image annotation with social context. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Kamal A. ElDahshan, Hany M. S. Lala Mining uncertain data warehouse. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Young Sam Kim, Seung-Hyun Hyun Kim, Seung-Hun Hun Jin SRS-based automatic secure device pairing on audio channels. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Pilar Castro Garrido, Guillermo Matas Miraz, Irene Luque Ruiz, Miguel Ángel Gómez-Nieto Near Field Communication in the development of ubiquitous games. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Ion Bica, Mihai Togan, Stefan-Vladimir Ghita Gossip membership protocol for peer-to-peer streaming overlay construction. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Safdar Ali, Waseem Shahzad, Farrukh Aslam Khan Remote-to-Local attacks detection using incremental genetic algorithm. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Mohannmad Waqar, Zeeshan Shafi Khan Web 2.0 content extraction. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Martin Feldhofer, Manfred Josef Aigner, Thomas Baier 0002, Michael Hutter, Thomas Plos, Erich Wenger Semi-passive RFID development platform for implementing and attacking security tags. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Daniel Caragata, Anca-Livia Radu, Safwan El Assad, Cristian-Gabriel Apostol Chaos based fragile watermarking algorithm for JPEG images. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Ciaran O'Driscoll, Paul Doyle The cost of security for a completely private ubiquitous environment. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1 5th International Conference for Internet Technology and Secured Transactions, ICITST 2010, London, United Kingdom, November 8-10, 2010 Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1V. Siva RamaKrishna Reddy, Durvasula V. L. N. Somayajulu, Ajay R. Dani Sentiment Classification of text reviews using novel feature selection with reduced over-fitting. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
1Alkesh Patel, Ajit Balakrishnan Generic framework for recommendation system using collective intelligence. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Saidah Saad, Naomie Salim, Hakim Zainal Islamic knowledge ontology creation. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Junfeng Fan, Lejla Batina, Ingrid Verbauwhede Light-weight implementation options for curve-based cryptography: HECC is also ready for RFID. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Najwa Hayaati Mohd Alwi, Ip-Shing Fan Information security management in e-learning. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Andreas Finger, Holger Meyer 0001, Tim Rieger, Andreas Heuer 0001 Transactions and service level agreements for online music distribution. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Gao Yi, Lin Xinda, Wang Dong A computer based strategy design for automobile spare part logistics network optimization. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Mahmoodreza Arefi, Amir Masoud Amini The elements influencing the online price dispersion on Iranian electronic retailers. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Dang Nguyen Duc, Hyunrok Lee, Divyan M. Konidala, Kwangjo Kim Open issues in RFID security. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jarle Hansen, Gheorghita Ghinea Multi-platform Bluetooth remote control. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Rasha Fares, Mike Woodward A new algorithm for controlling the mean queue length in a buffer with time varying arrival rate. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Samir B. Patel, Tejas B. Mehta, Shrikant N. Pradhan A novel approach using transformation techniques and decision tree algorithm on images for performing Digital Watermarking. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Rares Vasilescu Architectural model for a high performance content management system. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jean Stephan, Nagi Wakim, Youakim Badr E-profile-based security for critical transactions in web applications. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Rashiq Rafiq Marie, Jonathan M. Blackledge, Helmut E. Bez On the fractal characteristics of Internet network traffic and its utilization in covert communications. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Wen-Shan Lin An integrated framework For modelling the adoptive behaviour of online product recommendations. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Daniel Caragata, Safwan El Assad, Ion Tutanescu, Emil Sofron Secure TCP/IP communications over DVB-S/DVB-RCS using chaotic sequences. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Yi-Tung F. Chan, Charles A. Shoniregun, Galyna A. Akmayeva Mixed load balance strategy to improve performance efficacy for three tiers Peer-to-Peer network topology. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Peter Paul Beran, Erich Schikuta An extended multi-layered blackboard approach for the optimization of world-spanning query execution plans. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Michal Radecký, Petr Gajdos Traffic simulation and intelligent agents. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Mazdak Zamani, Azizah Bt Abdul Manaf, Rabiah Bt Ahmad, Farhang Jaryani, Hamed Taherdoost, Akram M. Zeki A secure audio steganography approach. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Rebecca Wilkins, Abel Nyamapfene Usability driven website design - An equine sports case study. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Cyril Ehijie Azenabor, Mohammad Dastbaz, Charles A. Shoniregun, Chris Imafidon The society and electronic government usage. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Kaouthar Boumhamdi, Zahi Jarir Yet another approach for dynamic web service composition. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Abdul Ghafoor Abbasi, Sead Muftic, Gernot Schmölzer A model and design of a security provider for Java applications. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Christian Willems, Wesam Dawoud, Thomas Klingbeil, Christoph Meinel Security in Tele-Lab - Protecting an online virtual lab for security training. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Chee Er Chang, Faisal Mohd-Yasin, Azhar Kassim Mustapha RBStreX: Hardware XML parser for embedded system. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ali Harb, Michel Beigbeder, Jean-Jacques Girardot Evaluation of question classification systems using differing features. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Bilal Rauf, M. Faisal Amjad, Kabeer Ahmed Bhatti Performance evaluation of IEEE 802.11 DCF in comparison with IEEE 802.11e EDCA. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ahmad Roshidi Amran, Raphael C.-W. Phan, David J. Parish Metrics for network forensics conviction evidence. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Mohammad Rahman, Karim Mohammed Rezaul, Aliar Hossain Finding an effective and secured information system in e-commerce environment. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Pornpit Wongthongtham, Behrang Zadjabbari Signifying ontology complexity for knowledge sharing. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Myrto Arapinis, Tom Chothia, Eike Ritter, Mark Ryan 0001 Untraceability in the applied pi-calculus. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1André Filipe de Moraes Batista, Maria das Graças Bruno Marietto, Gislene Cristina de O. Barbosa, Robson dos Santos França, Guiou Kobayashi Multi-agent systems to build a computational middleware: A chatterbot case study. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Maya I. Chehab, Ali E. Abdallah Architectures for identity management. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Tor-Morten Grønli, George Ghinea Web 2.0 integration in a context-aware mobile PIM application. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Wei Zhou 0001, Gaurav Kapoor, Selwyn Piramuthu Modified Slotted ALOHA protocol for RFID tag collisions. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Khaled Alghathbar, Hanan A. Mahmoud Noisy password security technique. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Emmanuel Hooper Intelligent strategies and techniques for effective cyber security, infrastructure protection and privacy. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Sadegh Kharazmi, Ali Farahmand Nejad, Hassan Abolhassani Freshness of Web search engines: Improving performance of Web search engines using data mining techniques. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Deniz Cokuslu, Abdelkader Hameurlain, Kayhan Erciyes Grid resource discovery based on web services. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Khaled Alghathbar Low power design for silent pass authentication system. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ryan Ribeiro de Azevedo, Eric Rommel Dantas Galvão, Rubean Caitano dos Santos, Cleyton Mário de Oliveira Rodrigues, Fred Freitas, Marcelo J. Siqueira An autonomic multiagent system ontology-based for management of security of information. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Lishoy Francis, Gerhard P. Hancke 0002, Keith Mayes, Konstantinos Markantonakis Potential misuse of NFC enabled mobile phones with embedded security elements as contactless attack platforms. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Mathias Kretschmer, Gheorghita Ghinea Seamless integration of unidirectional broadcast links into QoS-constrained broadband Wireless Mesh Access Networks. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Pijitra Jomsri, Siripun Sanguansintukul, Worasit Choochaiwattana A comparison of search engine using "tag title and abstract" with CiteULike - An initial evaluation. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Daniel Fischer 0003, Bernd Markscheffel State of the art in wireless LAN security - Results and implications of an empirical study concerning German companies and federal authorities. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Amina Gamlo, Omaima Bamasak Towards securing e-transactions in e-government systems of Saudi Arabia. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Tsang-Hung Wu, Shyh-Chang Liu A research on the establishment of enterprise information architecture. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jeffy Mwakalinga, Stewart Kowalski, Louise Yngström Secure e-learning using a holistic and immune security framework. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Xinxin Fan, Honggang Hu, Guang Gong, Eric M. Smith, Daniel W. Engels Lightweight implementation of Hummingbird cryptographic algorithm on 4-bit microcontrollers. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
Displaying result #801 - #900 of 998 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license