


default search action
8th ICITST 2013: London, UK
- 8th International Conference for Internet Technology and Secured Transactions, ICITST 2013, London, United Kingdom, December 9-12, 2013. IEEE 2013, ISBN 978-1-908320-20-9

- Jeffrey J. Wiley:

ICITST-2013: Keynote speaker 1: Principles of information security risk management. 13 - David Stupples:

ICITST-2013: Keynote speaker 2: Security challenge of TOR and the deep web. 14 - Tyson T. Brooks:

ICITST-2013: Keynote speaker 3: Blurred nets: Disruption and the risk to future 'Internet of Things' (IoT) architectures. 15 - Charles A. Shoniregun:

ICITST-2013: Keynote speaker 4: Writing a sustainable research paper. 16 - Yoon Seok Chang:

RISC'13 Workshop: Keynote speaker 5. 17 - Dalia Battikh

, Safwan El Assad, Bassem Bakhache, Olivier Déforges, Mohamad Khalil
:
Enhancement of two spatial steganography algorithms by using a chaotic system: Comparative analysis. 20-25 - Zeinab Fawaz, Safwan El Assad, M. Frajallah, Ayman Khalil

, René Lozi
, Olivier Déforges:
Lightweight chaos-based cryptosystem for secure images. 26-30 - Daniel Caragata, Karim Tabia, Mauricio Luduena:

Cryptanalysis of a chaos-based encryption algorithm for distributed systems. 31-36 - Oleg Garasym, Ina Taralova

:
High-speed encryption method based on switched chaotic model with changeable parameters. 37-42 - Sarah Abughazalah, Konstantinos Markantonakis

, Keith Mayes:
A mutual authentication protocol for low-cost RFID tags formally verified using CasperFDR and AVISPA. 44-51 - Abdullah Ali Alshehri, Steve A. Schneider

:
Formally defining NFC M-coupon requirements, with a case study. 52-58 - Young-Ji Byon

, Young-Seon Jeong, Said M. Easa, Joonsang Baek
:
Feasibility analysis of transportation applications based on APIs of social network services. 59-64 - Mouza Ahmad Bani Shemaili, Chan Yeob Yeun

, Mohamed Jamal Zemerly
, Khalid Mubarak
, Yoon Seok Chang:
Securing E-Seal real time tracking system for Internet of Things. 65-69 - Bas Geerdink:

A reference architecture for big data solutions introducing a model to perform predictive analytics using big data technology. 71-76 - Mustafa Aydin, Jeremy Jacob:

A comparison of major issues for the development of forensics in cloud computing. 77-82 - Nasser Zalmout, Moustafa Ghanem:

Multidimensional community detection in Twitter. 83-88 - Mohammed Naji Al-Kabi

, Nawaf A. Abdulla, Mahmoud Al-Ayyoub:
An analytical study of Arabic sentiments: Maktoob case study. 89-94 - Nicholas Dzugan, Lance Fannin, S. Kami Makki:

A recommendation scheme utilizing Collaborative Filtering. 96-100 - Rawan T. Khasawneh, Heider Wahsheh, Mohammed Al-Kabi

, Izzat Mahmoud Alsmadi
:
Sentiment analysis of arabic social media content: a comparative study. 101-106 - Yuri Nakagawa, Yuuki Matsuda, Tetsuro Ogi:

Framework for handling personal data proposed system of the self-control on buying information. 107-112 - Mohammed Awad, Ernst L. Leiss:

End-to-End cryptographic voting: Potentials and limitations. 113-118 - Luciene Cristina Alves Rinaldi, Briseida Dogo de Resende

, Rodrigo Bossini Tavares Moreira, Márcio Lobo Netto
:
A system for social network analysis. 120-125 - Miyoung Jang, Ara Jo, Jae-Woo Chang:

A privacy-aware query authentication index for encrypted database in cloud. 126-131 - Xian Chen, Meilian Chen, Hyoseop Shin, Eun Yi Kim

:
Mining salient images from a large-scale blogosphere. 132-136 - Muhannad Quwaider, Yaser Jararweh

:
Cloudlet-based for big data collection in body area networks. 137-141 - Elhadj Benkhelifa

, Thomas Welsh
:
A Cloud Enabled Social Media Monitoring Platform for Events Detection and Prediction. 142-148 - Áine MacDermott

, Qi Shi, Madjid Merabti, Kashif Kifayat:
Considering an elastic scaling model for cloud Security. 150-155 - Mohammed A. Alhomidi, Martin J. Reed:

Security risk analysis as a service. 156-161 - Alex Akinbi

, Ella Pereira
, Chris Beaumont
:
Evaluating security mechanisms implemented on public Platform-as-a-Service cloud environments case study: Windows Azure. 162-167 - Melanie Willett, Rossouw von Solms:

A framework for assuring the conformance of cloud-based email. 168-173 - Nan Zhao, Loïc Baud, Patrick Bellot:

Characteristics analysis for the cyberlockers files study on Rapidgator Speedyshare and 1Fichier. 176-181 - Adel Boukhadra

, Karima Benatchba, Amar Balla
:
DA5DCSWS: A Distributed Architecture for semantic Web services Discovery and Composition. 182-187 - Miklós Kálmán:

ProtoML: A rule-based validation language for Google Protocol Buffers. 188-193 - Saadia Kedjar, Abdelkamel Tari:

The hybrid model for web services security access control and information flow control. 194-202 - Bernd Borchert, Max Günther:

Indirect NFC-login. 204-209 - Muhammad Shaheen

, Saeed Iqbal
, Fazl-e-Basit:
Labeled clustering a unique method to label unsupervised classes. 210-214 - Hyun-Hwa Choi, Byoung-Seob Kim, Shin-Young Ahn, Seung-Jo Bae:

A workflow for parallel and distributed computing of large-scale genomic data. 215-218 - Kamyab Karimi, Carl Hauser:

Internet Unite-and-Conquer architecture. 219-230 - Sara Jeza Alotaibi

, Mike Wald:
Evaluation of the UTAUT model for acceptable user experiences in Identity Access Management Systems. 232-237 - Daehee Kim, Sangwook Kang, Sunshin An:

Energy efficient time synchronization for target tracking in heterogeneous sensor networks. 238-243 - Jacques Bou Abdo, Jacques Demerjian

, Hakima Chaouchi, Kablan Barbar, Guy Pujolle:
Broker-based Cross-Cloud Federation Manager. 244-251 - Chongxiao Cao, Fengguang Song, Daniel G. Waddington:

Implementing a high-performance recommendation system using Phoenix++. 252-257 - Saeed Iqbal

, Muhammad Shaheen
, Fazl-e-Basit:
A machine learning based method for optimal journal classification. 259-264 - Shiu Hong Choi, Bo Yang

, H. H. Cheung, Y. X. Yang:
Data management of RFID-based track-and-trace anti-counterfeiting in apparel supply chain. 265-269 - Aspen Olmsted

, Csilla Farkas:
Web Service constraint optimization. 270-275 - Ahmed Osama Fathy Atya, Jilong Kuang:

RUFC: A flexible framework for reliable UDP with flow control. 276-281 - Haruhiko Fujii, Yukio Tsuruoka:

SV-2FA: Two-factor user authentication with SMS and voiceprint challenge response. 283-287 - Daniel Fischer

, Bernd Markscheffel, T. Seyffarth:
Smartphone security: Overview of security software solutions. 288-289 - Mohamed A. Abdelshafy, Peter J. B. King:

Analysis of security attacks on AODV routing. 290-295 - Nalin Asanka Gamagedara Arachchilage

, Cornelius Namiluko, Andrew P. Martin
:
A taxonomy for securely sharing information among others in a trust domain. 296-304 - Charles A. Clarke, Eckhard Pfluegel

, Dimitris Tsaptsinos:
Enhanced Virtual Private Social Networks: Implementing user content confidentiality. 306-312 - Boniface Kayode Alese

, Iwasokun Gabriel Babatunde, Haruna Danjuma Israel:
DGM approach to network attacker and defender strategies. 313-320 - Ove Sörensen:

Zombie-cookies: Case studies and mitigation. 321-326 - Aneel Rahim, Paul Malone:

Intrusion detection system for Wireless Nano sensor Networks. 327-330 - Brika Ammar, Fahima Nader:

Pedagogical hypermédias systems. 332-337 - Margarita Velasco, David While, Pathmeswaran Raju:

Adaptation of Web services using policies. 338-343 - Adam Oest, Manjeet Rege:

Feedback-driven clustering for automated linking of web pages. 344-349 - Charl van der Westhuizen, Marijke Coetzee

:
Context-aware RESTful services on mobile devices. 350-355 - Aditya Yulianto, Maria Irmina Prasetiyowati

:
BoxLock: Mobile-based Serpent cryptographic algorithm and One-Time Password mechanism implementation for Dropbox files security. 357-362 - Huda Elmogazy, Omaima Bamasak:

Towards healthcare data security in cloud computing. 363-368 - Hisham Al-Assam, Rasber Dh. Rashid

, Sabah Jassim:
Combining steganography and biometric cryptosystems for secure mutual authentication and key exchange. 369-374 - Matrazali Noorafiza, Hiroshi Maeda, Toshiyuki Kinoshita, Ryuya Uda:

Virtual machine remote detection method using network timestamp in cloud computing. 375-380 - Abdullah A. Alabdulatif

, Xiaoqi Ma
, Lars Nolle
:
Analysing and attacking the 4-way handshake of IEEE 802.11i standard. 382-387 - Luigi Catuogno

, Clemente Galdi
:
Towards the design of a film-based graphical password scheme. 388-393 - Chiara Peretti, Paolo Gastaldo

, Marco Stramezzi, Rodolfo Zunino:
Embedded implementation of Edwards curve- and extended Jacobi quartic curve-based cryptosystems. 394-400 - Supakorn Prungsinchai, Fouad Khelifi

, Ahmed Bouridane:
DCT sign-based robust image hashing. 401-405 - Robert Costello, Nigel Shaw:

Assisted Learning Virtual Support (ALVS) for postgraduate students, through the Graduate Virtual Research Environment (GVRE). 407-410 - Thuraya Kenan, Crinela Pislaru, Abdussalam Elzawi, Maysoun Restoum:

Improving the effectiveness of collaborative learning processes in Libyan Higher Education. 411-416 - Leonard James Mselle, Tabu S. Kondo:

Results on implementing personal learning environments in Tanzanian secondary schools. 417-421 - O. A. Akinsowon, Boniface Kayode Alese

:
Edge detection methods in palm-print identification. 422-426 - Afnan Ullah Khan, Manuel Oriol, Mariam Kiran:

Threat methodology for securing scalable video in the Cloud. 428-436 - Timo Schless

, Harald P. E. Vranken:
Counter botnet activities in the Netherlands a study on organisation and effectiveness. 437-442 - Sahar Maalej Dammak, Anis Jedidi

, Rafik Bouaziz
:
Automation and evaluation of the semantic annotation of Web resources. 443-448 - Arome Junior Gabriel, Boniface Kayode Alese

, Adebayo O. Adetunmbi, Olumide S. Adewale:
Post-Quantum Crystography: A combination of Post-Quantum Cryptography and Steganography. 449-452 - Nadianatra Musa, Bob Clift:

A model of component interaction between Formal, Technical and Informal components within IS/IT security governance. 454-462 - Mario Sicuranza

, Angelo Esposito
:
An access control model for easy management of patient privacy in EHR systems. 463-470 - Asma Hamed, Hella Kaffel-Ben Ayed, Mohamed Ali Kâafar

, Ahmed Kharraz:
Evaluation of third party tracking on the web. 471-477 - Jong-Hoon Lee, Jung-Tae Kim, Ik-Kyun Kim, Ki Jun Han:

Design and implementation of the contents visualization system for social networks. 479-483 - Hossain Shahriar

, Sarah North, Wei-Chuen Chen, Edward Mawangi:
Design and development of Anti-XSS proxy. 484-489 - Abdussalam Elzawi, Stephen J. Wade, Thuraya Kenan, Crinela Pislaru:

Exploratory study of the attitudes of academic staff in Libyan Universities towards the role of the Internet. 490-493 - Nwankwo Nonso Prince:

Design and implementation of microcontroller based short message service control system. 494-499 - Clara Bertolissi, Silvio Ranise

:
A methodology to build run-time monitors for security-aware workflows. 501-502 - L. J. Ontanon-Garcia

, M. Garcia-Martinez, Eric Campos-Cantón, Sergej Celikovský
:
Grayscale image encryption using a hyperchaotic unstable dissipative system. 503-507 - Abdullah Algarni, Yue Xu

, Taizan Chan, Yu-Chu Tian
:
Social engineering in social networking sites: Affect-based model. 508-515 - Tyson Brooks, Michelle L. Kaarst-Brown, Carlos Caicedo

, Joon Park, Lee McKnight
:
A failure to communicate: Security vulnerabilities in the GridStreamX Edgeware application. 516-523 - Hemlal Sahu, Birendra Kumar Sharma:

A new encryption scheme based on hybrid Problems. 524-527 - Markus Florian, Sarita Paudel

, Markus Tauber
:
Trustworthy evidence gathering mechanism for multilayer cloud compliance. 529-530 - Omer K. Jasim Mohammad

, Safia Abbas
, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem:
A comparative study between modern encryption algorithms based on cloud computing environment. 531-535 - Sofia Najwa Ramli

, Rabiah Ahmad, Mohd Faizal Abdollah
:
Electrocardiogram (ECG) signals as biometrics in securing Wireless Body Area Network. 536-541 - Vivek Shandilya, Sajjan G. Shiva:

Security in the cloud based systems: Structure and breaches. 542-547 - S. Ananda Kanagaraj, G. Arjun, T. Sree Sharmila

:
Pseudo Eye: The next-generation shopping application using Augmented Reality. 549-553 - Kiswendsida K. Kabore

, Oumarou Sie, Florence Sèdes
, André Péninou
:
Information Access Assistant Service (IAAS). 554-557 - Shafiq-Ur Rehman, Naveed Ejaz

:
Towards an efficient shopping mechanism for M-commerce. 558-562 - Hiroki Nakayama, Ryo Onuma, Hiroaki Kaminaga, Youzou Miyadera, Setsuo Yokoyama, Shoichi Nakamura:

Extraction methods of e-mail discussion processes considering diversity of description granularity and their complicated relationships. 563-568 - Maher Salem

, Ulrich Buehler:
Reinforcing network security by converting massive data flow to continuous connections for IDS. 570-575 - Balkis Hamdane, Ahmed Serhrouchni, Sihem Guemara El Fatmi:

Access control enforcement in Named Data Networking. 576-581 - Iman Ranaee, Mahdi Majidi Nia, Reza Jahantigh, Amirhossein Gharib:

Introducing a new algorithm for medical image encryption based on chaotic feature of cellular automata. 582-587 - Fatimah Y. Akeel, Gary B. Wills

, Andrew M. Gravell:
SecureDIS: A framework for secure Data Integration Systems. 588-593 - Liangxiu Han

, Zheng Xie
, Richard A. Baldock
:
Automatic data reuse for accelerating data intensive applications in the Cloud. 596-600 - Ibrahim Kabiru Musa, Stuart D. Walker:

Adaptive market place for converged cloud computing model. 601-606 - Mounira Msahli, Rached Abdeljaoued, Ahmed Serhrouchni:

Access control in probative value Cloud. 607-611 - Antti Evesti, Jani Suomalainen

, Reijo Savola:
Security risks in the short-range communication of ubiquitous application. 612-617 - Abdolazim Rezaei, Zarinah Mohd Kasirun

, Vala Ali Rohani
, Touraj Khodadadi
:
Anomaly detection in Online Social Networks using structure-based technique. 619-622 - Love Adedayo, Sergey Butakov

, Ron Ruhl, Dale Lindskog:
E-Government web services and security of Personally Identifiable Information in developing nations a case of some Nigerian embassies. 623-629 - Akintoba Emmanuel Akinwonmi, Boniface Kayode Alese

:
A prosodic Text-to-Speech system for Yorùbá language. 630-635 - Fahad M. Alotaibi, Jordan Dimitrov

:
Implementation and evaluation of classroom simulation for trainee teacher using second life environments. 636-643 - Sarita Paudel

, Markus Tauber
, Ivona Brandic
:
Security standards taxonomy for Cloud applications in Critical Infrastructure IT. 645-646 - Bruno Silva, Paulo Romero Martins Maciel, Armin Zimmermann

:
Performability models for designing disaster tolerant Infrastructure-as-a-Service cloud computing systems. 647-652 - Muteveri Kandira, Jabu Mtsweni, Keshnee Padayachee

:
Cloud security and compliance concerns: Demystifying stakeholders' roles and responsibilities. 653-658 - Dinkar Sitaram, H. L. Phalachandra, Anush Vishwanath, Pramod Ramesh, Meghana Prashanth, Akshay G. Joshi, Anoop R. Desai, Harikrishna Prabhu C. R, Prafulla, Shwetha R, Yashaswini A:

Keystone federated security. 659-664 - Wafa Slaibi Al-Shorafat:

Security in software engineering requirement. 666-673 - Denis Obrul, Borut Zalik:

Real-time adaptive arrival prediction system for public transport. 674-677 - Ryo Onuma, Hiroki Nakayama, Hiroaki Kaminaga, Yasuhiko Morimoto, Youzou Miyadera, Shoichi Nakamura:

Methods for strategic accumulation of context information in research activities. 678-683 - Umar Manzoor

, Maria Zubair, Kanwal Batool
:
Using multi-agent systems to solve food distribution problem in disaster area. 684-689

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














