Search dblp for Publications

export results for "toc:db/conf/icitst/icitst2009.bht:"

 download as .bib file

@inproceedings{DBLP:conf/icitst/AbbasiMS09,
  author       = {Abdul Ghafoor Abbasi and
                  Sead Muftic and
                  Gernot Schm{\"{o}}lzer},
  title        = {A model and design of a security provider for Java applications},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402592},
  doi          = {10.1109/ICITST.2009.5402592},
  timestamp    = {Mon, 09 Aug 2021 17:01:45 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AbbasiMS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Al-SharafatN09,
  author       = {Wafa S. Al{-}Sharafat and
                  Reyadh Naoum},
  title        = {Significant of features selection for detecting network intrusions},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402584},
  doi          = {10.1109/ICITST.2009.5402584},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Al-SharafatN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Alghathbar09,
  author       = {Khaled Alghathbar},
  title        = {Low power design for silent pass authentication system},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402634},
  doi          = {10.1109/ICITST.2009.5402634},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Alghathbar09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlghathbarM09,
  author       = {Khaled Alghathbar and
                  Hanan A. Mahmoud},
  title        = {Noisy password security technique},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402537},
  doi          = {10.1109/ICITST.2009.5402537},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AlghathbarM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AliSS09,
  author       = {Ghulam Ali and
                  Noor Ahmed Shaikh and
                  Zubair Ahmed Shaikh},
  title        = {Towards development of a trust grid to balance between organization's
                  interests and employee's privacy},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402637},
  doi          = {10.1109/ICITST.2009.5402637},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AliSS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlimANR09,
  author       = {Sophia Alim and
                  Ruqayya Abdulrahman and
                  Daniel Neagu and
                  Mick J. Ridley},
  title        = {Data retrieval from online social network profiles for social engineering
                  applications},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402568},
  doi          = {10.1109/ICITST.2009.5402568},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/AlimANR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AllisonYC09,
  author       = {David S. Allison and
                  Hany F. El Yamany and
                  Miriam A. M. Capretz},
  title        = {Privacy and trust policies within {SOA}},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402540},
  doi          = {10.1109/ICITST.2009.5402540},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AllisonYC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlomariSW09,
  author       = {Mohammad Kamel Alomari and
                  Kuldeep Sandhu and
                  Peter Woods},
  title        = {E-government adoption in the Hashemite Kingdom of Jordan: Factors
                  from social perspectives},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402528},
  doi          = {10.1109/ICITST.2009.5402528},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AlomariSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlwiF09,
  author       = {Najwa Hayaati Mohd Alwi and
                  Ip{-}Shing Fan},
  title        = {Information security management in e-learning},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402507},
  doi          = {10.1109/ICITST.2009.5402507},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AlwiF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlzaabiBZ09,
  author       = {Mohammed Alzaabi and
                  Jawad Berri and
                  Mohamed Jamal Zemerly},
  title        = {On the fly generation of mobile learning structured multimedia content
                  from the web},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402636},
  doi          = {10.1109/ICITST.2009.5402636},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AlzaabiBZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AmirtahmasebiJK09,
  author       = {Kasra Amirtahmasebi and
                  Seyed Reza Jalalinia and
                  Saghar Khadem},
  title        = {A survey of {SQL} injection defense mechanisms},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402604},
  doi          = {10.1109/ICITST.2009.5402604},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AmirtahmasebiJK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AmranPP09,
  author       = {Ahmad Roshidi Amran and
                  Raphael C.{-}W. Phan and
                  David J. Parish},
  title        = {Metrics for network forensics conviction evidence},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402640},
  doi          = {10.1109/ICITST.2009.5402640},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AmranPP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AnandPH09,
  author       = {Ankit Anand and
                  Xiao{-}Hong Peng and
                  Richard Haywood},
  title        = {Efficient information retrieval via proxy caching mechanisms within
                  a lossy environment},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402566},
  doi          = {10.1109/ICITST.2009.5402566},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AnandPH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AnandarajaSKSV09,
  author       = {Nallusamy Anandaraja and
                  Nagappan Sriram and
                  C. Kathiresan and
                  Shibi Sebastian and
                  E. Vadivel},
  title        = {Web cum mobile based dynamic market information support for Agri-Horti
                  produces: Linking the farmers with market},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402541},
  doi          = {10.1109/ICITST.2009.5402541},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AnandarajaSKSV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AntonITMS09,
  author       = {Constantin Anton and
                  Laurentiu Ionescu and
                  Ion Tutanescu and
                  Alin Mazare and
                  Gheorghe Serban},
  title        = {Detecting errors in digital communications with {CRC} codes implemented
                  with {FPGA}},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402630},
  doi          = {10.1109/ICITST.2009.5402630},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AntonITMS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ApampaWA09,
  author       = {Kikelomo Maria Apampa and
                  Gary B. Wills and
                  David Argles},
  title        = {Towards security goals in summative e-assessment security},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402505},
  doi          = {10.1109/ICITST.2009.5402505},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ApampaWA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ArapinisCRR09,
  author       = {Myrto Arapinis and
                  Tom Chothia and
                  Eike Ritter and
                  Mark Ryan},
  title        = {Untraceability in the applied pi-calculus},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402514},
  doi          = {10.1109/ICITST.2009.5402514},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/ArapinisCRR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AreerachakulS09,
  author       = {Sirilak Areerachakul and
                  Siripun Sanguansintukul},
  title        = {Water quality classification using neural networks: Case study of
                  canals in Bangkok, Thailand},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402577},
  doi          = {10.1109/ICITST.2009.5402577},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AreerachakulS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ArefiA09,
  author       = {Mahmoodreza Arefi and
                  Amir Masoud Amini},
  title        = {The elements influencing the online price dispersion on Iranian electronic
                  retailers},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402531},
  doi          = {10.1109/ICITST.2009.5402531},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ArefiA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AyadiMZ09,
  author       = {Rami Ayadi and
                  Mohsen Maraoui and
                  Mounir Zrigui},
  title        = {Intertextual distance for Arabic texts classification},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402564},
  doi          = {10.1109/ICITST.2009.5402564},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AyadiMZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AyodeleZK09,
  author       = {Taiwo Ayodele and
                  Shikun Zhou and
                  Rinat Khusainov},
  title        = {Email classification: Solution with back propagation technique},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402583},
  doi          = {10.1109/ICITST.2009.5402583},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/AyodeleZK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AyodeleZK09a,
  author       = {Taiwo Ayodele and
                  Shikun Zhou and
                  Rinat Khusainov},
  title        = {Intelligent email prediction system {(IEPS)}},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402580},
  doi          = {10.1109/ICITST.2009.5402580},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/AyodeleZK09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AzenaborDSI09,
  author       = {Cyril Ehijie Azenabor and
                  Mohammad Dastbaz and
                  Charles A. Shoniregun and
                  Chris Imafidon},
  title        = {The society and electronic government usage},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402522},
  doi          = {10.1109/ICITST.2009.5402522},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AzenaborDSI09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AzevedoGSRFS09,
  author       = {Ryan Ribeiro de Azevedo and
                  Eric Rommel Dantas Galv{\~{a}}o and
                  Rubean Caitano dos Santos and
                  Cleyton M{\'{a}}rio de Oliveira Rodrigues and
                  Fred Freitas and
                  Marcelo J. Siqueira},
  title        = {An autonomic multiagent system ontology-based for management of security
                  of information},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402615},
  doi          = {10.1109/ICITST.2009.5402615},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AzevedoGSRFS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BarchettiGM09,
  author       = {Ugo Barchetti and
                  Anna Lisa Guido and
                  Luca Mainetti},
  title        = {A conceptual framework for business driven integration},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402527},
  doi          = {10.1109/ICITST.2009.5402527},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BarchettiGM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BaruahMS09,
  author       = {Siddhartha Baruah and
                  Anjana Kakoty Mahanta and
                  Kanak Chandra Sarma},
  title        = {A comparative study on client server technology and web technology
                  in design and implementation of an embedded system used for monitoring
                  and controlling of physical parameters},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402544},
  doi          = {10.1109/ICITST.2009.5402544},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BaruahMS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BarzegarSK09,
  author       = {Siamak Barzegar and
                  Mohammad Shojafar and
                  Mohammad Reza Keyvanpour},
  title        = {User interface in virtual learning environment},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402572},
  doi          = {10.1109/ICITST.2009.5402572},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BarzegarSK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BatistaMBFK09,
  author       = {Andr{\'{e}} Filipe de Moraes Batista and
                  Maria das Gra{\c{c}}as Bruno Marietto and
                  Gislene Cristina de O. Barbosa and
                  Robson dos Santos Fran{\c{c}}a and
                  Guiou Kobayashi},
  title        = {Multi-agent systems to build a computational middleware: {A} chatterbot
                  case study},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402586},
  doi          = {10.1109/ICITST.2009.5402586},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BatistaMBFK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BeranS09,
  author       = {Peter Paul Beran and
                  Erich Schikuta},
  title        = {An extended multi-layered blackboard approach for the optimization
                  of world-spanning query execution plans},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402518},
  doi          = {10.1109/ICITST.2009.5402518},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BeranS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BiggsV09,
  author       = {Stephen Biggs and
                  Stilianos Vidalis},
  title        = {Cloud Computing: The impact on digital forensic investigations},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402561},
  doi          = {10.1109/ICITST.2009.5402561},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BiggsV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BoldyrevOBTPL09,
  author       = {Sergey Boldyrev and
                  Ian Oliver and
                  Ronald Brown and
                  Juha{-}Matti Tuupola and
                  Arto Palin and
                  Antti Lappetel{\"{a}}inen},
  title        = {Network and content aware information management},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402569},
  doi          = {10.1109/ICITST.2009.5402569},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BoldyrevOBTPL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BoumhamdiJ09,
  author       = {Kaouthar Boumhamdi and
                  Zahi Jarir},
  title        = {Yet another approach for dynamic web service composition},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5435098},
  doi          = {10.1109/ICITST.2009.5435098},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/BoumhamdiJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BrescianiB09,
  author       = {Riccardo Bresciani and
                  Andrew Butterfield},
  title        = {A formal security proof for the {ZRTP} Protocol},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402595},
  doi          = {10.1109/ICITST.2009.5402595},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BrescianiB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/CaragataATS09,
  author       = {Daniel Caragata and
                  Safwan El Assad and
                  Ion Tutanescu and
                  Emil Sofron},
  title        = {Secure {TCP/IP} communications over {DVB-S/DVB-RCS} using chaotic
                  sequences},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402591},
  doi          = {10.1109/ICITST.2009.5402591},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/CaragataATS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ChanSA09,
  author       = {Yi{-}Tung F. Chan and
                  Charles A. Shoniregun and
                  Galyna A. Akmayeva},
  title        = {Mixed load balance strategy to improve performance efficacy for three
                  tiers Peer-to-Peer network topology},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402621},
  doi          = {10.1109/ICITST.2009.5402621},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ChanSA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ChanSAA09,
  author       = {Yi{-}Tung F. Chan and
                  Charles A. Shoniregun and
                  Galyna A. Akmayeva and
                  Ali Al{-}Dahoud},
  title        = {Applying semantic web and user behavior analysis to enforce the intrusion
                  detection system},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402616},
  doi          = {10.1109/ICITST.2009.5402616},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ChanSAA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ChangMM09,
  author       = {Chee Er Chang and
                  Faisal Mohd{-}Yasin and
                  Azhar Kassim Mustapha},
  title        = {RBStreX: Hardware {XML} parser for embedded system},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402548},
  doi          = {10.1109/ICITST.2009.5402548},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ChangMM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ChehabA09,
  author       = {Maya I. Chehab and
                  Ali E. Abdallah},
  title        = {Architectures for identity management},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402603},
  doi          = {10.1109/ICITST.2009.5402603},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ChehabA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/CokusluHE09,
  author       = {Deniz Cokuslu and
                  Abdelkader Hameurlain and
                  Kayhan Erciyes},
  title        = {Grid resource discovery based on web services},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402543},
  doi          = {10.1109/ICITST.2009.5402543},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/CokusluHE09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/DammakKRA09,
  author       = {Hajer Ben Mahmoud Dammak and
                  Raouf Ketata and
                  Taieb Ben Romdhane and
                  Samir Ben Ahmed},
  title        = {Modeling Quality Management System: {A} multi-agent approach},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402578},
  doi          = {10.1109/ICITST.2009.5402578},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/DammakKRA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/DucLKK09,
  author       = {Dang Nguyen Duc and
                  Hyunrok Lee and
                  Divyan M. Konidala and
                  Kwangjo Kim},
  title        = {Open issues in {RFID} security},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402510},
  doi          = {10.1109/ICITST.2009.5402510},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/DucLKK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Efstathopoulos09,
  author       = {Petros Efstathopoulos},
  title        = {Practical study of a defense against low-rate TCP-targeted DoS attack},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402593},
  doi          = {10.1109/ICITST.2009.5402593},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Efstathopoulos09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/EgiSO09,
  author       = {Hironori Egi and
                  Hiroshi Shigeno and
                  Ken{-}ichi Okada},
  title        = {Grasping contextual awareness inside aworkspace at the entrance to
                  support group interaction},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5435099},
  doi          = {10.1109/ICITST.2009.5435099},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/EgiSO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/FanBV09,
  author       = {Junfeng Fan and
                  Lejla Batina and
                  Ingrid Verbauwhede},
  title        = {Light-weight implementation options for curve-based cryptography:
                  {HECC} is also ready for {RFID}},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402516},
  doi          = {10.1109/ICITST.2009.5402516},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/FanBV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/FanHGSE09,
  author       = {Xinxin Fan and
                  Honggang Hu and
                  Guang Gong and
                  Eric M. Smith and
                  Daniel W. Engels},
  title        = {Lightweight implementation of Hummingbird cryptographic algorithm
                  on 4-bit microcontrollers},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402515},
  doi          = {10.1109/ICITST.2009.5402515},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/FanHGSE09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/FaresW09,
  author       = {Rasha Fares and
                  Mike Woodward},
  title        = {A new algorithm for controlling the mean queue length in a buffer
                  with time varying arrival rate},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402596},
  doi          = {10.1109/ICITST.2009.5402596},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/FaresW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/FazzikiNS09,
  author       = {Aziz El Fazziki and
                  Sana Nouzri and
                  Mohammed Sadgal},
  title        = {A multi-agent development approach based on the {MDA} for modelling
                  information systems},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402555},
  doi          = {10.1109/ICITST.2009.5402555},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/FazzikiNS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Fernando09,
  author       = {Juanita I. Fernando},
  title        = {The elephant in the room: Health information system security and the
                  user-level environment},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402503},
  doi          = {10.1109/ICITST.2009.5402503},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Fernando09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/FingerMRH09,
  author       = {Andreas Finger and
                  Holger Meyer and
                  Tim Rieger and
                  Andreas Heuer},
  title        = {Transactions and service level agreements for online music distribution},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402524},
  doi          = {10.1109/ICITST.2009.5402524},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/FingerMRH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/FioreNA09,
  author       = {Sandro Fiore and
                  Alessandro Negro and
                  Giovanni Aloisio},
  title        = {Data virtualization in grid environments through the GRelC Data Access
                  and Integration Service},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402520},
  doi          = {10.1109/ICITST.2009.5402520},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/FioreNA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/FirminoBGV09,
  author       = {Macedo Firmino and
                  Glaucio B. Brandao and
                  Ana M. G. Guerreiro and
                  Ricardo Alexsandro de Medeiros Valentim},
  title        = {Neural cryptography applied to key management protocol with mutual
                  authentication in {RFID} systems},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402512},
  doi          = {10.1109/ICITST.2009.5402512},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/FirminoBGV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/FischerM09,
  author       = {Daniel Fischer and
                  Bernd Markscheffel},
  title        = {State of the art in wireless {LAN} security - Results and implications
                  of an empirical study concerning German companies and federal authorities},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402585},
  doi          = {10.1109/ICITST.2009.5402585},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/FischerM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/FrancisHMM09,
  author       = {Lishoy Francis and
                  Gerhard P. Hancke and
                  Keith Mayes and
                  Konstantinos Markantonakis},
  title        = {Potential misuse of {NFC} enabled mobile phones with embedded security
                  elements as contactless attack platforms},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402513},
  doi          = {10.1109/ICITST.2009.5402513},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/FrancisHMM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/GajdosR09,
  author       = {Petr Gajdos and
                  Michal Radeck{\'{y}}},
  title        = {Web visualization support for disaster management},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402608},
  doi          = {10.1109/ICITST.2009.5402608},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/GajdosR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/GallardoB09,
  author       = {Justo Carracedo Gallardo and
                  Emilia P{\'{e}}rez Belleboni},
  title        = {Use of the new Smart Identity Card to reinforce electronic voting
                  guarantees},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402529},
  doi          = {10.1109/ICITST.2009.5402529},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/GallardoB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/GamloB09,
  author       = {Amina Gamlo and
                  Omaima Bamasak},
  title        = {Towards securing e-transactions in e-government systems of Saudi Arabia},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402546},
  doi          = {10.1109/ICITST.2009.5402546},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/GamloB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/GiambrunoSML09,
  author       = {Alessandro Giambruno and
                  Muhammad Awais Shibli and
                  Sead Muftic and
                  Antonio Lioy},
  title        = {MagicNET: {XACML} authorization policies for mobile agents},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402600},
  doi          = {10.1109/ICITST.2009.5402600},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/GiambrunoSML09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/GoncalvesF09,
  author       = {Joel Mana Gon{\c{c}}alves and
                  Fabio Neves Fernandes},
  title        = {The impact of information security on Latin America},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402535},
  doi          = {10.1109/ICITST.2009.5402535},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/GoncalvesF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/GrobertSW09,
  author       = {Felix Gr{\"{o}}bert and
                  Ahmad{-}Reza Sadeghi and
                  Marcel Winandy},
  title        = {Software distribution as a malware infection vector},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402538},
  doi          = {10.1109/ICITST.2009.5402538},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/GrobertSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/GronliG09,
  author       = {Tor{-}Morten Gr{\o}nli and
                  George Ghinea},
  title        = {Web 2.0 integration in a context-aware mobile {PIM} application},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402613},
  doi          = {10.1109/ICITST.2009.5402613},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/GronliG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/GuineeB09,
  author       = {Richard A. Guinee and
                  Marta Blaszczyk},
  title        = {A novel true random binary sequence generator based On a chaotic double
                  scroll oscillator combination with a pseudo random generator for cryptographic
                  applications},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402536},
  doi          = {10.1109/ICITST.2009.5402536},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/GuineeB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/GyongyosiI09,
  author       = {Laszlo Gyongyosi and
                  S{\'{a}}ndor Imre},
  title        = {Unduplicable quantum data medium based secret decryption and verification},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402590},
  doi          = {10.1109/ICITST.2009.5402590},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/GyongyosiI09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HabibP09,
  author       = {Muhammad Asif Habib and
                  Christian Praher},
  title        = {Object based dynamic separation of duty in {RBAC}},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402642},
  doi          = {10.1109/ICITST.2009.5402642},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/HabibP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HammamiS09,
  author       = {Nacereddine Hammami and
                  Mokhtar Sellam},
  title        = {Tree distribution classifier for automatic spoken Arabic digit recognition},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402575},
  doi          = {10.1109/ICITST.2009.5402575},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/HammamiS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HansenG09,
  author       = {Jarle Hansen and
                  Gheorghita Ghinea},
  title        = {Multi-platform Bluetooth remote control},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402609},
  doi          = {10.1109/ICITST.2009.5402609},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/HansenG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HaqPA09,
  author       = {Muhammad Ehsan ul Haq and
                  Muhammad Raza Perwaz and
                  Kabeer Ahmed Bhatti},
  title        = {Compact and user-friendly representation of IPv6 addressing approach
                  and masking},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402594},
  doi          = {10.1109/ICITST.2009.5402594},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/HaqPA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HarbBG09,
  author       = {Ali Harb and
                  Michel Beigbeder and
                  Jean{-}Jacques Girardot},
  title        = {Evaluation of question classification systems using differing features},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402567},
  doi          = {10.1109/ICITST.2009.5402567},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/HarbBG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HewettK09,
  author       = {Rattikorn Hewett and
                  Phongphun Kijsanayothin},
  title        = {On securing privacy in composite web service transactions},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402545},
  doi          = {10.1109/ICITST.2009.5402545},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/HewettK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Hooper09,
  author       = {Emmanuel Hooper},
  title        = {Intelligent strategies and techniques for effective cyber security,
                  infrastructure protection and privacy},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402581},
  doi          = {10.1109/ICITST.2009.5402581},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Hooper09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HourdinTLRR09,
  author       = {Vincent Hourdin and
                  Jean{-}Yves Tigli and
                  Stephane Lavirotte and
                  Ga{\"{e}}tan Rey and
                  Michel Riveill},
  title        = {Context-sensitive authorization for asynchronous communications},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402550},
  doi          = {10.1109/ICITST.2009.5402550},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/HourdinTLRR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/JafariMFO09,
  author       = {Said Jafari and
                  Fredrick Mtenzi and
                  Ronan Fitzpatrick and
                  Brendan O'Shea},
  title        = {An approach for developing comparative security metrics for healthcare
                  organizations},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402504},
  doi          = {10.1109/ICITST.2009.5402504},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/JafariMFO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/JainJRP09,
  author       = {Abhimanyu Jain and
                  Ashish Jain and
                  Aditya Raj and
                  Tushar Pahwa},
  title        = {Sequenced picture captcha: generation and its strength analysis},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5435097},
  doi          = {10.1109/ICITST.2009.5435097},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/JainJRP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/JalalBM09,
  author       = {Samir Kumar Jalal and
                  Subal Chandra Biswas and
                  Parthasarathi Mukhopadhyay},
  title        = {Webometric analysis of Central Universities in India: {A} study},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402605},
  doi          = {10.1109/ICITST.2009.5402605},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/JalalBM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/JomsriSC09,
  author       = {Pijitra Jomsri and
                  Siripun Sanguansintukul and
                  Worasit Choochaiwattana},
  title        = {A comparison of search engine using "tag title and abstract" with
                  CiteULike - An initial evaluation},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402563},
  doi          = {10.1109/ICITST.2009.5402563},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/JomsriSC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Juels09,
  author       = {Ari Juels},
  title        = {Power games in {RFID} security},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402509},
  doi          = {10.1109/ICITST.2009.5402509},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Juels09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KanyameeS09,
  author       = {Kanokwan Kanyamee and
                  Chanboon Sathitwiriyawong},
  title        = {A simple high-availability multiple-agent key recovery system},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402606},
  doi          = {10.1109/ICITST.2009.5402606},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KanyameeS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KaramiF09,
  author       = {Mohammad Karami and
                  Mohammad Fathian},
  title        = {A robust trust establishment framework using Dempster-Shafer theory
                  for MANETs},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402628},
  doi          = {10.1109/ICITST.2009.5402628},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KaramiF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KarimRH09,
  author       = {Zakaria Karim and
                  Karim Mohammed Rezaul and
                  Aliar Hossain},
  title        = {Towards secure information systems in online banking},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402619},
  doi          = {10.1109/ICITST.2009.5402619},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KarimRH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KaufmannS09,
  author       = {Sascha Kaufmann and
                  Christoph Schommer},
  title        = {e-Conviviality in web systems by the wisdom of crowds},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402530},
  doi          = {10.1109/ICITST.2009.5402530},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KaufmannS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KhanN09,
  author       = {Khaisar Muneebulla Khan and
                  Umesha Naik},
  title        = {Open source software for personal information managers and personal
                  knowledge management},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--12},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402558},
  doi          = {10.1109/ICITST.2009.5402558},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KhanN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KharazmiNA09,
  author       = {Sadegh Kharazmi and
                  Ali Farahmand Nejad and
                  Hassan Abolhassani},
  title        = {Freshness of Web search engines: Improving performance of Web search
                  engines using data mining techniques},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402607},
  doi          = {10.1109/ICITST.2009.5402607},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KharazmiNA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KirkhamDCSW09,
  author       = {Thomas Kirkham and
                  Ingo Dahn and
                  David W. Chadwick and
                  Marc Santos and
                  Sandra Winfield},
  title        = {Aggregating policies in user centric, real-time and distributed applications},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402553},
  doi          = {10.1109/ICITST.2009.5402553},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KirkhamDCSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KirkhamKGLJ09,
  author       = {Tom Kirkham and
                  Kleopatra Konstanteli and
                  Julian R. Gallop and
                  Constantinos Lalos and
                  Ian J. Johnson},
  title        = {Identity management in a mobile service orientated grid},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402547},
  doi          = {10.1109/ICITST.2009.5402547},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KirkhamKGLJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KoR09,
  author       = {Hoon Ko and
                  Carlos Ramos},
  title        = {A study on Security Status Matrix {(SSM)} in Urban Computing},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402573},
  doi          = {10.1109/ICITST.2009.5402573},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KoR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KretschmerG09,
  author       = {Mathias Kretschmer and
                  Gheorghita Ghinea},
  title        = {Seamless integration of unidirectional broadcast links into QoS-constrained
                  broadband Wireless Mesh Access Networks},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402587},
  doi          = {10.1109/ICITST.2009.5402587},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KretschmerG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/LexSGJ09,
  author       = {Elisabeth Lex and
                  Christin Seifert and
                  Michael Granitzer and
                  Andreas Juffinger},
  title        = {Cross-domain classification: Trade-off between complexity and accuracy},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402559},
  doi          = {10.1109/ICITST.2009.5402559},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/LexSGJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/LimT09,
  author       = {Boon Hoi Lim and
                  Chong Eng Tan},
  title        = {Simplified link reliability enhancement schemes for wireless networks},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402599},
  doi          = {10.1109/ICITST.2009.5402599},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/LimT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Lin09,
  author       = {Wen{-}Shan Lin},
  title        = {An integrated framework For modelling the adoptive behaviour of online
                  product recommendations},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402552},
  doi          = {10.1109/ICITST.2009.5402552},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Lin09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/LioudakisGAMVK09,
  author       = {Georgios V. Lioudakis and
                  Fotios Gogoulos and
                  Anna Antonakopoulou and
                  Aziz S. Mousas and
                  Iakovos S. Venieris and
                  Dimitra I. Kaklamani},
  title        = {An access control approach for privacy-preserving passive network
                  monitoring},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402632},
  doi          = {10.1109/ICITST.2009.5402632},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/LioudakisGAMVK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Liu09,
  author       = {Chenglian Liu},
  title        = {Improvement of authentication of anycast communication},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--3},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402618},
  doi          = {10.1109/ICITST.2009.5402618},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Liu09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/LuP09,
  author       = {Zheng Lu and
                  Taoxin Peng},
  title        = {The VoIP intrusion detection through a LVQ-based neural network},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402626},
  doi          = {10.1109/ICITST.2009.5402626},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/LuP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Maalouf09,
  author       = {Hoda W. Maalouf},
  title        = {Managing trade-offs between information loss and latency in real-time
                  distributed systems},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402614},
  doi          = {10.1109/ICITST.2009.5402614},
  timestamp    = {Fri, 03 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Maalouf09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MarieBB09,
  author       = {Rashiq Rafiq Marie and
                  Jonathan M. Blackledge and
                  Helmut E. Bez},
  title        = {On the fractal characteristics of Internet network traffic and its
                  utilization in covert communications},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402542},
  doi          = {10.1109/ICITST.2009.5402542},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MarieBB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MondalRB09,
  author       = {Arpita Mondal and
                  Kaushik Roy and
                  Prabir Bhattacharya},
  title        = {Secure biometric system for accessing home appliances via Internet},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402631},
  doi          = {10.1109/ICITST.2009.5402631},
  timestamp    = {Mon, 10 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MondalRB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MujtabaP09,
  author       = {Ghulam Mujtaba and
                  David J. Parish},
  title        = {Detection of applications within encrypted tunnels using packet size
                  distributions},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402624},
  doi          = {10.1109/ICITST.2009.5402624},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MujtabaP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MwakalingaKY09,
  author       = {Jeffy Mwakalinga and
                  Stewart Kowalski and
                  Louise Yngstr{\"{o}}m},
  title        = {Secure e-learning using a holistic and immune security framework},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402508},
  doi          = {10.1109/ICITST.2009.5402508},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MwakalingaKY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/NanCC09,
  author       = {Nan Lu and
                  Chunguang Zhou and
                  Laizhong Cui},
  title        = {The application of association rules algorithm on web search engine},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402610},
  doi          = {10.1109/ICITST.2009.5402610},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/NanCC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Nehinbe09,
  author       = {Joshua Ojo Nehinbe},
  title        = {Critical analyses of alerts swamping and intrusion redundancy},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402617},
  doi          = {10.1109/ICITST.2009.5402617},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Nehinbe09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/NiweS09,
  author       = {Moses Niwe and
                  Janis Stirna},
  title        = {Pattern approach to business-to-business transactions},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402523},
  doi          = {10.1109/ICITST.2009.5402523},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/NiweS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/NormanY09,
  author       = {Azah Anir Norman and
                  Norizan Mohd Yasin},
  title        = {An analysis of Information Systems Security Management {(ISSM):} The
                  hierarchical organizations vs. emergent organization},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402551},
  doi          = {10.1109/ICITST.2009.5402551},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/NormanY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/OSheaBC09,
  author       = {Karen O'Shea and
                  Zuhair Bandar and
                  Keeley A. Crockett},
  title        = {A semantic-based conversational agent framework},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402582},
  doi          = {10.1109/ICITST.2009.5402582},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/OSheaBC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/OliveiraO09,
  author       = {Frederico Guilherme {\'{A}}lvares de Oliveira J{\'{u}}nior and
                  Jos{\'{e}} Maria Parente de Oliveira},
  title        = {A heuristic-based runtime ranking for service composition},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402539},
  doi          = {10.1109/ICITST.2009.5402539},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/OliveiraO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/OmaryM09,
  author       = {Zanifa Omary and
                  Fredrick Mtenzi},
  title        = {Dataset threshold for the performance estimators in supervised machine
                  learning experiments},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402500},
  doi          = {10.1109/ICITST.2009.5402500},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/OmaryM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/OmaryMW09,
  author       = {Zanifa Omary and
                  Fredrick Mtenzi and
                  Bing Wu},
  title        = {How does politics affect electronic healthcare adoption},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402502},
  doi          = {10.1109/ICITST.2009.5402502},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/OmaryMW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/PatelB09,
  author       = {Alkesh Patel and
                  Ajit Balakrishnan},
  title        = {Generic framework for recommendation system using collective intelligence},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402612},
  doi          = {10.1109/ICITST.2009.5402612},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/PatelB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/PatelMP09,
  author       = {Samir B. Patel and
                  Tejas B. Mehta and
                  Shrikant N. Pradhan},
  title        = {A novel approach using transformation techniques and decision tree
                  algorithm on images for performing Digital Watermarking},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402565},
  doi          = {10.1109/ICITST.2009.5402565},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/PatelMP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/PereraANS09,
  author       = {Indika Perera and
                  Colin Allison and
                  Ross Nicoll and
                  Thomas Sturgeon},
  title        = {Towards successful 3D virtual learning - a case study on teaching
                  human computer interaction},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5435085},
  doi          = {10.1109/ICITST.2009.5435085},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/PereraANS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/PickeringG09,
  author       = {J. Adrian Pickering and
                  Christopher Gutteridge},
  title        = {A networked registration scheme for enhancing trust},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402620},
  doi          = {10.1109/ICITST.2009.5402620},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/PickeringG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/PinkasK09,
  author       = {Petr Pinkas and
                  Jana Kleckov{\'{a}}},
  title        = {The composite algebraic structure over capabilities and actions of
                  a system},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402562},
  doi          = {10.1109/ICITST.2009.5402562},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/PinkasK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/PontesG09,
  author       = {Elvis Pontes and
                  Adilson Eduardo Guelfi},
  title        = {{IDS} 3G - Third generation for intrusion detection: Applying forecasts
                  and return on security investment to cope with unwanted traffic},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402622},
  doi          = {10.1109/ICITST.2009.5402622},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/PontesG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/PrangchumpolST09,
  author       = {Dulyawit Prangchumpol and
                  Siripun Sanguansintukul and
                  Panjai Tantasanawong},
  title        = {Server virtualization by user behaviour model using a data mining
                  technique - {A} preliminary study},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402611},
  doi          = {10.1109/ICITST.2009.5402611},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/PrangchumpolST09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/QadeerMW09,
  author       = {Abdul Qadeer and
                  Waqar Mahmood and
                  Abdul Waheed},
  title        = {The website census},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402623},
  doi          = {10.1109/ICITST.2009.5402623},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/QadeerMW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/RadeckyG09,
  author       = {Michal Radeck{\'{y}} and
                  Petr Gajdos},
  title        = {Traffic simulation and intelligent agents},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402576},
  doi          = {10.1109/ICITST.2009.5402576},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/RadeckyG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/RahimiMR09,
  author       = {Arian Rahimi and
                  Sharhriar Mohammadi and
                  Rozita Rahimi},
  title        = {An efficient Iris authentication using chaos theory-based cryptography
                  for e-commerce transactions},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402532},
  doi          = {10.1109/ICITST.2009.5402532},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/RahimiMR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/RahmanRH09,
  author       = {Mohammad Rahman and
                  Karim Mohammed Rezaul and
                  Aliar Hossain},
  title        = {Finding an effective and secured information system in e-commerce
                  environment},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402521},
  doi          = {10.1109/ICITST.2009.5402521},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/RahmanRH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/RaufAA09,
  author       = {Bilal Rauf and
                  M. Faisal Amjad and
                  Kabeer Ahmed Bhatti},
  title        = {Performance evaluation of {IEEE} 802.11 {DCF} in comparison with {IEEE}
                  802.11e {EDCA}},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402597},
  doi          = {10.1109/ICITST.2009.5402597},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/RaufAA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/RekikKBF09,
  author       = {Wiem Rekik and
                  Maher Khemakhem and
                  Abdelfettah Belghith and
                  Jacques Fayolle},
  title        = {{PKI} and {UDDI} based trust centre: An attempt to improve web service
                  security},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402549},
  doi          = {10.1109/ICITST.2009.5402549},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/RekikKBF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/RixonF09,
  author       = {Daphne Rixon and
                  Mary Furey},
  title        = {Who regulates the regulator: Oversight of the Canadian Radio-television
                  and telecommunications Commission},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402589},
  doi          = {10.1109/ICITST.2009.5402589},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/RixonF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/RomliC09,
  author       = {Awanis M. Romli and
                  Arnidcha P. Cha},
  title        = {An expert system for stress management},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402579},
  doi          = {10.1109/ICITST.2009.5402579},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/RomliC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SaadSZ09,
  author       = {Saidah Saad and
                  Naomie Salim and
                  Hakim Zainal},
  title        = {Islamic knowledge ontology creation},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402635},
  doi          = {10.1109/ICITST.2009.5402635},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/SaadSZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SarantisA09,
  author       = {Demetrios Sarantis and
                  Dimitris Askounis},
  title        = {A project management ontology as a reference for e-Government projects},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402526},
  doi          = {10.1109/ICITST.2009.5402526},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SarantisA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ShaikhD09,
  author       = {A. R. Rizwana Shaikh and
                  Satish Devane},
  title        = {Verification of security properties of payment protocol using {AVISPA}},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402598},
  doi          = {10.1109/ICITST.2009.5402598},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ShaikhD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ShemailiYZ09,
  author       = {Mouza Ahmad Bani Shemaili and
                  Chan Yeob Yeun and
                  Mohamed Jamal Zemerly},
  title        = {{RFID} lightweight mutual authentication using shrinking generator},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402511},
  doi          = {10.1109/ICITST.2009.5402511},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ShemailiYZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ShiZY09,
  author       = {Peipei Shi and
                  Bo Zhu and
                  Amr M. Youssef},
  title        = {A rotary {PIN} entry scheme resilient to shoulder-surfing},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402625},
  doi          = {10.1109/ICITST.2009.5402625},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ShiZY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ShriramVVS09,
  author       = {Shriram K. Vasudevan and
                  K. Venkateshwaran and
                  V. Vaithiyanathan and
                  Subashri Vasudevan},
  title        = {Design of analog to digital converter for {SDR} (Software Defined
                  Radio)},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402602},
  doi          = {10.1109/ICITST.2009.5402602},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ShriramVVS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SidorovaB09,
  author       = {Julia Sidorova and
                  Toni Badia},
  title        = {Syntactic learning for ESEDA.1, a tool for enhanced speech emotion
                  detection and analysis},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402574},
  doi          = {10.1109/ICITST.2009.5402574},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SidorovaB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/StephanWB09,
  author       = {Jean Stephan and
                  Nagi Wakim and
                  Youakim Badr},
  title        = {E-profile-based security for critical transactions in web applications},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402525},
  doi          = {10.1109/ICITST.2009.5402525},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/StephanWB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/StillerRA09,
  author       = {Carsten Stiller and
                  Fred Ro{\ss} and
                  Christoph Ament},
  title        = {Towards spatial awareness in recommender systems},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402633},
  doi          = {10.1109/ICITST.2009.5402633},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/StillerRA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SukumaranS09,
  author       = {Sanath Sukumaran and
                  M. V. Shetty},
  title        = {Knowledge Management {(KM)} in automobile: Application of a value
                  chain {(VC)} approach using {KM} tools},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402554},
  doi          = {10.1109/ICITST.2009.5402554},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SukumaranS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Tabatabaei09,
  author       = {Shayesteh Tabatabaei},
  title        = {Multiple criteria routing algorithms to increase durability path in
                  mobile ad hoc networks},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402627},
  doi          = {10.1109/ICITST.2009.5402627},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/Tabatabaei09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/TahajodID09,
  author       = {Maryam Tahajod and
                  Azadeh Iranmehr and
                  Mohammad Reza Darajeh},
  title        = {A roadmap to develop enterprise security architecture},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402639},
  doi          = {10.1109/ICITST.2009.5402639},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/TahajodID09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/TinaboMO09,
  author       = {Rose Tinabo and
                  Fredrick Mtenzi and
                  Brendan O'Shea},
  title        = {Anonymisation vs. Pseudonymisation: Which one is most useful for both
                  privacy protection and usefulness of e-healthcare data},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402501},
  doi          = {10.1109/ICITST.2009.5402501},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/TinaboMO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/TolnaiS09,
  author       = {Annette Tolnai and
                  Sebastiaan H. von Solms},
  title        = {Solving security issues using Information Security Awareness Portal},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402560},
  doi          = {10.1109/ICITST.2009.5402560},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/TolnaiS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Vasilescu09,
  author       = {Rares Vasilescu},
  title        = {Architectural model for a high performance content management system},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402570},
  doi          = {10.1109/ICITST.2009.5402570},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Vasilescu09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ViscontiT09,
  author       = {Andrea Visconti and
                  Hooman Tahayori},
  title        = {Detecting misbehaving nodes in {MANET} with an artificial immune system
                  based on type-2 fuzzy sets},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402588},
  doi          = {10.1109/ICITST.2009.5402588},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ViscontiT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/WangY09,
  author       = {Tzong{-}I Wang and
                  Ting Yuan Yeh},
  title        = {A fault-tolerant mechanism for reducing pollution attacks in peer-to-peer
                  networks},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402601},
  doi          = {10.1109/ICITST.2009.5402601},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/WangY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/WilkinsN09,
  author       = {Rebecca Wilkins and
                  Abel Nyamapfene},
  title        = {Usability driven website design - An equine sports case study},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402571},
  doi          = {10.1109/ICITST.2009.5402571},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/WilkinsN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/WillemsDKM09,
  author       = {Christian Willems and
                  Wesam Dawoud and
                  Thomas Klingbeil and
                  Christoph Meinel},
  title        = {Security in Tele-Lab - Protecting an online virtual lab for security
                  training},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402506},
  doi          = {10.1109/ICITST.2009.5402506},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/WillemsDKM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/WohrerLB09,
  author       = {Alexander W{\"{o}}hrer and
                  Thomas Lustig and
                  Peter Brezany},
  title        = {Scalable relational query results handling in service oriented architectures},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402517},
  doi          = {10.1109/ICITST.2009.5402517},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/WohrerLB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/WongthongthamKK09,
  author       = {Pornpit Wongthongtham and
                  Natsuda Kasisopha and
                  Surasak Komchaliaw},
  title        = {Community-oriented software engineering ontology evolution},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402557},
  doi          = {10.1109/ICITST.2009.5402557},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/WongthongthamKK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/WongthongthamZ09,
  author       = {Pornpit Wongthongtham and
                  Behrang Zadjabbari},
  title        = {Signifying ontology complexity for knowledge sharing},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402638},
  doi          = {10.1109/ICITST.2009.5402638},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/WongthongthamZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/WuL09,
  author       = {Tsang{-}Hung Wu and
                  Shyh{-}Chang Liu},
  title        = {A research on the establishment of enterprise information architecture},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402556},
  doi          = {10.1109/ICITST.2009.5402556},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/WuL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/YiXD09,
  author       = {Gao Yi and
                  Lin Xinda and
                  Wang Dong},
  title        = {A computer based strategy design for automobile spare part logistics
                  network optimization},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402534},
  doi          = {10.1109/ICITST.2009.5402534},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/YiXD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ZamaniMAJTZ09,
  author       = {Mazdak Zamani and
                  Azizah Bt Abdul Manaf and
                  Rabiah Bt Ahmad and
                  Farhang Jaryani and
                  Hamed Taherdoost and
                  Akram M. Zeki},
  title        = {A secure audio steganography approach},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402644},
  doi          = {10.1109/ICITST.2009.5402644},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ZamaniMAJTZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ZhengO09,
  author       = {Xianghan Zheng and
                  Vladimir A. Oleshchuk},
  title        = {Trust-based framework for security enhancement of {P2PSIP} communication
                  systems},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402533},
  doi          = {10.1109/ICITST.2009.5402533},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ZhengO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ZhouKP09,
  author       = {Wei Zhou and
                  Gaurav Kapoor and
                  Selwyn Piramuthu},
  title        = {Modified Slotted {ALOHA} protocol for {RFID} tag collisions},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402629},
  doi          = {10.1109/ICITST.2009.5402629},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ZhouKP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ZolfagharBM09,
  author       = {Kiyana Zolfaghar and
                  Arash Barfar and
                  Shahriar Mohammadi},
  title        = {A framework for online counter terrorism},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402641},
  doi          = {10.1109/ICITST.2009.5402641},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ZolfagharBM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icitst/2009,
  title        = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST15451.2009},
  doi          = {10.1109/ICITST15451.2009},
  isbn         = {978-1-4244-5648-2},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics