


default search action
4th ICITST 2009: London, UK
- Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, ICITST 2009, London, UK, November 9-12, 2009. IEEE 2009, ISBN 978-1-4244-5648-2

- Mazdak Zamani, Azizah Bt Abdul Manaf, Rabiah Bt Ahmad, Farhang Jaryani, Hamed Taherdoost, Akram M. Zeki

:
A secure audio steganography approach. 1-6 - Kiyana Zolfaghar, Arash Barfar, Shahriar Mohammadi:

A framework for online counter terrorism. 1-5 - Muhammad Asif Habib, Christian Praher:

Object based dynamic separation of duty in RBAC. 1-5 - Maryam Tahajod, Azadeh Iranmehr, Mohammad Reza Darajeh:

A roadmap to develop enterprise security architecture. 1-5 - Ahmad Roshidi Amran, Raphael C.-W. Phan, David J. Parish:

Metrics for network forensics conviction evidence. 1-8 - Ghulam Ali, Noor Ahmed Shaikh, Zubair Ahmed Shaikh:

Towards development of a trust grid to balance between organization's interests and employee's privacy. 1-6 - Pornpit Wongthongtham, Behrang Zadjabbari:

Signifying ontology complexity for knowledge sharing. 1-5 - Saidah Saad

, Naomie Salim, Hakim Zainal:
Islamic knowledge ontology creation. 1-6 - Mohammed Alzaabi, Jawad Berri

, Mohamed Jamal Zemerly:
On the fly generation of mobile learning structured multimedia content from the web. 1-7 - Carsten Stiller, Fred Roß, Christoph Ament:

Towards spatial awareness in recommender systems. 1-7 - Khaled Alghathbar:

Low power design for silent pass authentication system. 1 - Arpita Mondal, Kaushik Roy, Prabir Bhattacharya:

Secure biometric system for accessing home appliances via Internet. 1-7 - Georgios V. Lioudakis, Fotios Gogoulos, Anna Antonakopoulou

, Aziz S. Mousas, Iakovos S. Venieris, Dimitra I. Kaklamani:
An access control approach for privacy-preserving passive network monitoring. 1-8 - Wei Zhou, Gaurav Kapoor, Selwyn Piramuthu:

Modified Slotted ALOHA protocol for RFID tag collisions. 1-2 - Constantin Anton, Laurentiu Ionescu, Ion Tutanescu, Alin Mazare, Gheorghe Serban:

Detecting errors in digital communications with CRC codes implemented with FPGA. 1-6 - Shayesteh Tabatabaei

:
Multiple criteria routing algorithms to increase durability path in mobile ad hoc networks. 1-5 - Mohammad Karami, Mohammad Fathian:

A robust trust establishment framework using Dempster-Shafer theory for MANETs. 1-7 - Peipei Shi, Bo Zhu, Amr M. Youssef:

A rotary PIN entry scheme resilient to shoulder-surfing. 1-7 - Zheng Lu, Taoxin Peng:

The VoIP intrusion detection through a LVQ-based neural network. 1-6 - Abdul Qadeer, Waqar Mahmood, Abdul Waheed:

The website census. 1-6 - Ghulam Mujtaba, David J. Parish:

Detection of applications within encrypted tunnels using packet size distributions. 1-6 - Yi-Tung F. Chan, Charles A. Shoniregun, Galyna A. Akmayeva:

Mixed load balance strategy to improve performance efficacy for three tiers Peer-to-Peer network topology. 1-7 - Elvis Pontes, Adilson Eduardo Guelfi:

IDS 3G - Third generation for intrusion detection: Applying forecasts and return on security investment to cope with unwanted traffic. 1-6 - Zakaria Karim, Karim Mohammed Rezaul, Aliar Hossain:

Towards secure information systems in online banking. 1-6 - J. Adrian Pickering, Christopher Gutteridge:

A networked registration scheme for enhancing trust. 1-5 - Joshua Ojo Nehinbe

:
Critical analyses of alerts swamping and intrusion redundancy. 1-8 - Chenglian Liu:

Improvement of authentication of anycast communication. 1-3 - Ryan Ribeiro de Azevedo, Eric Rommel Dantas Galvão, Rubean Caitano dos Santos, Cleyton Mário de Oliveira Rodrigues, Fred Freitas, Marcelo J. Siqueira:

An autonomic multiagent system ontology-based for management of security of information. 1-9 - Yi-Tung F. Chan, Charles A. Shoniregun, Galyna A. Akmayeva, Ali Al-Dahoud:

Applying semantic web and user behavior analysis to enforce the intrusion detection system. 1-5 - Tor-Morten Grønli, George Ghinea

:
Web 2.0 integration in a context-aware mobile PIM application. 1-2 - Hoda W. Maalouf:

Managing trade-offs between information loss and latency in real-time distributed systems. 1-6 - Dulyawit Prangchumpol, Siripun Sanguansintukul, Panjai Tantasanawong:

Server virtualization by user behaviour model using a data mining technique - A preliminary study. 1-5 - Alkesh Patel, Ajit Balakrishnan:

Generic framework for recommendation system using collective intelligence. 1-6 - Jarle Hansen, Gheorghita Ghinea

:
Multi-platform Bluetooth remote control. 1-2 - Nan Lu, Chunguang Zhou, Laizhong Cui:

The application of association rules algorithm on web search engine. 1-8 - Sadegh Kharazmi, Ali Farahmand Nejad, Hassan Abolhassani

:
Freshness of Web search engines: Improving performance of Web search engines using data mining techniques. 1-7 - Petr Gajdos, Michal Radecký:

Web visualization support for disaster management. 1-6 - Samir Kumar Jalal, Subal Chandra Biswas, Parthasarathi Mukhopadhyay

:
Webometric analysis of Central Universities in India: A study. 1-9 - Kanokwan Kanyamee, Chanboon Sathitwiriyawong:

A simple high-availability multiple-agent key recovery system. 1-6 - Maya I. Chehab, Ali E. Abdallah:

Architectures for identity management. 1-8 - Kasra Amirtahmasebi, Seyed Reza Jalalinia, Saghar Khadem:

A survey of SQL injection defense mechanisms. 1-8 - Tzong-I Wang, Ting Yuan Yeh:

A fault-tolerant mechanism for reducing pollution attacks in peer-to-peer networks. 1-6 - Shriram K. Vasudevan, K. Venkateshwaran, V. Vaithiyanathan, Subashri Vasudevan:

Design of analog to digital converter for SDR (Software Defined Radio). 1-5 - Boon Hoi Lim, Chong Eng Tan

:
Simplified link reliability enhancement schemes for wireless networks. 1-6 - Alessandro Giambruno, Muhammad Awais Shibli, Sead Muftic, Antonio Lioy:

MagicNET: XACML authorization policies for mobile agents. 1-7 - Bilal Rauf, M. Faisal Amjad, Kabeer Ahmed Bhatti

:
Performance evaluation of IEEE 802.11 DCF in comparison with IEEE 802.11e EDCA. 1-6 - A. R. Rizwana Shaikh, Satish Devane:

Verification of security properties of payment protocol using AVISPA. 1-6 - Riccardo Bresciani, Andrew Butterfield:

A formal security proof for the ZRTP Protocol. 1-6 - Rasha Fares, Mike Woodward:

A new algorithm for controlling the mean queue length in a buffer with time varying arrival rate. 1-6 - Petros Efstathopoulos:

Practical study of a defense against low-rate TCP-targeted DoS attack. 1-6 - Muhammad Ehsan ul Haq, Muhammad Raza Perwaz, Kabeer Ahmed Bhatti

:
Compact and user-friendly representation of IPv6 addressing approach and masking. 1-5 - Daniel Caragata, Safwan El Assad, Ion Tutanescu, Emil Sofron:

Secure TCP/IP communications over DVB-S/DVB-RCS using chaotic sequences. 1-6 - Abdul Ghafoor Abbasi, Sead Muftic, Gernot Schmölzer:

A model and design of a security provider for Java applications. 1-7 - Daphne Rixon, Mary Furey:

Who regulates the regulator: Oversight of the Canadian Radio-television and telecommunications Commission. 1-9 - Laszlo Gyongyosi, Sándor Imre:

Unduplicable quantum data medium based secret decryption and verification. 1-5 - Mathias Kretschmer, Gheorghita Ghinea:

Seamless integration of unidirectional broadcast links into QoS-constrained broadband Wireless Mesh Access Networks. 1-2 - Andrea Visconti, Hooman Tahayori:

Detecting misbehaving nodes in MANET with an artificial immune system based on type-2 fuzzy sets. 1-2 - Daniel Fischer, Bernd Markscheffel:

State of the art in wireless LAN security - Results and implications of an empirical study concerning German companies and federal authorities. 1-5 - André Filipe de Moraes Batista, Maria das Graças Bruno Marietto, Gislene Cristina de O. Barbosa, Robson dos Santos França, Guiou Kobayashi:

Multi-agent systems to build a computational middleware: A chatterbot case study. 1-2 - Taiwo Ayodele, Shikun Zhou

, Rinat Khusainov
:
Email classification: Solution with back propagation technique. 1-6 - Wafa S. Al-Sharafat, Reyadh Naoum:

Significant of features selection for detecting network intrusions. 1-6 - Emmanuel Hooper:

Intelligent strategies and techniques for effective cyber security, infrastructure protection and privacy. 1-7 - Karen O'Shea, Zuhair Bandar, Keeley A. Crockett:

A semantic-based conversational agent framework. 1-8 - Awanis M. Romli, Arnidcha P. Cha:

An expert system for stress management. 1-6 - Taiwo Ayodele, Shikun Zhou

, Rinat Khusainov
:
Intelligent email prediction system (IEPS). 1-5 - Sirilak Areerachakul, Siripun Sanguansintukul:

Water quality classification using neural networks: Case study of canals in Bangkok, Thailand. 1-5 - Hajer Ben Mahmoud Dammak, Raouf Ketata, Taieb Ben Romdhane, Samir Ben Ahmed:

Modeling Quality Management System: A multi-agent approach. 1-6 - Nacereddine Hammami, Mokhtar Sellam:

Tree distribution classifier for automatic spoken Arabic digit recognition. 1-4 - Michal Radecký, Petr Gajdos:

Traffic simulation and intelligent agents. 1-6 - Hoon Ko, Carlos Ramos:

A study on Security Status Matrix (SSM) in Urban Computing. 1-6 - Julia Sidorova, Toni Badia:

Syntactic learning for ESEDA.1, a tool for enhanced speech emotion detection and analysis. 1-6 - Rebecca Wilkins, Abel Nyamapfene:

Usability driven website design - An equine sports case study. 1-6 - Siamak Barzegar, Mohammad Shojafar, Mohammad Reza Keyvanpour

:
User interface in virtual learning environment. 1-6 - Sergey Boldyrev, Ian Oliver, Ronald Brown, Juha-Matti Tuupola, Arto Palin, Antti Lappeteläinen:

Network and content aware information management. 1-7 - Rares Vasilescu:

Architectural model for a high performance content management system. 1-6 - Ali Harb, Michel Beigbeder, Jean-Jacques Girardot:

Evaluation of question classification systems using differing features. 1-6 - Sophia Alim, Ruqayya Abdulrahman

, Daniel Neagu, Mick J. Ridley:
Data retrieval from online social network profiles for social engineering applications. 1-5 - Samir B. Patel, Tejas B. Mehta, Shrikant N. Pradhan:

A novel approach using transformation techniques and decision tree algorithm on images for performing Digital Watermarking. 1-6 - Ankit Anand, Xiao-Hong Peng, Richard Haywood:

Efficient information retrieval via proxy caching mechanisms within a lossy environment. 1-6 - Pijitra Jomsri, Siripun Sanguansintukul, Worasit Choochaiwattana:

A comparison of search engine using "tag title and abstract" with CiteULike - An initial evaluation. 1-5 - Rami Ayadi

, Mohsen Maraoui, Mounir Zrigui:
Intertextual distance for Arabic texts classification. 1-6 - Stephen Biggs, Stilianos Vidalis:

Cloud Computing: The impact on digital forensic investigations. 1-6 - Petr Pinkas, Jana Klecková:

The composite algebraic structure over capabilities and actions of a system. 1-6 - Elisabeth Lex, Christin Seifert, Michael Granitzer, Andreas Juffinger:

Cross-domain classification: Trade-off between complexity and accuracy. 1-6 - Annette Tolnai, Sebastiaan H. von Solms:

Solving security issues using Information Security Awareness Portal. 1-5 - Pornpit Wongthongtham, Natsuda Kasisopha, Surasak Komchaliaw:

Community-oriented software engineering ontology evolution. 1-4 - Khaisar Muneebulla Khan, Umesha Naik:

Open source software for personal information managers and personal knowledge management. 1-12 - Aziz El Fazziki, Sana Nouzri, Mohammed Sadgal:

A multi-agent development approach based on the MDA for modelling information systems. 1-6 - Tsang-Hung Wu, Shyh-Chang Liu:

A research on the establishment of enterprise information architecture. 1-6 - Thomas Kirkham, Ingo Dahn, David W. Chadwick, Marc Santos, Sandra Winfield:

Aggregating policies in user centric, real-time and distributed applications. 1-6 - Sanath Sukumaran, M. V. Shetty:

Knowledge Management (KM) in automobile: Application of a value chain (VC) approach using KM tools. 1-6 - Azah Anir Norman, Norizan Mohd Yasin:

An analysis of Information Systems Security Management (ISSM): The hierarchical organizations vs. emergent organization. 1-8 - Wen-Shan Lin

:
An integrated framework For modelling the adoptive behaviour of online product recommendations. 1-5 - Wiem Rekik, Maher Khemakhem

, Abdelfettah Belghith
, Jacques Fayolle:
PKI and UDDI based trust centre: An attempt to improve web service security. 1-4 - Vincent Hourdin, Jean-Yves Tigli, Stephane Lavirotte, Gaëtan Rey, Michel Riveill:

Context-sensitive authorization for asynchronous communications. 1-7 - Tom Kirkham, Kleopatra Konstanteli, Julian R. Gallop, Constantinos Lalos, Ian J. Johnson:

Identity management in a mobile service orientated grid. 1-6 - Chee Er Chang, Faisal Mohd-Yasin, Azhar Kassim Mustapha:

RBStreX: Hardware XML parser for embedded system. 1-6 - Rattikorn Hewett, Phongphun Kijsanayothin:

On securing privacy in composite web service transactions. 1-6 - Amina Gamlo

, Omaima Bamasak:
Towards securing e-transactions in e-government systems of Saudi Arabia. 1-7 - Deniz Cokuslu, Abdelkader Hameurlain, Kayhan Erciyes:

Grid resource discovery based on web services. 1-6 - Siddhartha Baruah, Anjana Kakoty Mahanta

, Kanak Chandra Sarma:
A comparative study on client server technology and web technology in design and implementation of an embedded system used for monitoring and controlling of physical parameters. 1-6 - Nallusamy Anandaraja, Nagappan Sriram, C. Kathiresan, Shibi Sebastian, E. Vadivel:

Web cum mobile based dynamic market information support for Agri-Horti produces: Linking the farmers with market. 1-6 - Rashiq Rafiq Marie, Jonathan M. Blackledge, Helmut E. Bez:

On the fractal characteristics of Internet network traffic and its utilization in covert communications. 1-6 - Frederico Guilherme Álvares de Oliveira Júnior, José Maria Parente de Oliveira:

A heuristic-based runtime ranking for service composition. 1-6 - David S. Allison, Hany F. El Yamany, Miriam A. M. Capretz:

Privacy and trust policies within SOA. 1-6 - Khaled Alghathbar, Hanan A. Mahmoud:

Noisy password security technique. 1-5 - Felix Gröbert, Ahmad-Reza Sadeghi, Marcel Winandy:

Software distribution as a malware infection vector. 1-6 - Joel Mana Gonçalves, Fabio Neves Fernandes:

The impact of information security on Latin America. 1-5 - Richard A. Guinee, Marta Blaszczyk:

A novel true random binary sequence generator based On a chaotic double scroll oscillator combination with a pseudo random generator for cryptographic applications. 1-6 - Xianghan Zheng, Vladimir A. Oleshchuk:

Trust-based framework for security enhancement of P2PSIP communication systems. 1-6 - Gao Yi, Lin Xinda, Wang Dong:

A computer based strategy design for automobile spare part logistics network optimization. 1-6 - Mahmoodreza Arefi, Amir Masoud Amini:

The elements influencing the online price dispersion on Iranian electronic retailers. 1-8 - Arian Rahimi, Sharhriar Mohammadi, Rozita Rahimi:

An efficient Iris authentication using chaos theory-based cryptography for e-commerce transactions. 1-6 - Justo Carracedo Gallardo, Emilia Pérez Belleboni:

Use of the new Smart Identity Card to reinforce electronic voting guarantees. 1-6 - Sascha Kaufmann, Christoph Schommer:

e-Conviviality in web systems by the wisdom of crowds. 1-2 - Ugo Barchetti, Anna Lisa Guido, Luca Mainetti:

A conceptual framework for business driven integration. 1-6 - Mohammad Kamel Alomari

, Kuldeep Sandhu, Peter Woods
:
E-government adoption in the Hashemite Kingdom of Jordan: Factors from social perspectives. 1-7 - Jean Stephan, Nagi Wakim, Youakim Badr

:
E-profile-based security for critical transactions in web applications. 1-2 - Demetrios Sarantis, Dimitris Askounis:

A project management ontology as a reference for e-Government projects. 1-8 - Moses Niwe, Janis Stirna:

Pattern approach to business-to-business transactions. 1-6 - Andreas Finger, Holger Meyer, Tim Rieger, Andreas Heuer:

Transactions and service level agreements for online music distribution. 1-7 - Mohammad Rahman, Karim Mohammed Rezaul, Aliar Hossain:

Finding an effective and secured information system in e-commerce environment. 1-8 - Cyril Ehijie Azenabor, Mohammad Dastbaz, Charles A. Shoniregun, Chris Imafidon:

The society and electronic government usage. 1-8 - Sandro Fiore, Alessandro Negro, Giovanni Aloisio:

Data virtualization in grid environments through the GRelC Data Access and Integration Service. 1-6 - Alexander Wöhrer, Thomas Lustig, Peter Brezany:

Scalable relational query results handling in service oriented architectures. 1-7 - Peter Paul Beran, Erich Schikuta:

An extended multi-layered blackboard approach for the optimization of world-spanning query execution plans. 1-7 - Xinxin Fan, Honggang Hu, Guang Gong, Eric M. Smith, Daniel W. Engels:

Lightweight implementation of Hummingbird cryptographic algorithm on 4-bit microcontrollers. 1-7 - Junfeng Fan, Lejla Batina, Ingrid Verbauwhede:

Light-weight implementation options for curve-based cryptography: HECC is also ready for RFID. 1-6 - Lishoy Francis, Gerhard P. Hancke, Keith Mayes, Konstantinos Markantonakis:

Potential misuse of NFC enabled mobile phones with embedded security elements as contactless attack platforms. 1-8 - Myrto Arapinis, Tom Chothia, Eike Ritter, Mark Ryan

:
Untraceability in the applied pi-calculus. 1-6 - Mouza Ahmad Bani Shemaili, Chan Yeob Yeun, Mohamed Jamal Zemerly:

RFID lightweight mutual authentication using shrinking generator. 1-6 - Macedo Firmino, Glaucio B. Brandao, Ana M. G. Guerreiro, Ricardo Alexsandro de Medeiros Valentim:

Neural cryptography applied to key management protocol with mutual authentication in RFID systems. 1-6 - Ari Juels:

Power games in RFID security. 1 - Dang Nguyen Duc, Hyunrok Lee, Divyan M. Konidala, Kwangjo Kim:

Open issues in RFID security. 1-5 - Najwa Hayaati Mohd Alwi, Ip-Shing Fan

:
Information security management in e-learning. 1-6 - Jeffy Mwakalinga, Stewart Kowalski, Louise Yngström:

Secure e-learning using a holistic and immune security framework. 1-6 - Kikelomo Maria Apampa, Gary B. Wills, David Argles:

Towards security goals in summative e-assessment security. 1-5 - Christian Willems, Wesam Dawoud, Thomas Klingbeil, Christoph Meinel:

Security in Tele-Lab - Protecting an online virtual lab for security training. 1-7 - Juanita I. Fernando:

The elephant in the room: Health information system security and the user-level environment. 1-7 - Said Jafari, Fredrick Mtenzi

, Ronan Fitzpatrick, Brendan O'Shea:
An approach for developing comparative security metrics for healthcare organizations. 1-6 - Rose Tinabo, Fredrick Mtenzi

, Brendan O'Shea:
Anonymisation vs. Pseudonymisation: Which one is most useful for both privacy protection and usefulness of e-healthcare data. 1-6 - Zanifa Omary, Fredrick Mtenzi

, Bing Wu:
How does politics affect electronic healthcare adoption. 1-8 - Zanifa Omary, Fredrick Mtenzi

:
Dataset threshold for the performance estimators in supervised machine learning experiments. 1-8 - Indika Perera

, Colin Allison, Ross Nicoll, Thomas Sturgeon:
Towards successful 3D virtual learning - a case study on teaching human computer interaction. 1-6 - Abhimanyu Jain, Ashish Jain, Aditya Raj, Tushar Pahwa:

Sequenced picture captcha: generation and its strength analysis. 1-8 - Kaouthar Boumhamdi, Zahi Jarir

:
Yet another approach for dynamic web service composition. 1-5 - Hironori Egi

, Hiroshi Shigeno, Ken-ichi Okada:
Grasping contextual awareness inside aworkspace at the entrance to support group interaction. 1-8

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














