


default search action
IAS 2010: Atlanta, GA, USA
- Sixth International Conference on Information Assurance and Security, IAS 2010, Atlanta, GA, USA, August 23-25, 2010. IEEE 2010, ISBN 978-1-4244-7407-3

- Victor Gayoso Martínez

, Fernando Hernández Álvarez, Luis Hernández Encinas
, Carmen Sánchez Ávila
:
A comparison of the standardized versions of ECIES. 1-4 - Mrutyunjaya Panda

, Ajith Abraham, Manas Ranjan Patra:
Discriminative multinomial Naïve Bayes for network intrusion detection. 5-10 - Vesa Pehkonen, Juha Koivisto:

Secure Universal Plug and Play network. 11-14 - Sean S. E. Thorpe:

A case analysis of a Contextual Model of Trust for digital identities using UML 2.0 and context graph algorithms. 15-20 - Zahri Yunos, Syahrul Hafidz Suid, Rabiah Ahmad, Zuraini Ismail

:
Safeguarding Malaysia's critical national information infrastructure (CNII) against cyber terrorism: Towards development of a policy framework. 21-27 - Chi-Wu Huang, Chien-Lun Yen, Che-Hao Chiang, Kuo-Huang Chang, Chi-Jeng Chang:

The five modes AES applications in sounds and images. 28-31 - Vincent C. Hu

, David F. Ferraiolo, Serban I. Gavrila:
Specification of attribute relations for access control policies and constraints using Policy Machine. 32-35 - David O. Manz

, Thomas W. Edgar
, Glenn Allen Fink
:
A hybrid Authentication and authorization process for control system networks. 36-39 - Wendpanga Francis Ouedraogo, Frédérique Biennier, Nicolas Salatgé:

Security preferences specification and implementation in a service-based workflow. 40-43 - Mohamed El-Hadedy, Martin Margala

, Danilo Gligoroski, Svein J. Knapskog:
Resource-efficient implementation of Blue Midnight Wish-256 hash function on Xilinx FPGA platform. 44-47 - Hanan A. Mahmoud, Hanan Saad Al-Hulaibah, Sarah A. Al-Naeem, Suha Ali Al-Qhatani, Aljoharah Al-Dawood, Buthaina Saleh Al-Nassar, Dhay Yousef Al-Salman:

Novel technique for steganography in fingerprints images: Design and implementation. 48-51 - Hanan A. Mahmoud, Khaled Alghathbar:

Novel algorithmic countermeasures for Differential Power Analysis attacks on smart cards. 52-55 - Jonathan White, Brajendra Panda:

Insider threat discovery using automatic detection of mission critical data based on content. 56-61 - David Oro, Jesus Luna, Toni Felguera, Marc Vilanova, Jetzabel M. Serna:

Benchmarking IP blacklists for financial botnet detection. 62-67 - Sebastian Roschke, Feng Cheng, Christoph Meinel:

Using vulnerability information and attack graphs for intrusion detection. 68-73 - Ying-Wei Kuo, Shou-Hsuan Stephen Huang, Christopher Hill:

Detect multi-hop stepping-stone pairs with clock skew. 74-79 - Frank Yeong-Sung Lin, Yu-Shun Wang, Po-Hao Tsang:

Efficient defense strategies to minimize attackers' success probabilities in honeynet. 80-85 - Jan Platos

, Pavel Krömer
, Václav Snásel, Ajith Abraham:
Scaling IDS construction based on Non-negative Matrix factorization using GPU computing. 86-91 - Michael Müter, André Groll, Felix C. Freiling:

A structured approach to anomaly detection for in-vehicle networks. 92-98 - Wael Kanoun, Nora Cuppens-Boulahia, Frédéric Cuppens, Samuel Dubus, Antony Martin:

Intelligent response system to mitigate the success likelihood of ongoing attacks. 99-105 - Tomás Novosád, Jan Platos

, Václav Snásel, Ajith Abraham:
Fast intrusion detection system based on Flexible Neural Tree. 106-111 - Pavel Krömer

, Jan Platos
, Václav Snásel, Ajith Abraham:
Towards intrusion detection by information retrieval and genetic programming. 112-117 - Ashley Thomas:

RAPID: Reputation based approach for improving intrusion detection effectiveness. 118-124 - Eugen Leontie, Olga Gelbart, Bhagirath Narahari, Rahul Simha:

Detecting memory spoofing in secure embedded systems using cache-aware FPGA guards. 125-130 - Kalyani Divi, Mohammed Raza Kanjee, Hong Liu:

Secure architecture for healthcare Wireless Sensor Networks. 131-136 - Ziyi Su, Frédérique Biennier:

End-to-end security policy description and management for collaborative system. 137-142 - Suleyman Kondakci

:
A causal model for information security risk assessment. 143-148 - Caroline Moeckel, Ali E. Abdallah:

Threat modeling approaches and tools for securing architectural designs of an e-banking application. 149-154 - Yang Liu, Yue Wu, Junhua Tang:

Two tier detection model for misbehavior of low-power nodes in virtual MIMO based wireless networks. 155-160 - Lin You, Fugeng Zeng:

The number of the isomorphism classes of hyperelliptic curves of genus four over finite fields. 161-166 - Alessandro Barenghi

, Guido Marco Bertoni
, Luca Breveglieri
, Mauro Pellicioli, Gerardo Pelosi
:
Fault attack on AES with single-bit induced faults. 167-172 - Hesiri Weerasinghe, Huirong Fu, Supeng Leng:

Anonymous service access for Vehicular Ad hoc Networks. 173-178 - Tibebe Tesema, Dawn Medlin, Ajith Abraham:

Patient's perception of health information security: The case of selected public and private hospitals in Addis Ababa. 179-184 - Ganthan Narayana Samy

, Rabiah Ahmad, Zuraini Ismail
:
A framework for integrated risk management process using survival analysis approach in information security. 185-190 - Reine Lundin, Stefan Lindskog:

Extending the definition of guesswork. 191-196 - Hanieh Azkia, Nora Cuppens-Boulahia, Frédéric Cuppens, Gouenou Coatrieux:

Reconciling IHE-ATNA profile with a posteriori contextual access and usage control policy in healthcare environment. 197-203 - Riaz Ahmed Shaikh

, Kamel Adi
, Luigi Logrippo, Serge Mankovski:
Inconsistency detection method for access control policies. 204-209 - Kazuhiro Kono, Yoshimichi Ito, Noboru Babaguchi:

Anonymous communication system using probabilistic choice of actions and multiple loopbacks. 210-215 - Maya I. Chehab, Ali E. Abdallah:

Assurance in identity management systems. 216-221 - Ali Nasrat Haidar, Stefan J. Zasada, Peter V. Coveney, Ali E. Abdallah, Bruce Beckles

:
Audited credential delegation - a user-centric identity management solution for computational grid environments. 222-227 - Alessio Merlo, Alessandro Armando

:
Cooperative access control for the Grid. 228-233 - Roberto Morales, Jetzabel M. Serna, Manel Medina

, Jesus Luna:
CARMA: Composable-Adaptive Resource Management Authorization for ubiquitous environments. 234-239 - Flora Amato

, Valentina Casola
, Antonino Mazzeo
, Sara Romano:
A semantic based methodology to classify and protect sensitive data in medical records. 240-246 - Antonio Celesti

, Massimo Villari
, Antonio Puliafito
:
A naming system applied to a RESERVOIR cloud. 247-252 - Valentina Casola

, Massimiliano Rak
, Umberto Villano:
Identity federation in cloud computing. 253-259 - Alessandra De Benedictis

, Andrea Gaglione
, Nicola Mazzocca
:
Securing a tiered re-taskable sensing system. 260-264 - Claudio Mazzariello

, Roberto Bifulco
, Roberto Canonico
:
Integrating a network IDS into an open source Cloud Computing environment. 265-270 - Mohammed Raza Kanjee, Kalyani Divi, Hong Liu:

A two-tiered authentication and encryption scheme in secure healthcare sensor networks. 271-276 - Danilo Valeros Bernardo:

UDT -Authentication Option field: An approach. 277-281 - Jezabel Molina-Gil

, Pino Caballero-Gil
, Candelaria Hernández-Goya
, Cándido Caballero-Gil
:
Data aggregation for information authentication in VANETs. 282-287 - Johnson P. Thomas, Vinay Abburi, Mathews Thomas, Ajith Abraham:

Secure protocol for ad hoc transportation system. 288-293 - He Liu, Man-Gui Liang, Gao-Liang Qi, Xiaowei Chen:

A hierarchical access authentication in network. 294-297 - Li Yao, Ning Zhang

:
Quantifying authentication Levels of Assurance in grid environments. 298-303 - Chris G. Hocking, Steven M. Furnell

, Nathan L. Clarke
, Paul L. Reynolds:
A distributed and cooperative user authentication framework. 304-310 - Mrinal Kanti Bhowmik, Debotosh Bhattacharjee

, Mita Nasipuri, Dipak Kumar Basu, Mahantapas Kundu:
Optimum fusion of visual and thermal face images for recognition. 311-316 - Guiguang Ding, Na Xu:

Automatic semantic annotation of images based on Web data. 317-322 - Zuwena Musoromy, Faycal Bensaali

, Soodamani Ramalingam
, Georgios Pissanidis:
Comparison of real-time DSP-based edge detection techniques for license plate detection. 323-328 - Jeffrey Mounzer, Tansu Alpcan

, Nicholas Bambos:
Integrated security risk management for IT-intensive organizations. 329-334 - Václav Snásel, Zdenek Horak, Ajith Abraham:

Link suggestions in terrorists networks using Semi Discrete Decomposition. 335-337 - Zdenek Horak, Václav Snásel, Ajith Abraham, Aboul Ella Hassanien

:
Fuzzified Aho-Corasick search automata. 338-342 - Václav Snásel, Ajith Abraham, Khalid Saeed, Hameed Al-Qaheri:

A framework for cyber surveillance of unlawful activities for critical infrastructure using computational grids. 343-348

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














