


default search action
5th ICITST 2010: London, UK
- 5th International Conference for Internet Technology and Secured Transactions, ICITST 2010, London, United Kingdom, November 8-10, 2010. IEEE 2010, ISBN 978-1-4244-8862-9

- Abdelhaq Belkadi, Abdelaziz El Fazziki, Ait Ouahman Abdallah, Ibourk Aomar:

Toward an agent based approach for decisional systems modeling. 1-8 - Saman Hina, Eric Atwell, Owen A. Johnson:

Secure information extraction from clinical documents using SNOMED CT gazetteer and natural language processing. 1-5 - Huseyin Kusetogullari, Amir Yavariabdi, Mark S. Leeson, Evor L. Hines:

Genetic algorithm based rainbow network flow optimization for multiple description coding in lossy network. 1-6 - Iftikhar Ahmad, Azween Vitra Abdullah, Abdullah Sharaf Alghamdi:

Remote to Local attack detection using supervised neural network. 1-6 - Kamal A. ElDahshan, Hany M. S. Lala:

Mining uncertain data warehouse. 1-7 - Shiva Nadi, Mohamadhosein Hussein Saraee, Mohamad Davarpanah Jazi:

A fuzzy recommender system for dynamic prediction of user's behavior. 1-5 - Mohammad Ahmadi Livani, Mahdi Abadi:

Distributed PCA-based anomaly detection in wireless sensor networks. 1-8 - Prakash S. Raghavendra, Shreya Roy Chowdhury, Srilekha Vedula Kameswari:

Comparative study of neural networks and k-means classification in web usage mining. 1-7 - Zeeshan Shafi Khan, Nabila Akram, Khaled Alghathbar, Muhammad Sher, Rashid Mehmood:

Secure single packet IP Traceback mechanism to identify the source. 1-5 - Pieter Burghouwt, Marcel E. M. Spruit, Henk J. Sips:

Detection of botnet collusion by degree distribution of domains. 1-8 - Maximilian Ronniger, Florian Fankhauser, Christian Schanes, Thomas Grechenig:

A robust and flexible test environment for VoIP security tests. 1-6 - Dae-il Jang, Kang-yu Cho, Minsoo Kim, Hyun-Chul Jung, Bong-Nan Noh:

Evasion technique and detection of malicious botnet. 1-5 - Robert E. Johnson III:

Survey of SCADA security challenges and potential attack vectors. 1-5 - Fuchun Zhao, Hong Ling, Zhengchuan Xu:

Inter-organizational trust and supply chain Flexibility: From a relational view of the firm. 1-5 - Andreas Leicher, Andreas U. Schmidt, Yogendra Shah, Inhyok Cha:

Trusted Computing enhanced OpenID. 1-8 - Pradheepkumar Singaravelu, Shekhar Verma:

Viability of multivariate cryptosystems for WSN. 1-6 - Vivek Pathak:

Combating web plagiarism and improving internet safety by authenticating web content. 1-6 - Busra Ozdenizci, Vedat Coskun, Mehmet N. Aydin, Kerem Ok:

NFC loyal: A beneficial model to promote loyalty on smart cards of mobile devices. 1-6 - Daniel Caragata, Anca-Livia Radu, Safwan El Assad, Cristian-Gabriel Apostol:

Chaos based fragile watermarking algorithm for JPEG images. 1-7 - Hisham Al-Assam, Harin Sellahewa, Sabah Jassim:

On security of multi-factor biometric authentication. 1-6 - Jie Wang, Raphael Chung-Wei Phan, John N. Whitley, David J. Parish:

Quality of detectability (QoD) and QoD-aware AAT-based attack detection. 1-6 - Busra Ozdenizci, Mehmet N. Aydin, Vedat Coskun, Kerem Ok:

Design science in NFC research. 1-6 - Manar Iskandar, Noor Akma Mohd Salleh:

IT governance in e-commerce environment: Cases from airline industry. 1-6 - Franka Moritz, Maria Siebert, Christoph Meinel:

Improving community rating in the tele-lecturing context. 1-6 - Pilar Castro Garrido, Guillermo Matas Miraz, Irene Luque Ruiz, Miguel Ángel Gómez-Nieto:

Near Field Communication in the development of ubiquitous games. 1-7 - Ravi Bhushan Mishra, Bireshwar Dass Mazumdar:

Cognitive parameters based seller agent selection in B2C E-Commerce. 1-3 - Yeojeong Yoon, Chanil Park, Pyung Kim, Seongoun Hwang, Hyunsoo Yoon:

An efficient identity-based proxy signcryption for secure broadcast. 1-6 - Abdullah Mohammed Alaraj:

Ownership transfer protocol. 1-6 - Young Sam Kim, Seung-Hyun Hyun Kim, Seung-Hun Hun Jin:

SRS-based automatic secure device pairing on audio channels. 1-6 - Safdar Ali, Waseem Shahzad, Farrukh Aslam Khan:

Remote-to-Local attacks detection using incremental genetic algorithm. 1-6 - Najeeb Elahi, Randi Karlsen, Waqas Younas:

Semantic image annotation with social context. 1-7 - Gregory Epiphaniou, Carsten Maple, Paul Sant, Peter Norrington:

The effects of encryption on VoIP streams under the code-excited linear prediction coder G.729. 1-6 - Ion Bica, Mihai Togan, Stefan-Vladimir Ghita:

Gossip membership protocol for peer-to-peer streaming overlay construction. 1-5 - Areej Al-Wabil, Ebtisam Alabdulqader, Latifa Al-Abdulkarim, Nora Al-Twairesh:

Measuring the user experience of digital books with children: An eyetracking study of interaction with digital libraries. 1-7 - Annette Tolnai, Sebastiaan H. von Solms:

A Virtualized Environment Security (VES) model for a secure virtualized environment. 1-6 - Tristan Lavarack, Marijke Coetzee:

A Web Services security policy assistant. 1-6 - Giuliano Benelli, Alessandro Pozzebon:

An automated payment system for car parks based on Near Field Communication technology. 1-6 - Guenther Starnberger, Lorenz Froihofer, Karl M. Göschka:

Distributed timestamping with smart cards using efficient overlay routing. 1-6 - Laurentiu Ionescu, Constantin Anton, Ion Tutanescu, Alin Mazare, Gheorghe Serban:

On a FPGA implementation of BCH codes. 1-5 - Parminder Singh, G. S. Lehal:

Statistical syllables selection approach for the preparation of Punjabi speech database. 1-4 - Taiwo Ayodele:

Unsupervised email vector space model (UEVSM). 1-5 - V. Siva RamaKrishna Reddy, Durvasula V. L. N. Somayajulu, Ajay R. Dani:

Sentiment Classification of text reviews using novel feature selection with reduced over-fitting. 1-2 - Mark E. Culverhouse, Bogdan V. Ghita, Paul L. Reynolds, Xingang Wang:

Optimising Quality of Service through the controlled aggregation of traffic. 1-7 - Mohannmad Waqar, Zeeshan Shafi Khan:

Web 2.0 content extraction. 1-3 - Usha Jayahkudy, Chong Eng Tan:

Link signal strength based path selection scheme for ad hoc networks. 1-6 - Aini Aman, Hasmiah Kasimin:

E-government evaluation: The case of e-procurement in Malaysia government. 1-6 - Maria Siebert, Franka Moritz, Frank Hambach, Christoph Meinel:

Enriching E-Learning meta data with user generated playlists. 1-6 - David J. Lutz, Dominik Lamp, Patrick Mandic, Fabio Victora Hecht, Burkhard Stiller:

Charging of SAML-based federated VoIP services. 1-8 - Saeed Ezzati, Hamid Reaza Naji, Amir Chegini, Payam Habibimehr:

A new method of hardware firewall implementation on SOC. 1-7 - Mohssen M. Z. E. Mohammed, H. Anthony Chan, Neco Ventura, Mohsin Hashim, Eihab Bashier:

Fast and accurate detection for polymorphic worms. 1-6 - Elena Castro Galán, Almudena Alcaide, Agustín Orfila, Jorge Blasco Alís:

A multi-agent scanner to detect stored-XSS vulnerabilities. 1-6 - Conor Mc Manamon, Fredrick Mtenzi:

Defending privacy: The development and deployment of a darknet. 1-6 - P. Vcelck, Jana Klecková, Vladimir Rohan:

Cerebrovascular diseases research based on heterogeneous medical data mining and knowledge base. 1-6 - Bachar Alrouh, Adel Almohammad, Gheorghita Ghinea:

SOAP message-based steganography. 1-6 - Khawla Alghafli, Chan Yeob Yeun:

New authentication protocol for IP CAS of IPTV. 1-6 - Mohammed Alzomai, Bander AlFayyadh, Audun Jøsang:

Display security for online transactions: SMS-based authentication scheme. 1-7 - Sabah S. Al-Fedaghi:

Diagrammatical framework for information system attacks. 1-7 - Boustia Narhimene, Aïcha Mokhtari:

A contextual multilevel access control model with default and exception description logic. 1-6 - Hamid Hatim, Hanane El Bakkali, Ilham Berrada:

Workflow access control: From role engineering to task engineering. 1-7 - Masoud Rezaei, Nafise Sadat Moosavi, Hamed Nemati, Reza Azmi:

TCvisor: A hypervisor level secure storage. 1-9 - Muhammad Asif Habib:

Mutual exclusion and role inheritance affecting least privilege in RBAC. 1-6 - Fazl-e Hadi, Fahad Bin Muhaya, Atif R. Naseer:

Secure multimedia communication in wireless mesh networks. 1-4 - Vasaki Ponnusamy, Azween Vitra Abdullah:

A bio-inspired framework for wireless sensor network using mobile sensors. 1-6 - Hanunah Othman, Habibah Hashim, Jamalul-lail Ab Manan:

A conceptual framework providing Direct Anonymous Attestation (DAA) protocol in trusted location-based services (LBS). 1-7 - Paul T. Edelman, Michael J. Donahoo, David B. Sturgill:

Secure group communications for Delay-Tolerant Networks. 1-8 - Emmanuel Hooper:

Strategic and intelligent smart grid systems engineering. 1-6 - Onyeka Emebo, Olawande J. Daramola, Charles Ayo:

A Grid-based e-learning model for Open Universities. 1-4 - Peter Chovanec, Michal Krátký, Jirí Walder:

Lossless R-tree compression using variable-length codes. 1-8 - Filip Krizka, Michal Krátký:

On the efficient indexing of ordered multidimensional tuples. 1-8 - Katie Wood, Ella Pereira:

An investigation into cloud configuration and security. 1-6 - Denis J. Reilly, Chris Wren, Tom Berry:

Cloud computing: Forensic challenges for law enforcement. 1-7 - Pedro Peris-Lopez, Enrique San Millán, Jan C. A. van der Lubbe, Luis Entrena:

Cryptographically secure pseudo-random bit generator for RFID tags. 1-6 - Martin Feldhofer, Manfred Josef Aigner, Thomas Baier, Michael Hutter, Thomas Plos, Erich Wenger:

Semi-passive RFID development platform for implementing and attacking security tags. 1-6 - Sandra Dominikus, Manfred Josef Aigner, Stefan Kraxberger:

Passive RFID technology for the internet of things. 1-8 - Kyusuk Han, Hyeran Mun, Taeshik Shon:

Design of secure key agreement protocol for pairing in RF4CE. 1-5 - Mete Akgün, Ali Özhan Gürel, Mehmet Ufuk Çaglayan:

Attacks to a lightweight RFID mutual authentication protocol. 1-5 - Dang Nguyen Duc, Kwangjo Kim, Chan Yeob Yeun:

Reconsidering Ryu-Takagi RFID authentication protocol. 1-6 - Hyeran Mun, Chan Yeob Yeun, Kyusuk Han, Byung-Ho Chung:

Enhancement of anonymous authentication scheme in wireless sensor network. 1-4 - Fadi A. Aloul:

Information security awareness in UAE: A survey paper. 1-6 - Said Jafari, Fredrick Mtenzi, Ciaran O'Driscoll, Ronan Fitzpatrick, Brendan O'Shea:

Privacy metrics in ubiquitous computing applications. 1-2 - Dennis M. Lupiana, Fredrick Mtenzi, Ciaran O'Driscoll, Brendan O'Shea:

Strictly alphanumeric data: Improving privacy in smart environments. 1-3 - Zanifa Omary, Fredrick Mtenzi, Bing Wu, Ciaran O'Driscoll:

Accessing sensitive patient information in ubiquitous healthcare systems. 1-3 - Ciaran O'Driscoll, Paul Doyle:

The cost of security for a completely private ubiquitous environment. 1-2

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














