


default search action
7th ICITST 2012: London, UK
- Nick Savage, Safwan El Assad, Charles A. Shoniregun:

7th International Conference for Internet Technology and Secured Transactions, ICITST 2012, London, United Kingdom, December 10-12, 2012. IEEE 2012, ISBN 978-1-4673-5325-0 - Léa D. Cot, René Lozi:

Assessing the security of subsampling process using modified EKF and nonlinear least squares methods. 27-31 - Peter Backs, Steffen Wendzel, Jörg Keller:

Dynamic routing in covert channel overlays based on control protocols. 32-39 - Maryline Chetto, Hassan Noura, Safwan El Assad, Mousa Farajallah:

How to guarantee secured transactions with QoS and real-time constraints. 40-44 - Relu Laurentiu Tataru, Safwan El Assad, Olivier Déforges:

Improved blind DCT watermarking by using chaotic sequences. 46-50 - Lorenzo Antonio Delgado-Guillen, Jose Juan Garcia-Hernandez, César Torres-Huitzil:

Validating the existence of watermarks on digital images using a mobile phone. 51-55 - Ina Taralova, René Lozi, Safwan El Assad:

Chaotic generator synthesis: Dynamical and statistical analysis. 56-59 - Ana Cristina Dascalescu, Radu Eugen Boriga:

A new method to improve cryptographic properties of chaotic discrete dynamical systems. 60-65 - Safwan El Assad:

Chaos Based Information Hiding and Security. 67-72 - Mohamed Hamdy Eldefrawy, Muhammad Khurram Khan:

Detecting counterfeit-money using RFID-enabled mobile devices. 74-79 - Eyad Taqieddin, Jagannathan Sarangapani:

Vulnerability analysis of two ultra-lightweight RFID authentication protocols: RAPP and gossamer. 80-86 - Mouza Ahmad Bani Shemaili, Chan Yeob Yeun, Khalid Mubarak, Mohamed Jamal Zemerly:

A new lightweight hybrid cryptographic algorithm for the internet of things. 87-92 - Leonard James Mselle, Tabu S. Kondo:

Deploying Computer-Based Learning under suboptimal conditions. 94-98 - Jameson Mbale, Kauna Mufeti, Victor Hamutenya:

Examining ubiquitous security-capital issues in implementing a Campus-System-as-a-Service(CSaaS) model in the cloud computing age: Case study sub-Saharan region. 99-104 - Lena Yuryna Connolly, Michael Lang:

Investigation of cultural aspects within information systems security research. 105-111 - Elke Franz, Thomas Springer, Norbert Harder:

Enhancing privacy in social applications with the notion of group context. 112-118 - Sukyoung Kim, Kihong Ahn:

User-intent custom adaptive search service based on ontology and similar-word retrieval algorithm composition. 121-126 - Carlos R. Jaimez-González, Wulfrano Arturo Luna-Ramírez, Simon M. Lucas:

A web tool for monitoring HTTP asynchronous method invocations. 127-132 - Tom Yuan Gao, David Kearney:

A shared secret security broker implementation in a commercial context. 133-138 - Junfeng Xu, Bo Sun, Chengxiang Si:

The survey of cache management in the shared storage environment. 139-142 - Alba Amato, Beniamino Di Martino, Salvatore Venticinque:

Evaluation and brokering of service level agreements for negotiation of cloud infrastructures. 144-149 - Bernd Zwattendorfer, Arne Tauber:

Secure cross-cloud single sign-on (SSO) using eIDs. 150-155 - Tom Kirkham, Karim Djemame, Mariam Kiran, Ming Jiang, Django Armstrong, George Kousiouris, George Vafiadis, Athanasia Evangelinou:

Risk based SLA management in clouds: A legal perspective. 156-160 - Dalia Sobhy, Yasser El-Sonbaty, Mohamad Abou El-Nasr:

MedCloud: Healthcare cloud computing system. 161-166 - Ruhma Tahir, Huosheng Hu, Dongbing Gu, Klaus D. McDonald-Maier, Gareth Howells:

A scheme for the generation of strong cryptographic key pairs based on ICMetrics. 168-174 - Sajjad Ahmed Ghauri, Hasan Humayun, Muhammad Ehsan ul Haq, Farhan Sohail:

Implementation of Convolutional codes on FPGA. 175-178 - Abdul Qayum, Prakash Kumar:

QR decomposition-based cryptography: Via image generation (QR-CRYPT). 179-184 - Peter Teufl, Thomas Zefferer, Sandra Kreuzhuber, Christian M. Lesjak:

Trusted Location Based Services. 185-192 - Sheheryar Malik, Fabrice Huet, Denis Caromel:

Reliability aware scheduling in cloud computing. 194-200 - Aliaksandr Lazouski, Gaetano Mancini, Fabio Martinelli, Paolo Mori:

Usage control in cloud systems. 202-207 - Kiran Karnad, Saravanan Nagenthram:

Cloud security: Can the cloud be secured? 208-210 - Suaad S. Alarifi, Stephen D. Wolthusen:

Detecting anomalies in IaaS environments through virtual machine host system call analysis. 211-218 - Abrar Ullah, Hannan Xiao, Mariana Lilley, Trevor Barker:

Usability of profile based student authentication and traffic light system in online examinations. 220-225 - Dawn Carmichael, David Cleave:

How effective is social media advertising? A study of Facebook Social Advertisements. 226-229 - Geovanny Poveda, Adam Westerski, Carlos Angel Iglesias:

Application of semantic search in Idea Management Systems. 230-236 - Aline Izida, Thiago da Rocha Tedrus, Maria das Graças Bruno Marietto, Margarethe Steinberger-Elias, Wagner Tanaka Botelho, Robson dos Santos França:

Emergency care in situations of natural disaster: A Multi-Agent approach. 237-242 - JeongMok Ha, Hong Jeong:

Modelsim simulation for real-time stereo matching using DP algorithm. 244-248 - Ariel Stulman, Jonathan Lahav, Avraham Shmueli:

MANET secure key exchange using spraying diffie-hellman algorithm. 249-252 - Abdelrahman AlMahmoud, Maurizio Colombo, Chan Yeob Yeun, Hassan Al-Muhairi:

Smart authentication for real-time business process monitoring. 253-258 - Mike Just, David Aspinall:

On the security and usability of dual credential authentication in UK online banking. 259-264 - Khawla Abdulla Alghafli, Andrew Jones, Thomas Anthony Martin:

Forensics data acquisition methods for mobile phones. 265-269 - Settachai Chaisanit, Napatwadee Sangboonnum Hongthong, Surachai Suksakulchai, Chuchart Pinpat:

Traditional musical Virtual Reality on M-learning. 271-274 - Aspen Olmsted, Csilla Farkas:

High volume web service resource consumption. 275-280 - Markus Jung, Thomas Hofer, Susen Döbelt, Georg Kienesberger, Florian Judex, Wolfgang Kastner:

Access control for a Smart Grid SOA. 281-287 - Umar Manzoor, Naveed Ejaz, Nadeem Akhtar, Muhammad Umar, M. Shoaib Khan, Hafsa Umar:

Ontology based image retrieval. 288-293 - Kotaro Yoshida, Yodai Watanabe:

Security of audio secret sharing scheme encrypting audio secrets. 294-295 - Pasquale Stirparo, Ioannis Kounelis:

The mobileak project: Forensics methodology for mobile application privacy assessment. 297-303 - Y. Y. Chen, Shakirah Mohd Taib, Che Sarah Che Nordin:

Determinants of student performance in advanced programming course. 304-307 - Ghada Moussa Bahig, Amr El-Kadi:

Ensuring software safety in safety critical domains. 308-312 - Omniyah Gul, Mahmoud Al-Qutayri, Quang Hieu Vu, Chan Yeob Yeun:

Data integration of electronic health records using artificial neural networks. 313-317 - Seyed Ali Mirheidari, Sajjad Arshad, Saeidreza Khoshkdahan, Rasool Jalili:

Two novel server-side attacks against log file in Shared Web Hosting servers. 318-323 - Galoh Rashidah Haron, Dharmadharshni Maniam, Vijayakumari Sadasivam, Wong Hon Loon:

Re-engineering of web reverse proxy with shibboleth authentication. 325-330 - Mikhail Y. R. Gadelha, Cicero Ferreira Fernandes Costa Filho, Marly Guimarães Fernandes Costa:

Proposal of a cryptography method using gray scale digital images. 331-335 - Norah Farooqi, Siobhán North:

Evaluation of practical trust based access control for XML databases. 336-340 - Greg Miiller:

Issues in inter-organisational encryption systems: The problem with FedLink. 341-346 - Andres Ojamaa, Karl Düüna:

Assessing the security of Node.js platform. 348-355 - Ana A. Andrade, Vitor V. Lopes, Augusto Q. Novais:

Quantifying the impact on distrust of e-commerce trust factors: A non-parametric study. 356-361 - Hatem Fawzi Halaoui:

Uncertainty with STOS: Intelligent solution for uncertain navigation problems. 362-367 - Daphne Rixon, Mary Furey:

Learning from oversight by telecommunications regulatory agencies. 368-374 - Eghbal Ghazizadeh, Mazdak Zamani, Jamalul-lail Ab Manan, Reza Khaleghparast, Ali Taherian:

A trust based model for federated identity architecture to mitigate identity theft. 376-381 - Sanchika Gupta, Anjali Sardana, Padam Kumar:

A light weight centralized file monitoring approach for securing files in Cloud environment. 382-387 - Abdullah Abuhussein, Harkeerat Singh Bedi, Sajjan G. Shiva:

Evaluating security and privacy in cloud computing services: A Stakeholder's perspective. 388-395 - Tran Thao Phuong, Kazumasa Omote, Nguyen Gia Luyen, Nguyen Dinh Thuc:

Improvement of multi-user searchable encrypted data scheme. 396-401 - A. H. Azni, Rabiah Ahmad, Zul Azri Muhamad Noh:

Correlated node behavior in wireless ad hoc networks: An epidemic model. 403-410 - Mohammed Alhussein, Avinash Srinivasan, Duminda Wijesekera:

Forensics filesystem with cluster-level identifiers for efficient data recovery. 411-415 - Ewa Idzikowska:

A round level approach to fault detection in PP-2 symmetric block cipher. 416-419 - V. Anil Kumar, Debabrata Das:

Feedback manipulation flooding attack: Feasibility evaluation and impact quantification on Stream Control Transmission Protocol. 420-425 - Jeffrey Medsger, Avinash Srinivasan:

ERASE- entropy-based sanitization of sensitive data for privacy preservation. 427-432 - Xin Huang, Shangyuan Guo, Bangdao Chen, A. W. Roscoe:

Bootstrapping body sensor networks using human controlled LED-camera channels. 433-438 - Omer Nawaz, Christian Gehrmann, Markus Fiedler:

Secure mobile social networks using USIM in a closed environment. 439-446 - Hsi-Chung Lin:

Content Extraction Signatures Revisited. 447-451 - Sara Jeza Alotaibi, Mike Wald:

Towards a UTAUT-based model for studying the integrating physical and virtual Identity Access Management Systems in e-government domain. 453-458 - Jerry Walsh, Donogh Roche, Franclin S. Foping:

NitroScript: A PHP template engine for customizing of e-commerce applications. 459-464 - Yan Hu, Fangjie Lu, Israr Khan, Guohua Bai:

A cloud computing solution for sharing healthcare information. 465-470 - Yang Guo, Guohua Bai, Yan Hu:

Using Bayes Network for Prediction of Type-2 diabetes. 471-472 - Daniel Fischer, Bernd Markscheffel, Sebastian Frosch, Daniela Büttner:

A survey of threats and security measures for data transmission over GSM/UMTS networks. 477-482 - Yury Chemerkin:

Vulnerability elimination by force of new mobile OS Comparative research of security techniques on BlackBerry OS (incl. PlayBook). 483-487 - Jason Flood, Mark Denihan, Anthony Keane, Fredrick Mtenzi:

Black hat training of white hat resources: The future of security is gaming. 488-491 - Rami Mustafa A. Mohammad, Fadi A. Thabtah, Lee McCluskey:

An assessment of features related to phishing websites using an automated technique. 492-497 - Sidney de Castro, Maria das Graças Bruno Marietto, Robson dos Santos França, Wagner Tanaka Botelho:

A Multi-Agent System for information management and augmented reality in asymmetric wars. 499-504 - Tafta Zani, Ari Moesriami Barmawi, Maman Abdurohman:

Securing Elliptic Curve based El-Gamal against Pollard Rho attack using Elliptic Curve based Diffie-Hellman Key Exchange. 505-512 - Uthairatt Phangphol, Settachai Chaisanit, Tau-tong Puangsuwan, Veena Khongpit, Parichat Kunpluem:

Community OTOP Web Portal for Eastern Region of Thailand. 513-514 - Afif Mghawish, Akram A. AbdelQader, Mahmoud A. Al-Jezawi, Mohammad AbuMahfouz:

Multi function control system using GSM modem based SM5100B Module. 515-518 - Veena Khongpit, Uthairatt Phangphol, M. L. Kulthon Kasemsan, Chonawat Srisa-an:

2D Gun's type classification using edge detection algorithm and SUSAN low level image processing. 521-523 - Damian Gordon:

Hackers and Hollywood 2: Considering televisual Cyberthreats in Security Risk Analysis. 524-527 - Ruchi Jain, Nasser S. Abouzakhar:

Hidden Markov Model based anomaly intrusion detection. 528-533 - Brad Miller, Kaitlyn Buck, J. D. Tygar:

Systematic analysis and evaluation of web privacy policies and implementations. 534-540 - Laurentiu Ionescu, Constantin Anton, Ion Tutanescu, Alin Mazare, Gheorghe Serban:

Error correction and detection system based on Hopfield networks. 541-544 - Laddawan Meeanan, Apichai Trangansri, Pornpipat Hongthai, Settachai Chaisanit, Ratchadawan Nimnual:

The edutainment of virtual music instrument for Thai xylophone (Ranad-ek). 546-547 - José Luis González, Victor Sosa-Sosa, Borja Bergua, Luis Miguel Sánchez, Jesús Carretero:

Fault-tolerant middleware based on multistream pipeline for private storage services. 548-555 - N. Abdul Hamid, M. F. Al A'zhim, M. L. Yap:

e-Ticketing system for football events in Malaysia. 556-561 - Aleksandar Milenkoski, Samuel Kounev:

Towards benchmarking intrusion detection systems for virtualized cloud environments. 562-563 - Rozita Mohd Yusof, Norrozila Sulaiman:

Multi-probes fusion framework for matching simultaneous latent impressions. 564-567 - Maja Vidovic, Josip Kolic:

Are contemporary trade unions utilizing the opportunities for revival presented by internet technology? A comparison of Croatian, UK and USA practice. 569-574 - Limin Fan:

Security management mechanism for composite applications based on hash chains. 575-577 - Ahmad Mousa Odat:

E-Government in developing countries: Framework of challenges and opportunities. 578-582 - Zawlikhah Al Somali, Gheorghita Ghinea:

Investigation of factors affecting growth of e-banking services in Saudi Arabia. 583-588 - Antonis Michalas, Menelaos Bakopoulos:

SecGOD Google Docs: Now i feel safer! 589-595 - Xin Huang, Rong Fu, Bangdao Chen, Tingting Zhang, A. W. Roscoe:

User interactive Internet of things privacy preserved access control. 597-602 - Mohamed Sameh Hassanein, Gheorghita Ghinea:

Text fingerprint key generation. 603-609 - Ji Ma:

Analysis of access control protocols using labelled tableaux. 610-615 - Somsak Choto, Nol Premasathian:

A dynamic fuzzy commitment scheme using ARRSES forecasting. 616-619 - Martin A. Negron:

A Bayesian Belief Network analysis of the Internet governance conflict. 621-627 - Maria das Graças Bruno Marietto, Robson dos Santos França, Margarethe Steinberger-Elias, Wagner Tanaka Botelho, Emerson Aguiar Noronha, Vera Lúcia da Silva:

Comparing distinct approaches for panic behavior computer simulations: A theoretical analysis. 628-633 - Chiranjib Sur, Sanjeev Sharma, Anupam Shukla:

Analysis & modeling multi-breeded Mean-Minded ant colony optimization of agent based Road Vehicle Routing Management. 634-641 - Maria das Graças Bruno Marietto, Margarethe Born Steinberger-Elias, Marllon Felipe Muniz De Farias Alves, Rita Vucinic Teles:

The process of building knowledge and communication of social systems emulated by multiagent systems capable of cause and emerging learning. 642-647 - Daniel Slamanig, Christian Hanser:

On cloud storage and the cloud of clouds approach. 649-655 - Karim Benzidane, Saad Khoudali, Abderrahim Sekkaki:

Autonomous agent-based inspection for inter-VM traffic in a Cloud environment. 656-661 - Yongki Kim, Jungmin Lim, Seokjoo Doo, Hyunsoo Yoon:

The design of adaptive intrusion tolerant system(ITS) based on historical data. 662-667 - Joonsang Baek, Quang Hieu Vu, Andrew Jones, Sameera Al-Mulla, Chan Yeob Yeun:

Smart-frame: A flexible, scalable, and secure information management framework for smart grids. 668-673 - Benjamin Heckmann, Marcus Zinn, Ronald C. Moore, Christoph Wentzel, Andrew D. Phippen:

Economic efficiency control on data centre resources in heterogeneous cost scenarios. 675-679 - Sheheryar Malik, Fabrice Huet, Denis Caromel:

RACS: A framework for Resource Aware Cloud computing. 680-687 - Ashwini Rath, Sanjay Kumar, Sanjay Mohapatra, Rahul Thakurta:

Decision points for adoption cloud computing in small, medium enterprises (SMEs). 688-691 - Mafawez T. Alharbi, Amelia Platt, Ali H. Al-Bayatti:

Context-aware Personal Learning Environment. 692-697 - Mourad Ykhlef, Abeer AlDayel:

Query paraphrasing using genetic approach for intelligent information retrieval. 699-703 - Zhe Wang, Xiaodong Liu, Kevin Chalmers, Guojian Cheng:

Evolution pattern for Service Evolution in Clouds. 704-709 - Said Rabah Azzam, Shikun Zhou:

Implementation methodology of Rely/Guarantee plug-in for Protégé. 710-714 - Funminiyi Olajide, Nick Savage, Galyna A. Akmayeva, Richard Trafford:

Forensic memory evidence of windows application. 715-718 - Pardis Pourghomi, Gheorghita Ghinea:

Challenges of managing secure elements within the NFC ecosystem. 720-725 - Saneeha Khalid, Haider Abbas, Maruf Pasha, Asad Raza:

Securing Internet Information Services (IIS) configuration files. 726-729 - Muhammad Qasim Saeed, Colin D. Walter:

Off-line NFC Tag Authentication. 730-735 - Matthias Trojahn, Philipp Marcus:

Towards coupling user and device locations using biometrical authentication on smartphones. 736-741 - Saurabh Kulkarni, Madhumitra Mutalik, Prathamesh Kulkarni, Tarun Gupta:

Honeydoop - a system for on-demand virtual high interaction honeypots. 743-747 - Jeffrey J. Wiley, Frank P. Coyle:

Semantic hedgehog for log analysis. 748-752 - Jabu Mtsweni:

Exploiting UML and acceleo for developing Semantic Web Services. 753-758 - Said Rabah Azzam, Shikun Zhou:

Assessment of ontology alignment methodology. 759-764 - Rehaballah Elbadrawy, Rasha Abdel Aziz:

Mobile banking contexts and prospects in Egypt: A framework. 766-771 - Pardis Pourghomi, Gheorghita Ghinea:

Managing NFC payment applications through cloud computing. 772-777 - S. N. Arun, W. C. Lam, Kok Kiong Tan:

Innovative solution for a telemedicine application. 778-783 - Gaozheng Zhang, Mengdong Chen, Mou Shen:

Authorization model of SSO for a distributed environment based on the attributes. 784-789 - Surachai Suksakulchai, Wacheerapan Kaewprapan, Settachai Chaisanit:

Making of DAISY Talking book on mobile phone: A concept and architecture. 791-792 - Ratchadawan Nimnual, Settachai Chaisanit:

M-learning for Eco-Packaging using KM. 793-794 - Neda Abdelhamid, Aladdin Ayesh, Fadi A. Thabtah:

An experimental study of three different rule ranking formulas in associative classification. 795-800 - Alok Upadhyay, Jajati Keshari Sahoo, Vibhor Bajpai:

A novel architecture for secure communications in mobile systems. 801-805 - Bruno Alves Pereira Botelho, Emilio Tissato Nakamura, Nelson Uto:

Implementation of tools for brute forcing touch inputted passwords. 807-808 - Shunsuke Aoki, Masayuki Iwai, Kaoru Sezaki:

Perturbation for privacy-preserving participatory sensing on mobile. 809 - Hiroki Nakayama, Hiroaki Kaminaga, Youzou Miyadera, Shoichi Nakamura:

Innovative extracting and integrating the potential and subjectively formed context-information. 810-811 - Yusuke Morita, Hiroyuki Anzai, Hiroaki Kaminaga, Youzou Miyadera, Shoichi Nakamura:

Visual support system for semi-automatic generation of spadework of academic paper from presentation slides. 812-813 - Takuya Matsumoto, Tatuya Yamazaki, Hiroaki Kaminaga, Youzou Miyadera, Shoichi Nakamura:

Visualization of Web exploration streams and user's genuine intentions. 814-815 - Hiroyuki Anzai, Hiroaki Kaminaga, Yasuhiko Morimoto, Setsuo Yokoyama, Youzou Miyadera, Shoichi Nakamura:

A system for management of research resources focusing on grasping the polish processes. 816-817

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














