default search action
6th ICITST 2011: Abu Dhabi, UAE
- 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011. IEEE 2011, ISBN 978-1-908320-00-1
- Hilal Houssain, Mohamad Badra, Turki F. Al-Somani:
Hardware implementations of Elliptic Curve Cryptography in Wireless Sensor Networks. 1-6 - Turki F. Al-Somani, Hilal Houssain:
Implementation of GF(2m) Elliptic Curve cryptoprocessor on a Nano FPGA. 7-12 - Hamad Marzouqi, Khaled Salah, Mahmoud Al-Qutayri, Chan Yeob Yeun:
A unified countermeasure against side channel attacks on cryptographic RFID. 13-18 - Huwida Said, Mário A. M. Guimarães, Noora Al Mutawa, Ibtesam Al Awadhi:
Forensics and war-driving on unsecured wireless network. 19-24 - Mohamed Elmoghany, Mohamed Diab, Moustafa Kassem, Mustafa Khairallah, Omar El Shahat, Wael Sharkasy:
FPGA implementation of high speed XTS-AES for data storage devices. 25-28 - Muna Abdulla Al Shehhi, Joonsang Baek, Chan Yeob Yeun:
The use of Boolean functions in stream ciphers. 29-33 - Khalfan AlMarashda, Yousuf Alsalami, Khaled Salah, Thomas Martin:
On the security of inclusion or omission of MixColumns in AES cipher. 34-39 - Noura Al Ebri, Joonsang Baek, Chan Yeob Yeun:
Study on Secret Sharing Schemes (SSS) and their applications. 40-45 - Ameera Salem Abdouli, Joonsang Baek, Chan Yeob Yeun:
Survey on computationally hard problems and their applications to cryptography. 46-52 - Hajer Al Housani, Joonsang Baek, Chan Yeob Yeun:
Survey on certificateless public key cryptography. 53-58 - Lezhen Ling, Junguo Liao:
Anonymous electronic voting protocol with traceability. 59-66 - Fatma Ahmad Bazargan, Chan Yeob Yeun, Mohamed Jamal Zemerly:
Understanding the security challenges of virtualized environments. 67-72 - Amr Sayed Abdel Fattah, Salwa H. El-Ramly, Magdy M. Ibrahim, Ahmed Abdel-Hafez:
Synchronization recovery of chaotic signal through imperfect channel using optimization approach. 73-78 - Amr Sayed Abdel Fattah, Salwa H. El-Ramly, Magdy M. Ibrahim, Ahmed Abdel-Hafez:
Denoising algorithm for noisy chaotic signal by using wavelet transform: Comprehensive study. 79-85 - Daniele Fournier-Prunaret, Pascal Chargé, Laura Gardini:
Chaos generation from 1D or 2D circuits including switches. 86-90 - René Lozi, Estelle Cherrier:
Noise-resisting ciphering based on a chaotic multi-stream pseudo-random number generator. 91-96 - Kassem Ahmad, Bassem Bakhache, Safwan El Assad, Daniel Caragata, Maryline Chetto:
Multicast security protocol over satellite DVB based on chaotic sequences. 97-102 - SeongHan Shin, Kazukuni Kobara, Hideki Imai:
A secure public cloud storage system. 103-109 - Imad M. Abbadi, Cornelius Namiluko:
Dynamics of trust in Clouds - Challenges and research agenda. 110-115 - Kheng Kok Mar:
Secured Virtual Diffused File System for the cloud. 116-121 - Nezar Nassr, Eric Steegmans:
A parameterized RBAC access control model for WS-BPEL orchestrated composite web services. 122-127 - G. Hughes, Dhiya Al-Jumeily, Abir Jaafar Hussain:
Research, design and development review of the Cloud Computing Management System (CCMS). 128-131 - Nitha Rachel Suresh, Suresh V. Mathew:
Security concerns for cloud computing in aircraft data networks. 132-136 - Bo Mi, Jianqiu Cao:
A novel key establishment scheme for wireless sensor networks based on complex network synchronization. 137-141 - Xin Hu, Yonglin Sun, Yongjun Wang, Zhanrui Ren, Jie Liu:
Two algorithms for Network Security Gradient marking. 142-147 - Jumpei Arakawa, Koichi Sasada:
A decentralized access control mechanism using authorization certificate for distributed file systems. 148-153 - M. Bavafa, Zahra Taheri Hanjani, N. Navidi:
A survey on space-time & high-rate redundant. 154-158 - Yonglin Sun, Yongjun Wang, Xin Hu, Zhanrui Ren, Jie Liu:
A new perspective of network vulnerability analysis using Network Security Gradient. 159-163 - Martin Kuba:
Automated trust negotiation in identity federations using OWL-based abduction of missing credentials. 164-169 - Anam Tariq, Muhammad Usman Akram, Shoab Ahmad Khan:
An automated system for fingerprint classification using singular points for biometric security. 170-175 - Pavel Lozhnikov, Oksana Chernikova:
Handwriting dynamics as a means of authentication. 176-179 - Muhammad Usman Akram, Anam Tariq, Shoab Ahmad Khan:
Retinal recognition: Personal identification using blood vessels. 180-184 - Hiroyuki Yoshimura:
Fingerprint templates with high recognition accuracy and high security generated by discrete fractional sine transform. 185-190 - Maleika Heenaye-Mamode Khan, Naushad Mamode Khan:
Dorsal hand vein biometric using Independent Component Analysis (ICA). 191-195 - Maryam Mehrnejad, Abbas Ghaemi Bafghi, Ahad Harati, Ehsan Toreini:
Multiple SEIMCHA: Multiple semantic image CAPTCHA. 196-201 - Léa D. Cot, Christian Bès:
Study of the robustness of an enhanced CSK system by using the Extended Kalman Filter. 202-207 - Petre Anghelescu, Silviu Ionita, Vasile-Gabriel Iana:
FPGA implementation of cellular automata based encryption algorithm for internet communications. 208-213 - Farhan Bashir Shaikh, Sajjad Haider:
Security threats in cloud computing. 214-219 - Hadi H. Abdlrudha, Qassim Nasir:
Low complexity high security image encryption based on Nested PWLCM Chaotic Map. 220-225 - Hassan Noura, Safwan El Assad, Calin Vladeanu, Daniel Caragata:
An efficient and secure SPN cryptosystem based on chaotic control parameters. 226-231 - Aymen Boudguiga, Maryline Laurent:
An EAP ID-based authentication method for wireless networks. 232-239 - Ayman Mukaddam, Imad H. Elhajj:
Hop count variability. 240-244 - Dimitris Zisiadis, Spyros Kopsidas, Argyris Varalis, Leandros Tassiulas:
Mailbook: A social network against spamming. 245-249 - Asjad Amin, Haseeb Ahmed, Abubakar Rafique, Muhammad Junaid Nawaz, Muhammad Salahudin, Zulfiqar Ahmed:
Designing a hierarchical DHCP server's model to automatically provide dedicated IP address anywhere in the world with mobility. 250-253 - Azzam Mourad, Hadi Otrok, Hamdi Yahyaoui, Lama Baajour:
Toward an abstract language on top of XACML for web services security. 254-259 - Jane Saetent, Nattawut Vejkanchana, Suphamit Chittayasothorn:
A thin client application development using OCL and conceptual schema. 260-265 - Ramez Shamseldin:
Dynamically complex system using adaptive simulation for interconnected nodes. 266-273 - Laurentiu Ionescu, Constantin Anton, Ion Tutanescu, Alin Mazare, Gheorghe Serban:
Reed-Muller decoder with associative memories. 274-277 - Daniel Caragata, Safwan El Assad, Charles A. Shoniregun, Galyna A. Akmayeva:
UMTS security: Enhancement of identification, authentication and key agreement protocols. 278-282 - Muhammad Qasim Saeed, Colin D. Walter:
A Record Composition/Decomposition attack on the NDEF Signature Record Type Definition. 283-287 - Basheer Al-Duwairi, I. Khater, Omar M. Al-Jarrah:
Texture Analysis-Based Image Spam Filtering. 288-293 - Hanno Hildmann, Sebastien Nicolas, Fabrice Saffre:
Critical infrastructure protection through distributed reactive demand-side management. 294-301 - Soulaf Saab, Wassim Itani, Ayman I. Kayssi, Ali Chehab, Cesar Ghali:
Secure delay-tolerant communications in the presence of oppressive governments. 302-307 - Maitha Salem Al Mazrouei, Sundaravalli Narayanaswami:
Mobile adhoc networks: A simulation based security evaluation and intrusion prevention. 308-313 - Arben Asllani, Amjad Ali:
Securing information systems in airports: A practical approach. 314-318 - Georgi T. Tsenov, Valeri M. Mladenov, Ina Taralova:
Synchronization of Sigma Delta Modulators. 319-322 - Jared D. DeMott, Richard J. Enbody, William F. Punch III:
Towards an automatic exploit pipeline. 323-329 - Ayman A. Hanafy, Sherif Hazem Noureldin, Marianne A. Azer:
Immunizing the SAODV protocol against routing information disclosure. 330-334 - Ehsan Toreini, Maryam Mehrnejad:
A novel method in fuzzy data clustering based on chaotic PSO. 335-340 - Tina Francis:
Proximity aware overlays in peer-to-peer networks. 341-344 - Khaled Salah, M. Al-Saba, M. Akhdhor, O. Shaaban, M. I. Buhari:
Performance evaluation of popular Cloud IaaS providers. 345-349 - Imad M. Abbadi, Cornelius Namiluko, Andrew P. Martin:
Insiders analysis in Cloud computing focusing on home healthcare system. 350-357 - Faisal Al Ameiri, Khaled Salah:
Evaluation of popular application sandboxing. 358-362 - Faisal Al Ameiri, Mohamed Jamal Zemerly, Mohamed Al Marzouqi:
Mobile Arabic sign language. 363-367 - George S. Oreku:
Key complication procedure in data driven ciphers based on controlled substitution-permutation networks. 368-372 - Umm-e Laila, Syed Zain Ali Shah, Nadia Ishaque:
Using Keystroke-Level Model to analyze IOS optimization techniques. 373-377 - Noora Albalooshi, Nader Mohamed, Jameela Al-Jaroodi:
The challenges of Arabic language use on the Internet. 378-382 - Jong-Hoon Hoon Lee, Jung-Tae Tae Kim, HeeKyung Lee, Eui-Hyun H. Paik:
Design and implementation of the Geo-Context Engine for semantic social media service. 383-387 - Marcus Vinicius Carvalho Guelpeli, Ana Cristina Bicharra Garcia, António Horta Branco:
The process of summarization in the pre-processing stage in order to improve measurement of texts when clustering. 388-395 - Maryline Chetto, Hussein El Ghor, Rafic Hage Chehade:
Real-time scheduling for energy harvesting sensors. 396-402 - P. R. Lakshmi Eswari:
A process framework for securing an e-Learning ecosystem. 403-407 - Christian Willems, Thomas Klingbeil, Lukas Radvilavicius, Antanas Cenys, Christoph Meinel:
A distributed virtual laboratory architecture for cybersecurity training. 408-415 - Mahmoud Khonji, Youssef Iraqi, Andrew Jones:
Mitigation of spear phishing attacks: A Content-based Authorship Identification framework. 416-421 - Mahmoud Khonji, Youssef Iraqi, Andrew Jones:
Lexical URL analysis for discriminating phishing and legitimate e-mail messages. 422-427 - Ahmed A. Sabeeh, Arash Habibi Lashkari:
Users' perceptions on mobile devices security awareness in Malaysia. 428-435 - Hassan Shakeri, Abbas Ghaemi Bafghi:
Propagation of trust and confidence using intervals. 436-441 - Markus Gruber, Florian Fankhauser, Stefan Taber, Christian Schanes, Thomas Grechenig:
Trapping and analyzing malicious VoIP traffic using a honeynet approach. 442-447 - Jens Hasselbach, Patrick Aichroth:
Access control and content authentication for hybrid DVB-T2/P2P broadcasting. 448-453 - Pradhumna Shrestha, Michael Hempel, Tao Ma, Dongming Peng, Hamid Sharif:
A general attack method for steganography removal using Pseudo-CFA re-interpolation. 454-459 - Mohamed Zayed, Asma Ouari, Meriem Derraschouk, Youcef Chibani:
An effective hybrid thresholding technique for degraded documents images binarization. 460-465 - Hend Al Tair, Mohamed Jamal Zemerly, Mahmoud Al-Qutayri, Marcello Leida:
Pro-active multi-agent recommender system for travelers. 466-471 - Hadiseh Seyyed Alipour, Mehdi Sabbari, Eslam Nazemi:
A policy based access control model for web services. 472-477 - Gang Wang, Kunming Nie:
A framework of VI-based ranking and recommendation of web services. 478-483 - Nai-Wei Lo, Shiou-Huei Ruan, Tzong-Chen Wu:
Ownership transfer protocol for RFID objects using lightweight computing operators. 484-489 - Woo Ram Kim, Yoon Seok Chang:
A study on RFID code structure for traceability system of electric vehicle batteries. 490-494 - Ramzi Bassil, Wissam El-Beaino, Ayman I. Kayssi, Ali Chehab:
A PUF-based ultra-lightweight mutual-authentication RFID protocol. 495-499 - Masoumeh Safkhani, Nasour Bagheri, Majid Naderi:
Vulnerabilities in a new RFID access control protocol. 500-503 - Salwa Adriana Saab, Ayman I. Kayssi, Ali Chehab:
A decentralized energy-aware key management scheme for Wireless Sensor Networks. 504-508 - Mohamed B. Abdelhalim, Mohamed S. El-Mahallawy, M. Ayyad, Adel ElHennawy:
Implementation of a modified lightweight cryptographic TEA algorithm in RFID system. 509-513 - Youssef Gahi, Mouhcine Guennoun, Zouhair Guennoun, Khalil El-Khatib:
Encrypted processes for oblivious data retrieval. 514-518 - Hanno Hildmann, Sebastien Nicolas, Fabrice Saffre:
Demand-side management for air conditioning. 519-524 - Mohammad Moein Taheri, Kamran Zamanifar:
2-phase optimization method for energy aware scheduling of virtual machines in cloud data centers. 525-530 - Kris Scott, Rachid Benlamri:
Context-aware real-time framework for local collaboration. 531-535 - Sheheryar Malik, Fabrice Huet:
Virtual Cloud: Rent Out the Rented Resources. 536-541 - Hun-lung Lim, Tai-Myoung Myoung Chung:
Performace evaluation of relative positioning based on low-cost GPS and VANET. 542-543 - Kin Fai Poon, Anis Ouali:
A MILP based design tool for FTTH access networks with consideration of demand growth. 544-549 - Hanno Hildmann:
Behavioural game AI - A theoretical approach. 550-555 - Amna AlDahak AlShamsi, M. AlMarzouqi, Lakmal D. Seneviratne:
Evaluating USARSim for use in fire search and rescue. 556-561 - Ali Safari Mamaghani, Mohammad Reza Meybodi:
An application of Imperialist Competitive Algorithm to solve the quadratic assignment problem. 562-565 - Mehran Garmehi, Morteza Analoui:
An economical mechanism for multicasting of content among servers of Hybrid CDN-P2P networks. 566-571 - Abdur Rahim Choudhary:
Policy rule-sets for policy based systems. 572-577 - Hussam M. N. Al Hamadi, Chan Yeob Yeun, Mohamed Jamal Zemerly, Mahmoud Al-Qutayri, Amjad Gawanmeh:
Formal modeling and verification of DLK protocol. 578-583 - Markus Jung, Georg Kienesberger, Wolfgang Granzer, Martin Unger, Wolfgang Kastner:
Privacy enabled web service access control using SAML and XACML for home automation gateways. 584-591 - Mhamed Zineddine:
Automated healthcare information privacy and security: UAE case. 592-595 - Ahmed B. Mahmood, Robert D. Dony:
Segmentation based encryption method for medical images. 596-601 - Ghazi Ben Ayed, Solange Ghernaouti-Helie:
Privacy requirements specification for digital identity management systems implementation: Towards a digital society of privacy. 602-607 - Salem Benferhat, Khalid Bouriche, Mohamed Ouzarf:
Encoding default-based SELinux-security policy in Organization-Based Access Control Model. 608-613 - Eric Southern, Abdelkader H. Ouda, Abdallah Shami:
Solutions to security issues with legacy integration of GSM into UMTS. 614-619 - Eduardo Rocha, Paulo Salvador, António Manuel Duarte Nogueira:
A real-time traffic classification approach. 620-626 - Jarkko Ekberg, Jorma Ylinen, Pekka Loula:
Network behaviour anomaly detection using Holt-Winters algorithm. 627-631 - Tomasz Bilski:
Security-functionality tradeoffs in IP transition phase. 632-638 - Devendra Mani Tripathi:
A note on modified SET protocol for mobile payment. 639-641 - Amjad Gawanmeh, Sofiène Tahar:
Modeling and verification of firewall configurations using domain restriction method. 642-647 - S. Jeyalatha, B. Vijayakumar:
Design and implementation of a web structure mining algorithm using breadth first search strategy for academic search application. 648-654 - Jung-Tae Tae Kim, Jong-Hoon Hoon Lee, HeeKyung Lee, Eui-Hyun H. Paik:
Location-based personalized social media service for the Smart Phone: Distributed social contents sharings. 655-659 - Thomas Bosch, Brigitte Mathiak:
XSLT transformation generating OWL ontologies automatically based on XML Schemas. 660-667 - Asjad Amin, Haseeb Ahmad Qureshi, Muhammad Junaid Nawaz, Muhammad Yasir Habib, Waqas Anjum:
Modified run length encoding scheme with introduction of bit stuffing for efficient data compression. 668-672 - Salwa Belaqziz, Abdelaziz El Fazziki, Mohammed El Adnani, Michel Le Page:
An Agent-Based Modeling approach for decision-making in Gravity Irrigation Systems. 673-680 - Chigusa Yamamura, Kazuhiro Otsuki, Arisa Fujii, Kiyohiko Ishikawa:
Identity management architecture for integrated personalized service on TV. 681-682 - Mohammad Reza Sohizadeh Abyaneh:
On the privacy of two tag ownership transfer protocols for RFIDs. 683-688 - Masoumeh Safkhani, Nasour Bagheri, Majid Naderi, Somitra Kumar Sanadhya:
Security analysis of LMAP++, an RFID authentication protocol. 689-694 - Nazish Irfan, Mustapha C. E. Yagoub, Khelifa Hettak:
Redundant reader elimination for directional antenna in RFID systems. 695-700 - Mahmoud A. Alahmad, Muhammad F. Zulfiqar, Hosen Hasna, Timothy Wisnieski, Nasser A. Aljuhaishi, Hamid Sharif:
Technologies enabling sustainability in the built environment. 701-706 - Bernd Markscheffel, Daniela Büttner, Daniel Fischer:
Desktop search engines - A state of the art comparison. 707-712 - Flávio Dumortout de Mendonça Júnior, Daniela Gorski Trevisan, Thiago Cortat Tavares, José Luiz Thomaselli Nogueira:
A-CitizenMobile: A case study for blind users. 713-717 - Benjamin Hirsch, Jason W. P. Ng:
Education beyond the cloud: Anytime-anywhere learning in a smart campus environment. 718-723 - Arianna Del Soldato, Pasquale Lazzareschi, Maurizio Martinelli, Giuseppe Vasarelli:
The use of detection systems to improve the quality of the Italian Public Administration. 724-725 - Hicham Sadok:
E-Banking in Morocco: Study of some specifying factors. 726-731 - Farshad Rahimiasl, Reza Azmi:
SeKMAC: A secure model for key management and access control in cryptographic file system. 732-737 - Sami Noponen, Jarno Salonen, Hanna-Miina Sihvonen, Taina A. Kurki:
Systematic literature review of virtual role. 738-743 - Xian Zhang, Martin Leucker, Wei Dong:
An event pattern language for runtime monitoring based on AOP. 744-751 - Galoh Rashidah Haron, Kang Siong Ng:
Extrapolating security requirements to an established software process: Version 1.0. 752-757 - Boustia Narhimene, Aïcha Mokhtari:
Temporal context in multilevel access control model. 758-763 - Norah Farooqi, Siobhán North:
Trust-based access control for XML databases. 764-765 - Hanan Al Obaidli, Asif Iqbal:
Digital forensics education in UAE. 766-770 - Noora Al Mutawa, Ibtesam Al Awadhi, Ibrahim M. Baggili, Andrew Marrington:
Forensic artifacts of Facebook's instant messaging service. 771-776 - Waleed Halboob, Muhammad Abulaish, Khaled Alghathbar:
Quaternary privacy-levels preservation in computer forensics investigation process. 777-782 - Theodoros Tzouramanis:
A robust watermarking scheme for relational databases. 783-790 - Mahmood Salehi, Hamed Samavati, Mehdi Dehghan:
Performance assessment of OLSR protocol under routing attacks. 791-796 - Michael Naseimo Daikpor, Oluwole Adegbenro:
Concurrent realization of the multiply-by-7 Elliptic Curve Scalar Multiplication algorithm. 797-804
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.