IAS C

67 papers

YearTitle / Authors
20117th International Conference on Information Assurance and Security, IAS 2011, Melacca, Malaysia, December 5-8, 2011
2011A DRM framework towards preventing digital piracy.
Ravi Sankar Veerubhotla, Ashutosh Saxena
2011A SLA-based interface for security management in cloud and GRID integrations.
Massimiliano Rak, Loredana Liccardo, Rocco Aversa
2011A common key encryption algorithm using N-dimensional Hilbert curves.
Sei-ichiro Kamata
2011A comparative study of feature extraction using PCA and LDA for face recognition.
Erwin Hidayat, Nur A. Fajrian, Azah Kamilah Muda, Yun-Huoy Choo, Sabrina Ahmad
2011A cooperative intrusion detection scheme for clustered mobile ad hoc networks.
Hajar Al-Hujailan, Mznah Al-Rodhaan, Abdullah Al-Dhelaan
2011A fast eavesdropping attack against touchscreens.
Federico Maggi, Simone Gasparini, Giacomo Boracchi
2011A new approach to evaluating security assurance.
Moussa Ouedraogo, Haralambos Mouratidis, Artur Hecker, Cédric Bonhomme, Djamel Khadraoui, Eric Dubois, David Preston
2011A novel intrusion detection framework for Wireless Sensor Networks.
Murad A. Rassam, Mohd Aizaini Maarof, Anazida Binti Zainal
2011A novel system for fingerprint privacy protection
Sheng Li, Alex C. Kot
2011A secure joint wavelet based steganography and secret sharing method.
Mohammad Javad Khosravi, Samaneh Ghandali
2011A security analysis of smartphone data flow and feasible solutions for lawful interception.
Mithun Paul, Nitin Singh Chauhan, Ashutosh Saxena
2011A semantic analysis approach to manage IDS alerts flooding.
Sherif Saad, Issa Traoré
2011A two-tier energy-efficient secure routing protocol for Wireless Sensor Networks.
Aly Mohamed El-Semary, Mohamed Mostafa A. Azim
2011AES-512: 512-bit Advanced Encryption Standard algorithm design and evaluation.
Abidalrahman Moh'd, Yaser Jararweh, Lo'ai Ali Tawalbeh
2011AES: Current security and efficiency analysis of its alternatives.
Herman Isa, Iskandar Bahari, Hasibah Sufian, Muhammad Reza Z'aba
2011Access control taxonomy for social networks.
Adnan Ahmad, Brian Whitworth
2011Adaptive context-aware packet filter scheme using statistic-based blacklist generation in network intrusion detection.
Yuxin Meng, Lam-for Kwok
2011An SIR model for the propagation of topology-aware active worms considering the join and leave of hosts.
Ahmad Jafarabadi, Mohammad Abdollahi Azgomi
2011An extended rights expression model supporting dynamic digital rights management.
Dongyang Xu, Zhi Tang, Yinyan Yu
2011An identity based beta cryptosystem.
Chandrashekhar Meshram, Suchitra A. Meshram
2011Analysis on Lightweight Block Cipher, KTANTAN.
Nik Azura Nik Abdullah, Norul Hidayah Lot Ahmad Zawawi, Hazlin Abdul Rani
2011Biometric driven initiative system for passive continuous authentication.
Muhammad Khurram Khan, Pei-Wei Tsai, Jeng-Shyang Pan, Bin-Yih Liao
2011Black hole effect mitigation method in AODV routing protocol.
Zaid Ahmad, Kamarularifin Abd. Jalil, Jamalul-lail Ab Manan
2011Comparison of digital audio watermarking techniques for the security of VOIP communications.
Fusun Citak Er, Ensar Gul
2011Construction of Multivariate Quadratic Quasigroups (MQQs) in arbitrary Galois fields.
Simona Samardjiska, Yanling Chen, Danilo Gligoroski
2011Cryptanalysis of the full CHAIN cipher.
Wun-She Yap, Sze Ling Yeo, Chee Hoo Yian
2011Developing a grand strategy for Cyber War.
Andrew M. Colarik, Lech J. Janczewski
2011Distributed access control for social networks.
Adnan Ahmad, Brian Whitworth
2011Efficient iris recognition system based on dual boundary detection using robust variable learning rate Multilayer Feed Forward neural network.
Mohtashim Baqar, Sohaib Azhar, Zeeshan Iqbal, Irfan Shakeel, Laeeq Ahmed, Muhammad Moinuddin
2011Energy efficient delay leap routing in multicast using feed back neural networks.
Mohammad Uruj Jaleel, Mohammad Asghar Jamil, Kashiful Haq
2011Enhance hardware security using FIFO in pipelines.
Kuan Jen Lin, Chih Ping Weng, Tsai Kun Hou
2011Enhanced sharing and privacy in distributed information sharing environments.
Ahmad Kamran Malik, Schahram Dustdar
2011Ensemble based categorization and adaptive model for malware detection.
Muhammad Najmi Ahmad Zabidi, Mohd Aizaini Maarof, Anazida Binti Zainal
2011Examining CSCF entity attacks scenarios and vulnerabilities in IP Multimedia Subsystems.
Elham Nosrati, S. Navid Hashemi Tonekaboni, S. Majid Hashemi Tonekaboni
2011Extending Dempster Shafer method by multilayer decision template in classifier fusion.
Mehdi Salkhordeh Haghighi, Abedin Vahedian, Hadi Sadoghi Yazdi
2011Fixed size encoding scheme for software watermarking.
Azyan Yusra Kapi, Subariah Ibrahim
2011Guesswork changes in multi-processor attacks.
Reine Lundin, Stefan Lindskog
2011H.264/AVC digital fingerprinting based on content adaptive embedding.
Karima Ait Saadi, Ahmed Bouridane, Abdelrazek Guessoum
2011High capacity and inaudibility audio steganography scheme.
Haider Ismael Shahadi, Razali Jidin
2011Holistic analysis of mix protocols.
Giampaolo Bella, Denis Butin, David Gray
2011Hybrid Intelligent Decision Support System for credit risk assessment.
Hamid Reza Taremian, Mahdi Pakdaman Naeini
2011Hybrid of rough set theory and Artificial Immune Recognition System as a solution to decrease false alarm rate in intrusion detection system.
Fatin Norsyafawati Mohd Sabri, Norita Md Norwawi, Kamaruzzaman Seman
2011Information security awareness in university: Maintaining learnability, performance and adaptability through roles of responsibility.
Abdul Rahman Ahlan, Muharman Lubis
2011Integrating OAuth with Information card systems.
Haitham S. Al-Sinani
2011Intrusion detection based on k-means clustering and OneR classification.
Zaiton Muda, Warusia Yassin, Md Nasir Sulaiman, Nur Izura Udzir
2011Investigation of bypassing malware defences and malware detections.
Farid Daryabar, Ali Dehghantanha, Nur Izura Udzir
2011Key based bit level genetic cryptographic technique (KBGCT).
Subhranil Som, Niladri Shekhar Chatergee, J. K. Mandal
2011Multifactor graphical passwords: An assessment of end-user performance.
Mohd Zalisham Jali, Steven Furnell, Paul Dowland
2011On the capacity of fingerprinting codes against unknown size of colluders.
Gou Hosoya, Hideki Yagi, Manabu Kobayashi, Shigeichi Hirasawa
2011OpenID authentication as a service in OpenStack.
Rasib Hassan Khan, Jukka Ylitalo, Abu Shohel Ahmed
2011Preventing data leakage in service orchestration.
Thomas Demongeot, Eric Totel, Yves Le Traon
2011Pulse Active Mean (PAM): A PIN supporting feature extraction algorithm for doubly secure authentication.
Sairul Izwan Safie, John J. Soraghan, Lykourgos Petropoulakis
2011Reversible watermarking using Residue Number System.
Atta-ur-Rahman, Muhammad Tahir Naseem, Ijaz Mansoor Qureshi, Muhammad Zeeshan Muzaffar
2011Robust video watermarking against JPEG compression in 3D-DWT domain.
Yadollah Zamanidoost, Antonio Navarro, Zhinoos Razavi Hesabi, Nima Rahimi Froshani, Fatemeh Farnia
2011Secure Vault: A privacy preserving reliable architecture for Secure Social Networking.
Siddharth Malik, Anjali Sardana
2011Slow port scanning detection.
Mehiar Dabbagh, Ali J. Ghandour, Kassem Fawaz, Wassim El-Hajj, Hazem M. Hajj
2011State convergence and the effectiveness of time-memory-data tradeoffs.
Sui-Guan Teo, Kenneth Koon-Ho Wong, Ed Dawson, Leonie Simpson
2011State of the art: Signature verification system.
Tee Wilkin, Shih Yin Ooi
2011Strategic approach for high performance object tracking in a network of surveillance cameras.
H. H. Weerasena, P. B. S. Bandara, J. R. B. Kulasekara, B. M. B. Dassanayake, U. A. A. Niroshika, P. R. Wijenayake
2011Surveying the Wireless Body Area Network in the realm of wireless communication.
Sofia Najwa Ramli, Rabiah Ahmad
2011The new services in Nagios: Network bandwidth utility, email notification and sms alert in improving the network performance.
Mohammad Ali Arsyad bin Mohd Shuhaimi, Zaheera binti Zainal Abidin, Irda binti Roslan, Syarulnaziah binti Anawar
2011Time and energy cost analysis of Kerberos security protocol in Wireless Sensor Networks.
Farshad Amin, Amir Hossein Jahangir
2011Towards data centric mobile security.
Ali Dehghantanha, Nur Izura Udzir, Ramlan Mahmod
2011Trusted anonymizer-based RFID system with integrity verification.
Mohd Faizal Mubarak, Jamalul-lail Ab Manan, Saadiah Yahya
2011Understanding vulnerabilities by refining taxonomy.
Nurul Haszeli Ahmad, Syed Ahmad Aljunid, Jamalul-lail Ab Manan
2011What is Green Security?
Luca Caviglione, Alessio Merlo, Mauro Migliardi