


default search action
6th ICITST 2011: Abu Dhabi, UAE
- 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011. IEEE 2011, ISBN 978-1-908320-00-1

- Hilal Houssain, Mohamad Badra, Turki F. Al-Somani:

Hardware implementations of Elliptic Curve Cryptography in Wireless Sensor Networks. 1-6 - Turki F. Al-Somani, Hilal Houssain:

Implementation of GF(2m) Elliptic Curve cryptoprocessor on a Nano FPGA. 7-12 - Hamad Marzouqi, Khaled Salah, Mahmoud Al-Qutayri, Chan Yeob Yeun:

A unified countermeasure against side channel attacks on cryptographic RFID. 13-18 - Huwida Said, Mário A. M. Guimarães, Noora Al Mutawa, Ibtesam Al Awadhi:

Forensics and war-driving on unsecured wireless network. 19-24 - Mohamed Elmoghany, Mohamed Diab, Moustafa Kassem, Mustafa Khairallah, Omar El Shahat, Wael Sharkasy:

FPGA implementation of high speed XTS-AES for data storage devices. 25-28 - Muna Abdulla Al Shehhi, Joonsang Baek, Chan Yeob Yeun:

The use of Boolean functions in stream ciphers. 29-33 - Khalfan AlMarashda, Yousuf Alsalami, Khaled Salah, Thomas Martin:

On the security of inclusion or omission of MixColumns in AES cipher. 34-39 - Noura Al Ebri, Joonsang Baek, Chan Yeob Yeun:

Study on Secret Sharing Schemes (SSS) and their applications. 40-45 - Ameera Salem Abdouli, Joonsang Baek, Chan Yeob Yeun:

Survey on computationally hard problems and their applications to cryptography. 46-52 - Hajer Al Housani, Joonsang Baek, Chan Yeob Yeun:

Survey on certificateless public key cryptography. 53-58 - Lezhen Ling, Junguo Liao:

Anonymous electronic voting protocol with traceability. 59-66 - Fatma Ahmad Bazargan, Chan Yeob Yeun, Mohamed Jamal Zemerly:

Understanding the security challenges of virtualized environments. 67-72 - Amr Sayed Abdel Fattah, Salwa H. El-Ramly, Magdy M. Ibrahim, Ahmed Abdel-Hafez:

Synchronization recovery of chaotic signal through imperfect channel using optimization approach. 73-78 - Amr Sayed Abdel Fattah, Salwa H. El-Ramly, Magdy M. Ibrahim, Ahmed Abdel-Hafez:

Denoising algorithm for noisy chaotic signal by using wavelet transform: Comprehensive study. 79-85 - Daniele Fournier-Prunaret, Pascal Chargé, Laura Gardini:

Chaos generation from 1D or 2D circuits including switches. 86-90 - René Lozi, Estelle Cherrier:

Noise-resisting ciphering based on a chaotic multi-stream pseudo-random number generator. 91-96 - Kassem Ahmad, Bassem Bakhache, Safwan El Assad, Daniel Caragata, Maryline Chetto:

Multicast security protocol over satellite DVB based on chaotic sequences. 97-102 - SeongHan Shin, Kazukuni Kobara, Hideki Imai:

A secure public cloud storage system. 103-109 - Imad M. Abbadi, Cornelius Namiluko:

Dynamics of trust in Clouds - Challenges and research agenda. 110-115 - Kheng Kok Mar:

Secured Virtual Diffused File System for the cloud. 116-121 - Nezar Nassr, Eric Steegmans:

A parameterized RBAC access control model for WS-BPEL orchestrated composite web services. 122-127 - G. Hughes, Dhiya Al-Jumeily, Abir Jaafar Hussain:

Research, design and development review of the Cloud Computing Management System (CCMS). 128-131 - Nitha Rachel Suresh, Suresh V. Mathew:

Security concerns for cloud computing in aircraft data networks. 132-136 - Bo Mi, Jianqiu Cao:

A novel key establishment scheme for wireless sensor networks based on complex network synchronization. 137-141 - Xin Hu, Yonglin Sun, Yongjun Wang, Zhanrui Ren, Jie Liu:

Two algorithms for Network Security Gradient marking. 142-147 - Jumpei Arakawa, Koichi Sasada:

A decentralized access control mechanism using authorization certificate for distributed file systems. 148-153 - M. Bavafa, Zahra Taheri Hanjani, N. Navidi:

A survey on space-time & high-rate redundant. 154-158 - Yonglin Sun, Yongjun Wang, Xin Hu, Zhanrui Ren, Jie Liu:

A new perspective of network vulnerability analysis using Network Security Gradient. 159-163 - Martin Kuba:

Automated trust negotiation in identity federations using OWL-based abduction of missing credentials. 164-169 - Anam Tariq, Muhammad Usman Akram, Shoab Ahmad Khan:

An automated system for fingerprint classification using singular points for biometric security. 170-175 - Pavel Lozhnikov, Oksana Chernikova:

Handwriting dynamics as a means of authentication. 176-179 - Muhammad Usman Akram, Anam Tariq, Shoab Ahmad Khan:

Retinal recognition: Personal identification using blood vessels. 180-184 - Hiroyuki Yoshimura:

Fingerprint templates with high recognition accuracy and high security generated by discrete fractional sine transform. 185-190 - Maleika Heenaye-Mamode Khan, Naushad Mamode Khan:

Dorsal hand vein biometric using Independent Component Analysis (ICA). 191-195 - Maryam Mehrnejad, Abbas Ghaemi Bafghi, Ahad Harati, Ehsan Toreini:

Multiple SEIMCHA: Multiple semantic image CAPTCHA. 196-201 - Léa D. Cot, Christian Bès:

Study of the robustness of an enhanced CSK system by using the Extended Kalman Filter. 202-207 - Petre Anghelescu, Silviu Ionita, Vasile-Gabriel Iana:

FPGA implementation of cellular automata based encryption algorithm for internet communications. 208-213 - Farhan Bashir Shaikh, Sajjad Haider:

Security threats in cloud computing. 214-219 - Hadi H. Abdlrudha, Qassim Nasir:

Low complexity high security image encryption based on Nested PWLCM Chaotic Map. 220-225 - Hassan Noura, Safwan El Assad, Calin Vladeanu, Daniel Caragata:

An efficient and secure SPN cryptosystem based on chaotic control parameters. 226-231 - Aymen Boudguiga, Maryline Laurent:

An EAP ID-based authentication method for wireless networks. 232-239 - Ayman Mukaddam, Imad H. Elhajj:

Hop count variability. 240-244 - Dimitris Zisiadis, Spyros Kopsidas, Argyris Varalis, Leandros Tassiulas:

Mailbook: A social network against spamming. 245-249 - Asjad Amin, Haseeb Ahmed, Abubakar Rafique, Muhammad Junaid Nawaz, Muhammad Salahudin, Zulfiqar Ahmed:

Designing a hierarchical DHCP server's model to automatically provide dedicated IP address anywhere in the world with mobility. 250-253 - Azzam Mourad, Hadi Otrok, Hamdi Yahyaoui, Lama Baajour:

Toward an abstract language on top of XACML for web services security. 254-259 - Jane Saetent, Nattawut Vejkanchana, Suphamit Chittayasothorn:

A thin client application development using OCL and conceptual schema. 260-265 - Ramez Shamseldin:

Dynamically complex system using adaptive simulation for interconnected nodes. 266-273 - Laurentiu Ionescu, Constantin Anton, Ion Tutanescu, Alin Mazare, Gheorghe Serban:

Reed-Muller decoder with associative memories. 274-277 - Daniel Caragata, Safwan El Assad, Charles A. Shoniregun, Galyna A. Akmayeva:

UMTS security: Enhancement of identification, authentication and key agreement protocols. 278-282 - Muhammad Qasim Saeed, Colin D. Walter:

A Record Composition/Decomposition attack on the NDEF Signature Record Type Definition. 283-287 - Basheer Al-Duwairi, I. Khater, Omar M. Al-Jarrah:

Texture Analysis-Based Image Spam Filtering. 288-293 - Hanno Hildmann, Sebastien Nicolas, Fabrice Saffre:

Critical infrastructure protection through distributed reactive demand-side management. 294-301 - Soulaf Saab, Wassim Itani, Ayman I. Kayssi, Ali Chehab, Cesar Ghali:

Secure delay-tolerant communications in the presence of oppressive governments. 302-307 - Maitha Salem Al Mazrouei, Sundaravalli Narayanaswami:

Mobile adhoc networks: A simulation based security evaluation and intrusion prevention. 308-313 - Arben Asllani, Amjad Ali:

Securing information systems in airports: A practical approach. 314-318 - Georgi T. Tsenov, Valeri M. Mladenov, Ina Taralova:

Synchronization of Sigma Delta Modulators. 319-322 - Jared D. DeMott, Richard J. Enbody, William F. Punch III:

Towards an automatic exploit pipeline. 323-329 - Ayman A. Hanafy, Sherif Hazem Noureldin, Marianne A. Azer:

Immunizing the SAODV protocol against routing information disclosure. 330-334 - Ehsan Toreini, Maryam Mehrnejad:

A novel method in fuzzy data clustering based on chaotic PSO. 335-340 - Tina Francis:

Proximity aware overlays in peer-to-peer networks. 341-344 - Khaled Salah, M. Al-Saba, M. Akhdhor, O. Shaaban, M. I. Buhari:

Performance evaluation of popular Cloud IaaS providers. 345-349 - Imad M. Abbadi, Cornelius Namiluko, Andrew P. Martin:

Insiders analysis in Cloud computing focusing on home healthcare system. 350-357 - Faisal Al Ameiri, Khaled Salah:

Evaluation of popular application sandboxing. 358-362 - Faisal Al Ameiri, Mohamed Jamal Zemerly, Mohamed Al Marzouqi:

Mobile Arabic sign language. 363-367 - George S. Oreku:

Key complication procedure in data driven ciphers based on controlled substitution-permutation networks. 368-372 - Umm-e Laila, Syed Zain Ali Shah, Nadia Ishaque:

Using Keystroke-Level Model to analyze IOS optimization techniques. 373-377 - Noora Albalooshi, Nader Mohamed, Jameela Al-Jaroodi:

The challenges of Arabic language use on the Internet. 378-382 - Jong-Hoon Hoon Lee, Jung-Tae Tae Kim, HeeKyung Lee, Eui-Hyun H. Paik:

Design and implementation of the Geo-Context Engine for semantic social media service. 383-387 - Marcus Vinicius Carvalho Guelpeli, Ana Cristina Bicharra Garcia, António Horta Branco:

The process of summarization in the pre-processing stage in order to improve measurement of texts when clustering. 388-395 - Maryline Chetto, Hussein El Ghor, Rafic Hage Chehade:

Real-time scheduling for energy harvesting sensors. 396-402 - P. R. Lakshmi Eswari:

A process framework for securing an e-Learning ecosystem. 403-407 - Christian Willems, Thomas Klingbeil, Lukas Radvilavicius, Antanas Cenys, Christoph Meinel:

A distributed virtual laboratory architecture for cybersecurity training. 408-415 - Mahmoud Khonji, Youssef Iraqi, Andrew Jones:

Mitigation of spear phishing attacks: A Content-based Authorship Identification framework. 416-421 - Mahmoud Khonji, Youssef Iraqi, Andrew Jones:

Lexical URL analysis for discriminating phishing and legitimate e-mail messages. 422-427 - Ahmed A. Sabeeh, Arash Habibi Lashkari:

Users' perceptions on mobile devices security awareness in Malaysia. 428-435 - Hassan Shakeri, Abbas Ghaemi Bafghi:

Propagation of trust and confidence using intervals. 436-441 - Markus Gruber, Florian Fankhauser, Stefan Taber, Christian Schanes, Thomas Grechenig:

Trapping and analyzing malicious VoIP traffic using a honeynet approach. 442-447 - Jens Hasselbach, Patrick Aichroth:

Access control and content authentication for hybrid DVB-T2/P2P broadcasting. 448-453 - Pradhumna Shrestha, Michael Hempel, Tao Ma, Dongming Peng, Hamid Sharif:

A general attack method for steganography removal using Pseudo-CFA re-interpolation. 454-459 - Mohamed Zayed, Asma Ouari, Meriem Derraschouk, Youcef Chibani:

An effective hybrid thresholding technique for degraded documents images binarization. 460-465 - Hend Al Tair, Mohamed Jamal Zemerly, Mahmoud Al-Qutayri, Marcello Leida:

Pro-active multi-agent recommender system for travelers. 466-471 - Hadiseh Seyyed Alipour, Mehdi Sabbari, Eslam Nazemi:

A policy based access control model for web services. 472-477 - Gang Wang, Kunming Nie:

A framework of VI-based ranking and recommendation of web services. 478-483 - Nai-Wei Lo, Shiou-Huei Ruan, Tzong-Chen Wu:

Ownership transfer protocol for RFID objects using lightweight computing operators. 484-489 - Woo Ram Kim, Yoon Seok Chang:

A study on RFID code structure for traceability system of electric vehicle batteries. 490-494 - Ramzi Bassil, Wissam El-Beaino, Ayman I. Kayssi, Ali Chehab:

A PUF-based ultra-lightweight mutual-authentication RFID protocol. 495-499 - Masoumeh Safkhani, Nasour Bagheri, Majid Naderi:

Vulnerabilities in a new RFID access control protocol. 500-503 - Salwa Adriana Saab, Ayman I. Kayssi, Ali Chehab:

A decentralized energy-aware key management scheme for Wireless Sensor Networks. 504-508 - Mohamed B. Abdelhalim, Mohamed S. El-Mahallawy, M. Ayyad, Adel ElHennawy:

Implementation of a modified lightweight cryptographic TEA algorithm in RFID system. 509-513 - Youssef Gahi, Mouhcine Guennoun, Zouhair Guennoun, Khalil El-Khatib:

Encrypted processes for oblivious data retrieval. 514-518 - Hanno Hildmann, Sebastien Nicolas, Fabrice Saffre:

Demand-side management for air conditioning. 519-524 - Mohammad Moein Taheri, Kamran Zamanifar:

2-phase optimization method for energy aware scheduling of virtual machines in cloud data centers. 525-530 - Kris Scott, Rachid Benlamri:

Context-aware real-time framework for local collaboration. 531-535 - Sheheryar Malik, Fabrice Huet:

Virtual Cloud: Rent Out the Rented Resources. 536-541 - Hun-lung Lim, Tai-Myoung Myoung Chung:

Performace evaluation of relative positioning based on low-cost GPS and VANET. 542-543 - Kin Fai Poon, Anis Ouali:

A MILP based design tool for FTTH access networks with consideration of demand growth. 544-549 - Hanno Hildmann:

Behavioural game AI - A theoretical approach. 550-555 - Amna AlDahak AlShamsi, M. AlMarzouqi, Lakmal D. Seneviratne:

Evaluating USARSim for use in fire search and rescue. 556-561 - Ali Safari Mamaghani, Mohammad Reza Meybodi:

An application of Imperialist Competitive Algorithm to solve the quadratic assignment problem. 562-565 - Mehran Garmehi, Morteza Analoui:

An economical mechanism for multicasting of content among servers of Hybrid CDN-P2P networks. 566-571 - Abdur Rahim Choudhary:

Policy rule-sets for policy based systems. 572-577 - Hussam M. N. Al Hamadi, Chan Yeob Yeun, Mohamed Jamal Zemerly, Mahmoud Al-Qutayri, Amjad Gawanmeh:

Formal modeling and verification of DLK protocol. 578-583 - Markus Jung, Georg Kienesberger, Wolfgang Granzer, Martin Unger, Wolfgang Kastner:

Privacy enabled web service access control using SAML and XACML for home automation gateways. 584-591 - Mhamed Zineddine:

Automated healthcare information privacy and security: UAE case. 592-595 - Ahmed B. Mahmood, Robert D. Dony:

Segmentation based encryption method for medical images. 596-601 - Ghazi Ben Ayed, Solange Ghernaouti-Helie:

Privacy requirements specification for digital identity management systems implementation: Towards a digital society of privacy. 602-607 - Salem Benferhat, Khalid Bouriche, Mohamed Ouzarf:

Encoding default-based SELinux-security policy in Organization-Based Access Control Model. 608-613 - Eric Southern, Abdelkader H. Ouda, Abdallah Shami:

Solutions to security issues with legacy integration of GSM into UMTS. 614-619 - Eduardo Rocha, Paulo Salvador, António Manuel Duarte Nogueira:

A real-time traffic classification approach. 620-626 - Jarkko Ekberg, Jorma Ylinen, Pekka Loula:

Network behaviour anomaly detection using Holt-Winters algorithm. 627-631 - Tomasz Bilski:

Security-functionality tradeoffs in IP transition phase. 632-638 - Devendra Mani Tripathi:

A note on modified SET protocol for mobile payment. 639-641 - Amjad Gawanmeh, Sofiène Tahar:

Modeling and verification of firewall configurations using domain restriction method. 642-647 - S. Jeyalatha, B. Vijayakumar:

Design and implementation of a web structure mining algorithm using breadth first search strategy for academic search application. 648-654 - Jung-Tae Tae Kim, Jong-Hoon Hoon Lee, HeeKyung Lee, Eui-Hyun H. Paik:

Location-based personalized social media service for the Smart Phone: Distributed social contents sharings. 655-659 - Thomas Bosch, Brigitte Mathiak:

XSLT transformation generating OWL ontologies automatically based on XML Schemas. 660-667 - Asjad Amin, Haseeb Ahmad Qureshi, Muhammad Junaid Nawaz, Muhammad Yasir Habib, Waqas Anjum:

Modified run length encoding scheme with introduction of bit stuffing for efficient data compression. 668-672 - Salwa Belaqziz, Abdelaziz El Fazziki, Mohammed El Adnani, Michel Le Page:

An Agent-Based Modeling approach for decision-making in Gravity Irrigation Systems. 673-680 - Chigusa Yamamura, Kazuhiro Otsuki, Arisa Fujii, Kiyohiko Ishikawa:

Identity management architecture for integrated personalized service on TV. 681-682 - Mohammad Reza Sohizadeh Abyaneh:

On the privacy of two tag ownership transfer protocols for RFIDs. 683-688 - Masoumeh Safkhani, Nasour Bagheri, Majid Naderi, Somitra Kumar Sanadhya:

Security analysis of LMAP++, an RFID authentication protocol. 689-694 - Nazish Irfan, Mustapha C. E. Yagoub, Khelifa Hettak:

Redundant reader elimination for directional antenna in RFID systems. 695-700 - Mahmoud A. Alahmad, Muhammad F. Zulfiqar, Hosen Hasna, Timothy Wisnieski, Nasser A. Aljuhaishi, Hamid Sharif:

Technologies enabling sustainability in the built environment. 701-706 - Bernd Markscheffel, Daniela Büttner, Daniel Fischer:

Desktop search engines - A state of the art comparison. 707-712 - Flávio Dumortout de Mendonça Júnior, Daniela Gorski Trevisan, Thiago Cortat Tavares, José Luiz Thomaselli Nogueira:

A-CitizenMobile: A case study for blind users. 713-717 - Benjamin Hirsch, Jason W. P. Ng:

Education beyond the cloud: Anytime-anywhere learning in a smart campus environment. 718-723 - Arianna Del Soldato, Pasquale Lazzareschi, Maurizio Martinelli, Giuseppe Vasarelli:

The use of detection systems to improve the quality of the Italian Public Administration. 724-725 - Hicham Sadok:

E-Banking in Morocco: Study of some specifying factors. 726-731 - Farshad Rahimiasl, Reza Azmi:

SeKMAC: A secure model for key management and access control in cryptographic file system. 732-737 - Sami Noponen, Jarno Salonen, Hanna-Miina Sihvonen, Taina A. Kurki:

Systematic literature review of virtual role. 738-743 - Xian Zhang, Martin Leucker, Wei Dong:

An event pattern language for runtime monitoring based on AOP. 744-751 - Galoh Rashidah Haron, Kang Siong Ng:

Extrapolating security requirements to an established software process: Version 1.0. 752-757 - Boustia Narhimene, Aïcha Mokhtari:

Temporal context in multilevel access control model. 758-763 - Norah Farooqi, Siobhán North:

Trust-based access control for XML databases. 764-765 - Hanan Al Obaidli, Asif Iqbal:

Digital forensics education in UAE. 766-770 - Noora Al Mutawa, Ibtesam Al Awadhi, Ibrahim M. Baggili, Andrew Marrington:

Forensic artifacts of Facebook's instant messaging service. 771-776 - Waleed Halboob, Muhammad Abulaish, Khaled Alghathbar:

Quaternary privacy-levels preservation in computer forensics investigation process. 777-782 - Theodoros Tzouramanis:

A robust watermarking scheme for relational databases. 783-790 - Mahmood Salehi, Hamed Samavati, Mehdi Dehghan:

Performance assessment of OLSR protocol under routing attacks. 791-796 - Michael Naseimo Daikpor, Oluwole Adegbenro:

Concurrent realization of the multiply-by-7 Elliptic Curve Scalar Multiplication algorithm. 797-804

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














