


default search action
IAS 2011: Melacca, Malaysia
- 7th International Conference on Information Assurance and Security, IAS 2011, Melacca, Malaysia, December 5-8, 2011. IEEE 2011, ISBN 978-1-4577-2154-0

- Ravi Sankar Veerubhotla, Ashutosh Saxena:

A DRM framework towards preventing digital piracy. 1-6 - Mohd Zalisham Jali

, Steven Furnell
, Paul Dowland
:
Multifactor graphical passwords: An assessment of end-user performance. 7-12 - Fusun Citak Er, Ensar Gul

:
Comparison of digital audio watermarking techniques for the security of VOIP communications. 13-18 - Mithun Paul

, Nitin Singh Chauhan, Ashutosh Saxena:
A security analysis of smartphone data flow and feasible solutions for lawful interception. 19-24 - Nurul Haszeli Ahmad

, Syed Ahmad Aljunid, Jamalul-lail Ab Manan:
Understanding vulnerabilities by refining taxonomy. 25-29 - Yadollah Zamanidoost

, Antonio Navarro
, Zhinoos Razavi Hesabi, Nima Rahimi Froshani, Fatemeh Farnia:
Robust video watermarking against JPEG compression in 3D-DWT domain. 30-34 - Azyan Yusra Kapi, Subariah Ibrahim

:
Fixed size encoding scheme for software watermarking. 35-39 - Wun-She Yap

, Sze Ling Yeo, Chee Hoo Yian:
Cryptanalysis of the full CHAIN cipher. 40-45 - Nik Azura Nik Abdullah, Norul Hidayah Lot Ahmad Zawawi, Hazlin Abdul Rani:

Analysis on Lightweight Block Cipher, KTANTAN. 46-51 - Andrew M. Colarik, Lech J. Janczewski

:
Developing a grand strategy for Cyber War. 52-57 - Sofia Najwa Ramli, Rabiah Ahmad:

Surveying the Wireless Body Area Network in the realm of wireless communication. 58-61 - Ali Dehghantanha, Nur Izura Udzir

, Ramlan Mahmod:
Towards data centric mobile security. 62-67 - Adnan Ahmad

, Brian Whitworth:
Distributed access control for social networks. 68-73 - Yuxin Meng

, Lam-for Kwok
:
Adaptive context-aware packet filter scheme using statistic-based blacklist generation in network intrusion detection. 74-79 - Muhammad Najmi Ahmad Zabidi

, Mohd Aizaini Maarof, Anazida Binti Zainal
:
Ensemble based categorization and adaptive model for malware detection. 80-85 - Mohammad Ali Arsyad bin Mohd Shuhaimi, Zaheera binti Zainal Abidin, Irda binti Roslan, Syarulnaziah binti Anawar

:
The new services in Nagios: Network bandwidth utility, email notification and sms alert in improving the network performance. 86-91 - Sui-Guan Teo, Kenneth Koon-Ho Wong

, Ed Dawson
, Leonie Simpson
:
State convergence and the effectiveness of time-memory-data tradeoffs. 92-97 - Mohd Faizal Mubarak, Jamalul-lail Ab Manan, Saadiah Yahya:

Trusted anonymizer-based RFID system with integrity verification. 98-103 - Haider Ismael Shahadi, Razali Jidin:

High capacity and inaudibility audio steganography scheme. 104-109 - Tee Wilkin, Shih Yin Ooi:

State of the art: Signature verification system. 110-115 - Siddharth Malik, Anjali Sardana:

Secure Vault: A privacy preserving reliable architecture for Secure Social Networking. 116-121 - Thomas Demongeot, Eric Totel, Yves Le Traon

:
Preventing data leakage in service orchestration. 122-127 - Mehdi Salkhordeh Haghighi

, Abedin Vahedian
, Hadi Sadoghi Yazdi:
Extending Dempster Shafer method by multilayer decision template in classifier fusion. 128-133 - Fatin Norsyafawati Mohd Sabri, Norita Md Norwawi, Kamaruzzaman Seman:

Hybrid of rough set theory and Artificial Immune Recognition System as a solution to decrease false alarm rate in intrusion detection system. 134-138 - Muhammad Khurram Khan

, Pei-wei Tsai
, Jeng-Shyang Pan
, Bin-Yih Liao:
Biometric driven initiative system for passive continuous authentication. 139-144 - Reine Lundin, Stefan Lindskog:

Guesswork changes in multi-processor attacks. 145-150 - Zaid Ahmad, Kamarularifin Abd. Jalil

, Jamalul-lail Ab Manan:
Black hole effect mitigation method in AODV routing protocol. 151-155 - Sherif Saad, Issa Traoré:

A semantic analysis approach to manage IDS alerts flooding. 156-161 - Atta-ur-Rahman

, Muhammad Tahir Naseem, Ijaz Mansoor Qureshi, Muhammad Zeeshan Muzaffar:
Reversible watermarking using Residue Number System. 162-166 - Hamid Reza Taremian, Mahdi Pakdaman Naeini:

Hybrid Intelligent Decision Support System for credit risk assessment. 167-172 - Farid Daryabar, Ali Dehghantanha, Nur Izura Udzir

:
Investigation of bypassing malware defences and malware detections. 173-178 - Hajar Al-Hujailan, Mznah Al-Rodhaan

, Abdullah Al-Dhelaan:
A cooperative intrusion detection scheme for clustered mobile ad hoc networks. 179-185 - Dongyang Xu, Zhi Tang, Yinyan Yu:

An extended rights expression model supporting dynamic digital rights management. 186-191 - Zaiton Muda, Warusia Yassin

, Md Nasir Sulaiman, Nur Izura Udzir:
Intrusion detection based on k-means clustering and OneR classification. 192-197 - Haitham S. Al-Sinani

:
Integrating OAuth with Information card systems. 198-203 - Ahmad Jafarabadi, Mohammad Abdollahi Azgomi

:
An SIR model for the propagation of topology-aware active worms considering the join and leave of hosts. 204-209 - Sairul Izwan Safie

, John J. Soraghan, Lykourgos Petropoulakis:
Pulse Active Mean (PAM): A PIN supporting feature extraction algorithm for doubly secure authentication. 210-214 - Moussa Ouedraogo, Haralambos Mouratidis

, Artur Hecker
, Cédric Bonhomme
, Djamel Khadraoui, Eric Dubois
, David Preston:
A new approach to evaluating security assurance. 215-221 - Mohammad Javad Khosravi, Samaneh Ghandali:

A secure joint wavelet based steganography and secret sharing method. 222-227 - Mehiar Dabbagh, Ali J. Ghandour

, Kassem Fawaz, Wassim El-Hajj, Hazem M. Hajj:
Slow port scanning detection. 228-233 - Gou Hosoya, Hideki Yagi, Manabu Kobayashi, Shigeichi Hirasawa:

On the capacity of fingerprinting codes against unknown size of colluders. 234-239 - Subhranil Som

, Niladri Shekhar Chatergee, J. K. Mandal:
Key based bit level genetic cryptographic technique (KBGCT). 240-245 - Abdul Rahman Ahlan

, Muharman Lubis
:
Information security awareness in university: Maintaining learnability, performance and adaptability through roles of responsibility. 246-250 - Mohammad Uruj Jaleel

, Mohammad Asghar Jamil, Kashiful Haq:
Energy efficient delay leap routing in multicast using feed back neural networks. 251-255 - Adnan Ahmad

, Brian Whitworth:
Access control taxonomy for social networks. 256-261 - Sheng Li, Alex C. Kot:

A novel system for fingerprint privacy protection1. 262-266 - Herman Isa, Iskandar Bahari, Hasibah Sufian, Muhammad Reza Z'aba:

AES: Current security and efficiency analysis of its alternatives. 267-274 - Sei-ichiro Kamata:

A common key encryption algorithm using N-dimensional Hilbert curves. 275-279 - H. H. Weerasena, P. B. S. Bandara, J. R. B. Kulasekara, B. M. B. Dassanayake, U. A. A. Niroshika, P. R. Wijenayake:

Strategic approach for high performance object tracking in a network of surveillance cameras. 280-285 - Ahmad Kamran Malik, Schahram Dustdar

:
Enhanced sharing and privacy in distributed information sharing environments. 286-291 - Abidalrahman Moh'd, Yaser Jararweh

, Lo'ai Ali Tawalbeh
:
AES-512: 512-bit Advanced Encryption Standard algorithm design and evaluation. 292-297 - Chandrashekhar Meshram, Suchitra A. Meshram:

An identity based beta cryptosystem. 298-303 - Elham Nosrati, S. Navid Hashemi Tonekaboni, S. Majid Hashemi Tonekaboni:

Examining CSCF entity attacks scenarios and vulnerabilities in IP Multimedia Subsystems. 304-307 - Farshad Amin, Amir Hossein Jahangir

:
Time and energy cost analysis of Kerberos security protocol in Wireless Sensor Networks. 308-313 - Simona Samardjiska, Yanling Chen, Danilo Gligoroski:

Construction of Multivariate Quadratic Quasigroups (MQQs) in arbitrary Galois fields. 314-319 - Federico Maggi

, Simone Gasparini
, Giacomo Boracchi
:
A fast eavesdropping attack against touchscreens. 320-325 - Mohtashim Baqar, Sohaib Azhar, Zeeshan Iqbal, Irfan Shakeel, Laeeq Ahmed, Muhammad Moinuddin

:
Efficient iris recognition system based on dual boundary detection using robust variable learning rate Multilayer Feed Forward neural network. 326-330 - Aly Mohamed El-Semary, Mohamed Mostafa A. Azim:

A two-tier energy-efficient secure routing protocol for Wireless Sensor Networks. 331-337 - Giampaolo Bella

, Denis Butin
, David Gray
:
Holistic analysis of mix protocols. 338-343 - Kuan Jen Lin, Chih Ping Weng, Tsai Kun Hou:

Enhance hardware security using FIFO in pipelines. 344-349 - Murad A. Rassam

, Mohd Aizaini Maarof, Anazida Binti Zainal
:
A novel intrusion detection framework for Wireless Sensor Networks. 350-353 - Erwin Hidayat

, Nur A. Fajrian, Azah Kamilah Muda
, Yun-Huoy Choo
, Sabrina Ahmad
:
A comparative study of feature extraction using PCA and LDA for face recognition. 354-359 - Karima Ait Saadi, Ahmed Bouridane, Abdelrazek Guessoum:

H.264/AVC digital fingerprinting based on content adaptive embedding. 360-365 - Luca Caviglione

, Alessio Merlo, Mauro Migliardi
:
What is Green Security? 366-371 - Rasib Hassan Khan, Jukka Ylitalo, Abu Shohel Ahmed:

OpenID authentication as a service in OpenStack. 372-377 - Massimiliano Rak

, Loredana Liccardo, Rocco Aversa:
A SLA-based interface for security management in cloud and GRID integrations. 378-383

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














