


default search action
9th NTMS 2018: Paris, France
- 9th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2018, Paris, France, February 26-28, 2018. IEEE 2018, ISBN 978-1-5386-3662-6

- Mohamed Lahby

, Abderrahim Sekkaki:
A Graph Theory Based Network Selection Algorithm in Heterogeneous Wireless Networks. 1-4 - Bouchaib Assila, Abdellatif Kobbane

, Mohammed El Koutbi:
A Many-To-One Matching Game Approach to Achieve Low-Latency Exploiting Fogs and Caching. 1-2 - Sarah Abdallah, Imad H. Elhajj

, Ali Chehab
, Ayman I. Kayssi:
A Network Management Framework for SDN. 1-4 - Keltoum Bendiab, Stavros Shiaeles

, Samia Boucherkha:
A New Dynamic Trust Model for "On Cloud" Federated Identity Management. 1-5 - Davide Ferraris, M. Carmen Fernández Gago, Javier López:

A Trust-by-Design Framework for the Internet of Things. 1-4 - Juan E. Rubio, Cristina Alcaraz

, Javier López:
Addressing Security in OCPP: Protection Against Man-in-the-Middle Attacks. 1-5 - Tao Wu, Christoph Ruland

:
An Authenticated Encrypted Compressive Sensing based Imaging Mechanism. 1-4 - Deepthi Rao

, D. V. N. Siva Kumar
, P. Santhi Thilagam
:
An Efficient Multi-User Searchable Encryption Scheme without Query Transformation over Outsourced Encrypted Data. 1-4 - Pedram Mohammadi, Mahsa T. Pourazad, Panos Nasiopoulos:

An Entropy-based Inverse Tone Mapping Operator for High Dynamic Range Applications. 1-5 - Rahma Ben Fraj, Vincent Beroulle, Nicolas Fourty, Aref Meddeb

:
An Evaluation of UHF RFID Anti-Collision Protocols with NS2. 1-6 - Evelina Pencheva

, Ivaylo Atanasov
:
An Extension of Radio Network Information Interfaces for Terminal Activity in a Cell. 1-5 - Raid Zaghal, Saeed Salah

, Mohammad Ismail:
An InfiniBand-Based Mechanism to Enhance QoS in Multipath Routing Protocols in MANETs. 1-5 - Mehdi Guessous, Lahbib Zenkouar:

Bézier Curves Based Novel Calibration Technique of Beamformers in IEEE 802.11 WLAN Networks. 1-5 - Yoshitaka Nakamura

, Shihori Kanazawa, Hiroshi Inamura
, Osamu Takahashi:
Classification of Unknown Web Sites Based on Yearly Changes of Distribution Information of Malicious IP Addresses. 1-4 - Massimo Gallo, Samir Ghamri-Doudane, Fabio Pianese:

CliMBOS: A Modular NFV Cloud Backend for the Internet of Things. 1-5 - Felipe A. Cruz-Pérez, Jose Serrano-Chavez, S. Lirio Castellanos-Lopez, Genaro Hernández-Valdez

:
Comparison of the Performance Sensitivity to the Primary and Secondary Service Time Distribution in Cognitive Radio Networks. 1-4 - Amjad Alsirhani

, Srinivas Sampalli, Peter Bodorik
:
DDoS Attack Detection System: Utilizing Classification Algorithms with Apache Spark. 1-7 - Hala Alsalloum, Ali El Masri, Leïla Merghem-Boulahia, Rana Rahim:

Demand Side Management in Smart Grids: A Stackelberg Multi Period Multi Provider Game. 1-5 - Alperen Eroglu

, Ertan Onur
, Mehmet Turan
:
Density-Aware Outage in Clustered Ad Hoc Networks. 1-5 - Guangyu Li, Lila Boukhatem, Lin Zhao, Jinsong Wu

:
Direct Vehicle-to-Vehicle Charging Strategy in Vehicular Ad-Hoc Networks. 1-5 - Johan Garcia:

Duplications and Misattributions of File Fragment Hashes in Image and Compressed Files. 1-5 - Christos Bouras, Nikolaos Kanakis

:
Evolving AL-FEC Application Towards 5G NGMN. 1-5 - Andreas Brokalakis, Ioannis Chondroulis, Ioannis Papaefstathiou

:
Extending the Forward Error Correction Paradigm for Multi-Hop Wireless Sensor Networks. 1-5 - Cyrielle Feron, Vianney Lapotre

, Loïc Lagadec
:
Fast Evaluation of Homomorphic Encryption Schemes Based on Ring-LWE. 1-5 - Eirik Bertelsen, Gabriel Berthling-Hansen, Trude Hafsøe Bloebaum, Christian Duvholt, Einar Hov, Frank T. Johnsen, Eivind Morch, Andreas H. Weisethaunet:

Federated Publish/Subscribe Services. 1-5 - Ievgen Kabin

, Zoya Dyka
, Dan Kreiser, Peter Langendörfer
:
Horizontal Address-Bit DEMA against ECDSA. 1-7 - Mathew Nicho

, Adelaiye Oluwasegun
, Faouzi Kamoun:
Identifying Vulnerabilities in APT Attacks: A Simulated Approach. 1-4 - Manuel-Jesus Espinosa-Gavira

, A. Jimenez-Pro, Juan José González de la Rosa, A. Agüera Pérez
, Olivia Florencias-Oliveros
, José Carlos Palomares Salas
, José María Sierra Fernández:
Improving Flexibility in Wireless Sensor Networks via API. An Application in Environmental Monitoring. 1-4 - Giulia De Santis, Abdelkader Lahmadi, Jérôme François, Olivier Festor:

Internet-Wide Scanners Classification using Gaussian Mixture and Hidden Markov Models. 1-5 - Daniel AlShamaa, Farah Mourad-Chehade, Paul Honeine

:
Localization of Sensors in Indoor Wireless Networks: An Observation Model Using WiFi RSS. 1-5 - Emanuele Catania, Aurelio La Corte

:
Location Privacy in Virtual Cell-Equipped Ultra-Dense Networks. 1-4 - Eyuel Debebe Ayele

, Nirvana Meratnia, Paul J. M. Havinga:
MANER: Managed Data Dissemination Scheme for LoRa IoT Enabled Wildlife Monitoring System (WMS). 1-7 - Alvaro Parres-Peredo

, Iván Piza-Dávila, Francisco Cervantes
:
MapReduce Approach to Build Network User Profiles with Top-k Rankings for Network Security. 1-5 - Gianmarco Baldini, Raimondo Giuliani, Claudio Gentile, Gary Steri:

Measures to Address the Lack of Portability of the RF Fingerprints for Radiometric Identification. 1-5 - Daniel AlShamaa, Farah Mourad-Chehade, Paul Honeine

:
Mobility-based Tracking Using WiFi RSS in Indoor Wireless Sensor Networks. 1-5 - Canek Portillo, Jorge Martínez-Bauset, Vicent Pla

:
Modelling of S-MAC for Heterogeneous WSN. 1-6 - François Boutigny, Stéphane Betgé-Brezetz, Hervé Debar

, Grégory Blanc
, Antoine Lavignotte, Ion Popescu:
Multi-Provider Secure Virtual Network Embedding. 1-5 - Jen-Chieh Hsu, Raylin Tso, Yu-Chi Chen

, Mu-En Wu:
Oblivious Transfer Protocols Based on Commutative Encryption. 1-5 - Jihad Hamie, Ali Hamieh, Joumana Younis

, Moussa Ammar, Ahmad Ahmad-Kassem, Ahmad Skaiky, Ali Hamie, Abbass Nasser, Hani Abdallah:
On the Cramer-Rao Lower Bounds of Ranging Based on IR-UWB TOA Estimation in Wirelessbody Area Networks. 1-4 - Daniel Fraunholz, Daniel Krohmer, Frederic Pohl, Hans Dieter Schotten:

On the Detection and Handling of Security Incidents and Perimeter Breaches - A Modular and Flexible Honeytoken based Framework. 1-4 - Hesham H. Alsaadi

, Monther Aldwairi
, May Al Taei, Mansoor AlBuainain, Maktoom AlKubaisi:
Penetration and Security of OpenSSH Remote Secure Shell Service on Raspberry Pi 2. 1-5 - S. Lirio Castellanos-Lopez, Felipe A. Cruz-Pérez, Genaro Hernández-Valdez

, Jose Raul Miranda-Tello
:
Performance Analysis of Mobile Cellular Networks with MMPP Call Arrival Patterns. 1-6 - Zi-Yuan Liu

, Jen-Chieh Hsu, Raylin Tso, Tzong-Chen Wu:
Policy-Controlled Signature from NTRU Lattice. 1-5 - Louis Tajan, Moritz Kaumanns, Dirk Westhoff:

Pre-Computing Appropriate Parameters: How to Accelerate Somewhat Homomorphic Encryption for Cloud Auditing. 1-6 - Sara Ramezanian

, Tommi Meskanen, Valtteri Niemi:
Privacy Preserving Queries on Directed Graph. 1-5 - Francesco D'Andria

, Jose Miguel Garrido, Michael J. Boniface
, Stefano Modafferi
, Simon Crowle, Lee Middleton, Konstantinos C. Apostolakis
, Kosmas Dimitropoulos
, Petros Daras
:
ProsocialLearn: A Prosocial Games Marketplace. 1-5 - Flavio Meneses

, Carlos Guimarães, Daniel Corujo, Rui L. Aguiar:
SDN-based Mobility Management: Handover Performance Impact in Constrained Devices. 1-5 - José Quevedo

, Carlos Guimarães, Rui Ferreira, Alireza Sepas-Moghaddam
, Luis Malhadas, Rui L. Aguiar
, Paulo L. Correia
, Daniel Corujo:
Selectively Accessing Light Field Face Images over Information Centric Networking. 1-5 - Zeeshan Afzal

, Johan Garcia, Stefan Lindskog, Anna Brunström:
Slice Distance: An Insert-Only Levenshtein Distance with a Focus on Security Applications. 1-5 - Outi-Marja Latvala

, Chengyuan Peng, Petri Honkamaa, Kimmo Halunen:
"Speak, Friend, and Enter" - Secure, Spoken One-Time Password Authentication. 1-5 - Raouia Masmoudi

:
Spectrum Sharing in Cognitive Radio Systems. 1-5 - Eyuel Debebe Ayele

, Nirvana Meratnia, Paul J. M. Havinga:
Towards a New Opportunistic IoT Network Architecture for Wildlife Monitoring System. 1-5 - Charikleia Papatsimpa

, Jean-Paul M. G. Linnartz
:
Using Dynamic Occupancy Patterns for Improved Presence Detection in Intelligent Buildings. 1-5 - Dong Kyoo Kim:

Wireless Vital Signal Tracking for Drivers Using Micro-Doppler Seatback Radar. 1-5 - Yukinobu Fukushima, Itsuho Goda, Tutomu Murase, Tokumi Yokohira:

Workplace Capacity Design Using the Minimum Dominating Set in Server Migration Services. 1-5 - Sajjad Dadkhah

, Mario Koeppen, Somayeh Sadeghi, Kaori Yoshida:
Bad Ai: Investigating the Effect of Half-Toning Techniques on Unwanted Face Detection Systems. 1-5 - Hachemi Nabil Dellys

, Karima Benatchba, Layth Sliman
, Yen-Wei Chen:
Chaff-Points Generation Method Based on Adaptive Genetic Algorithms and Non-Fixed Size Squares Boundaries for Resource Constrained Devices. 1-4 - Mahesh Balaji

, Aswani Kumar Cherukuri
:
Inter-Application Based Resource Management Approach for Cloud Infrastructure. 1-6 - Brahim Benaissa

, Filip Hendrichovsky
, Kaori Yishida, Mario Köppen, Peter Sincak
:
Phone Application for Indoor Localization Based on Ble Signal Fingerprint. 1-5 - Alexander Adli:

Star Projection Technologies in the Modern Planetarium Industry. 1-4 - Mayank Raikwar, Subhra Mazumdar

, Sushmita Ruj, Sourav Sen Gupta
, Anupam Chattopadhyay, Kwok-Yan Lam
:
A Blockchain Framework for Insurance Processes. 1-4 - Joshua Ellul

, Gordon J. Pace
:
AlkylVM: A Virtual Machine for Smart Contract Blockchain Connected Internet of Things. 1-4 - Kei-Léo Brousmiche, Thomas Heno, Christian Poulain, Antoine Dalmieres, Elyes Ben Hamida:

Digitizing, Securing and Sharing Vehicles Life-cycle over a Consortium Blockchain: Lessons Learned. 1-5 - Noureddine Lasla

, Mohamed F. Younis, Wassim Znaidi, Dhafer Ben Arbia:
Efficient Distributed Admission and Revocation Using Blockchain for Cooperative ITS. 1-5 - Asutosh Palai, Meet Vora, Aashaka Shah:

Empowering Light Nodes in Blockchains with Block Summarization. 1-5 - Runchao Han, Vincent Gramoli, Xiwei Xu:

Evaluating Blockchains for IoT. 1-5 - Tesnim Abdellatif, Kei-Léo Brousmiche:

Formal Verification of Smart Contracts Based on Users and Blockchain Behaviors Models. 1-5 - Mikael Asplund, Jakob Lovhall, Simin Nadjm-Tehrani:

In-Store Payments Using Bitcoin. 1-6 - Andreas Unterweger, Fabian Knirsch, Christoph Leixnering, Dominik Engel:

Lessons Learned from Implementing a Privacy-Preserving Smart Contract in Ethereum. 1-5 - Haikel Magrahi, Nouha Omrane, Olivier Senot, Rakia Jaziri:

NFB: A Protocol for Notarizing Files over the Blockchain. 1-4 - Andra Anoaica, Hugo Levard:

Quantitative Description of Internal Activity on the Ethereum Public Blockchain. 1-5 - Beltran Borja Fiz Pontiveros

, Robert Norvill, Radu State:
Recycling Smart Contracts: Compression of the Ethereum Blockchain. 1-5 - Ence Zhou, Song Hua, Bingfeng Pi, Jun Sun, Yashihide Nomura, Kazuhiro Yamashita, Hidetoshi Kurihara:

Security Assurance for Smart Contract. 1-5 - Fabio Pianese, Matteo Signorini, Souradip Sarkar:

Small Transactions with Sustainable Incentives. 1-5 - Tatsuya Sato, Yosuke Himura:

Smart-Contract Based System Operations for Permissioned Blockchain. 1-6 - Johan Garcia:

A Fragment Hashing Approach for Scalable and Cloud-Aware Network File Detection. 1-5 - Hana Bouafif, Faouzi Kamoun, Farkhund Iqbal

, Andrew Marrington
:
Drone Forensics: Challenges and New Insights. 1-6 - Áine MacDermott

, Thar Baker
, Qi Shi:
Iot Forensics: Challenges for the Ioa Era. 1-5 - Mahmoud Kalash, Mrigank Rochan, Noman Mohammed, Neil D. B. Bruce, Yang Wang, Farkhund Iqbal

:
Malware Classification with Deep Convolutional Neural Networks. 1-5 - Saeed Ibrahim, Nawwaf Al Harmi, Ebrahim Al Naqbi, Farkhund Iqbal

, Djedjiga Mouheb
, Omar Alfandi
:
Remote Data Acquisition Using Raspberry Pi3. 1-5 - Adnan Imeri

, Djamel Khadraoui:
The Security and Traceability of Shared Information in the Process of Transportation of Dangerous Goods. 1-5

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














