SIN C

90 papers

YearTitle / Authors
2013A clique-based method for mining fuzzy graph patterns in anti-money laundering systems.
Leonid S. Bershtein, Alexey A. Tselykh
2013A finite transition model for security protocol verification.
Yulong Fu, Ousmane Koné
2013A flexible framework for detecting IPv6 vulnerabilities.
Hosnieh Rafiee, Christoph Mueller, Lukas Niemeier, Jannik Streek, Christoph Sterz, Christoph Meinel
2013A novel approach for dynamic authorisation planning in constrained workflow systems.
Meriam Jemel, Nadia Ben Azzouna, Khaled Ghédira
2013A novel threshold-based scan detection method using genetic algorithm.
Morteza Barati, Karim Faez, Zahra Hakimi
2013A possibilistic approach to intrusion detection under imperfect logging protocol.
Romdhane Ben Younes, Guy Tremblay
2013A protocol for simultaneous use of confidentiality and integrity in large-scale storage systems.
Zahra Khani, Reza Azmi
2013A review on cloud security.
Duygu Sinanc, Seref Sagiroglu
2013About responsibilities distribution for information security.
Pyatkov Anton, Vyacheslav Zolotarev
2013Addressing security challenges in WiMAX environment.
Arif Sari, Behnam Rahnama
2013An HBAC-based approximation for IBAC programs.
Pablo Lamilla Álvarez, Yoshiaki Takata
2013An access control framework for hybrid policies.
Salim Khamadja, Kamel Adi, Luigi Logrippo
2013An authentication framework for peer-to-peer cloud.
Geong Sen Poh, Mohd Amril Nurman Mohd Nazir, Bok-Min Goi, Syh-Yuan Tan, Raphael Chung-Wei Phan, Maryam Safiyah Shamsudin
2013An empirical study of three access control systems.
Lihui Hu, Jean Mayo, Charles Wallace
2013An improved fault-tolerant conference-key agreement protocol with forward secrecy.
Orhan Ermis, Serif Bahtiyar, Emin Anarim, M. Ufuk Çaglayan
2013Analysing attribute aggregation models in federated identity management.
Md Sadek Ferdous, Ron Poet
2013Analysis of GOST 28147-89 security: methods and algorithms.
Ludmila K. Babenko
2013AndroSimilar: robust statistical feature signature for Android malware detection.
Parvez Faruki, Vijay Ganmoor, Vijay Laxmi, Manoj Singh Gaur, Ammar Bharmal
2013Anonymity and privacy in multicast mobile ad hoc networks.
Somayeh Taheri, Salke Hartung, Dieter Hogrefe
2013Attacks on implementations of cryptographic algorithms: side-channel and fault attacks.
Erkay Savas
2013Authenticated key agreement in wireless networks with automated key management.
Naïm Qachri, Frédéric Lafitte, Olivier Markowitch
2013Authorized! access denied, unauthorized! access granted.
Abdulaziz Almehmadi, Khalil El-Khatib
2013Biometric verification using brain waves toward on-demand user management systems: performance differences between divided regions in
Isao Nakanishi, Hironao Fukuda, Shigang Li
2013Blinded additively homomorphic encryption schemes for self-tallying voting.
Jérôme Dossogne, Frédéric Lafitte
2013Building of mathematical model of flow data processing system based on given selection of elements of the set.
Valeriy O. Osipyan, A. S. Zhuck, A. H. Arutyunyan, Y. A. Karpenko
2013CGA integration into IPsec/IKEv2 authentication.
Ahmad AlSa'deh, Christoph Meinel, Florian Westphal, Marian Gawron, Björn Groneberg
2013Complexity measurement of a password for keystroke dynamics: preliminary study.
Soumik Mondal, Patrick Bours, Syed Zulkarnain Syed Idrus
2013Content-location based key management scheme for content centric networks.
Sarmad Ullah Khan, Rafiullah Khan
2013Continuous security evaluation and auditing of remote platforms by combining trusted computing and security automation techniques.
Mudassar Aslam, Christian Gehrmann, Mats Björkman
2013Conviction model for incident reaction architecture monitoring based on automatic sensors alert detection.
Christophe Feltus, Djamel Khadraoui
2013Counterfeiting attacks on block-wise dependent fragile watermarking schemes.
Hussain Nyeem, Wageeh W. Boles, Colin Boyd
2013Countering AES static s-box attack.
Behnam Rahnama, Yunus Kiran, Raz Dara
2013Cryptanalysis of RC4(n, m) stream cipher.
Mohammad Ali Orumiehchiha, Josef Pieprzyk, Elham Shakour, Ron Steinfeld
2013D0M-WLAN: a traffic analysis based approach for detecting malicious activities on wireless networks.
Rohan Nanda, P. Venkata Krishna
2013Designing flexible access control models for the cloud.
Salim Khamadja, Kamel Adi, Luigi Logrippo
2013Development of a secure cluster-based wireless sensor network model.
Evgeny Sergeevich Abramov, Elena Basan, Oleg B. Makarevich
2013Development the method of detection the malicious pages interconnection in the internet.
Ksenia Tsyganok, Evgeny Tumoyan, Lyudmila K. Babenko
2013Digital camera identification system.
Dmitry Rublev, Vladimir Fedorov, Oleg B. Makarevich
2013Efficient and robust data aggregation using untrusted infrastructure.
Marek Klonowski, Michal Koza, Miroslaw Kutylowski
2013EndNote vs Zotero in searching library catalog via Z39.50 of academic libraries in Thailand.
Aurathai Wareesa-ard
2013Expert key selection impact on the MANETs' performance using probabilistic key management algorithm.
Mohammed Gharib, Mohsen Minaei, Morteza Golkari, Ali Movaghar
2013Exploring attack vectors facilitated by miniaturized computers.
Casey Mortensen, Ryan Winkelmaier, Jun Zheng
2013Features extraction of fingerprints using firefly algorithm.
Ziyad Tariq Mustafa Al-Ta'l, Omar Younis Abdulhameed
2013Generalized approach to modeling user activity graphs for network security and public safety monitoring.
Nikolay Sergeev, Alexey A. Tselykh, Alexander N. Tselykh
2013Hand shape recognition using Hu and Legendre moments.
Aldjia Boucetta, Kamal Eddine Melkemi
2013Impact analysis of JellyFish attack on TCP-based mobile ad-hoc networks.
Vijay Laxmi, Deepanshu Mehta, Manoj Singh Gaur, Parvez Faruki, Chhagan Lal
2013Implementing real-time transactional security property using timed edit automata.
N. Rajamanickam, R. Nadarajan
2013Improbable differential cryptanalysis.
Cihangir Tezcan
2013Improved face recognition at a distance using light field camera & super resolution schemes.
Ramachandra Raghavendra, Kiran B. Raja, Bian Yang, Christoph Busch
2013Industry program panel.
Christophe Feltus
2013Influence of S-Boxes to the resistance of GOST algorithm against linear cryptanalysis.
Ludmila K. Babenko, Evgeniya Ishchukova
2013Information protection systems based on universal knapsack problem.
Valeriy O. Osipyan
2013Information security, risk governance and management frameworks: an overview of COBIT 5.
Georges Ataya
2013Insecurities within browser: issues and challenges.
Manoj Singh Gaur, Dhiren R. Patel, Anil Saini
2013Joux multicollisions attack in sponge construction.
Mohammad A. AlAhmad, Imad Fakhri Alshaikhli, Mridul Nandi
2013Linking business goals to information security plans and activities.
Georges Ataya
2013MAIL: Malware Analysis Intermediate Language: a step towards automating and optimizing malware detection.
Shahid Alam, R. Nigel Horspool, Issa Traoré
2013Metamodel for reputation based agents system: case study for electrical distribution SCADA design.
Guy Guemkam, Jonathan Blangenois, Christophe Feltus, Djamel Khadraoui
2013Multidisciplinary prospective in cryptology.
Sattar B. Sadkhan, Nidaa A. Abbass
2013Nature inspired heuristics for attack of simplified DES algorithm.
T. Mekhaznia
2013Obligations to enforce prohibitions: on the adequacy of security policies.
Wolter Pieters, Julian A. Padget, Francien Dechesne, Virginia Dignum, Huib Aldewereld
2013On authentication factors: "what you can" and "how you do it".
Jérôme Dossogne, Frédéric Lafitte
2013On designing automatic reaction strategy for critical infrastructure SCADA system.
Christophe Feltus, Djamel Khadraoui
2013Performance analysis of the developed mandatory access control system in the DBMS.
Ludmila K. Babenko, Alexandr S. Basan, Oleg B. Makarevich
2013Preventing malicious data harvesting from deallocated memory areas.
Maxim Anikeev, Felix C. Freiling
2013Privacy and security in IPv6 networks: challenges and possible solutions.
Hosnieh Rafiee, Christoph Meinel
2013ProClick: a framework for testing clickjacking attacks in web applications.
Hossain Shahriar, Vamshee Krishna Devendran, Hisham Haddad
2013Public key infrastructure for UAE: a case study.
Eman Hableel, Young-Ji Byon, Joonsang Baek
2013Robust periocular recognition by fusing local to holistic sparse representations.
Juan Carlos Moreno, V. B. Surya Prasath, Hugo Proença
2013S-box construction from non-permutation power functions.
Herman Isa, Norziana Jamil, Muhammad Reza Z'aba
2013SAT based analysis of LTE stream cipher ZUC.
Frédéric Lafitte, Olivier Markowitch, Dirk Van Heule
2013Secure and practical threshold RSA.
Jérôme Dossogne, Frédéric Lafitte, Dirk Van Heule
2013Secure true random number generator in WLAN/LAN.
Alexander G. Chefranov, SeyedMasoud Alavi Abhari, Hooman Alavizadeh, Maryam Farajzadeh-Zanjani
2013Securing the virtual machine images in cloud computing.
Muhammad Kazim, Rahat Masood, Muhammad Awais Shibli
2013Security and protection of SCADA: a bigdata algorithmic approach.
R. K. Shyamasundar
2013Security policy verification in grid systems.
Artem S. Konoplev, Maxim O. Kalinin
2013Security through human-factors and biometrics.
Sambit Bakshi, Tugkan Tuglular
2013Security vulnerabilities and mitigation techniques of web applications.
Hossain Shahriar
2013Social access control language (SocACL).
Edward Caprin, Yan Zhang, Khaled M. Khan
2013Social engineering attacks on the knowledge worker.
Katharina Krombholz, Heidelinde Hobel, Markus Huber, Edgar R. Weippl
2013The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013
Atilla Elçi, Manoj Singh Gaur, Mehmet A. Orgun, Oleg B. Makarevich
2013The SHA-3 competition: lessons learned.
Bart Preneel
2013The darker side of Firefox extension.
Anil Saini, Manoj Singh Gaur, Vijay Laxmi
2013The method of the information security risk assessment in cloud computing systems.
Oleg B. Makarevich, Irina V. Mashkina, Alina Sentsova
2013Towards a dynamic authorisation planning satisfying intra-instance and inter-instance constraints.
Meriam Jemel, Nadia Ben Azzouna, Khaled Ghédira
2013Trusting SSL in practice.
Ali Aydin Selçuk
2013Using quadrocopter as a pentest tool.
Evgeny Sergeevich Abramov, Maxim Kobilev, Oleg B. Makarevich
2013Using transition systems to model and verify the implementation of security protocol.
Yulong Fu, Ousmane Koné
2013Verification of OSPF vulnerabilities by colored Petri net.
Saeid Tizpaz-Niari, Amir Hossein Jahangir
2013Visual steganalysis of LSB-encoded audio data based on frequency domain characteristics.
Yüksel Arslan, Yildiray Yalman