default search action
3rd SIN 2010: Rostov-on-Don, Russia
- Oleg B. Makarevich, Atilla Elçi, Mehmet A. Orgun, Sorin A. Huss, Ludmila K. Babenko, Alexander G. Chefranov, Vijay Varadharajan:
Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010. ACM 2010, ISBN 978-1-4503-0234-0
Keynote session 1
- Josef Pieprzyk:
Evolution of cryptographic hashing. 1
Keynote session 2
- Alexander Tereshkin:
Evil maid goes after PGP whole disk encryption. 2
SA.1: security assessment, policies, privacy, and educational programs
- Alexander V. Lyubimov:
Integral engineering technique for information security methodologies. 3-11 - Dmitry V. Cheremushkin, Alexander V. Lyubimov:
An application of integral engineering technique to information security standards analysis and refinement. 12-18 - Mohammad Reza Azadmanesh, Mohsen Sharifi:
Towards a system-wide and transparent security mechanism using language-level information flow control. 19-26 - Shunan Ma, Jingsha He, Feng Gao, Yuqiang Zhang:
A trust quantification method based on grey fuzzy theory. 27-31
SA.2: security assessment, policies, privacy, and educational programs
- Alexander I. Tolstoy, Natalia G. Miloslavskaya:
Bachelor of information security: ("automated systems security profile"). 32-37 - Carsten Schmoll, Nikolaos Chatzis, Christian Henke:
Protecting user privacy with multi-field anonymisation of ip addresses. 38-45 - Slava Kisilevich, Florian Mansmann:
Analysis of privacy in online social networks of runet. 46-55 - Ilker Korkmaz, Mehmet Emin Dalkiliç:
The weak and the strong password preferences: a case study on turkish users. 56-61
SA.3: security assessment, policies, privacy, and educational programs
- Steffen Bartsch:
A calculus for the qualitative risk assessment of policy override authorization. 62-70 - Alexis Velarde Pantola, Susan Pancho-Festin, Florante Salvador:
Rating the raters: a reputation system for wiki-like domains. 71-80 - Poonam Gera, Kumkum Garg, Manoj Misra:
Trust based multi-path routing for end to end secure data delivery in manets. 81-89 - Dmitry Rublev, Vladimir Fedorov, Oleg B. Makarevich:
Digital camera identification based on rotated images. 90-93
SI.1: management and models of security and integrity
- Irina V. Mashkina, Timur Kh. Tukhvatshin, Murat B. Guzairov:
The development of information security operational management system based on the intelligent technologies. 94-99 - Takeshi Takahashi, Youki Kadobayashi, Hiroyuki Fujiwara:
Ontological approach toward cybersecurity in cloud computing. 100-109 - Iryna Borysivna Tregubenko:
Reinforcement learning intellectual agent of protection for adapting to surrounding environment. 110-112
SI.2: management and models of security and integrity
- Tatiana V. Stepanova, Maxim O. Kalinin, Peter Baranov, Dmitry P. Zegzhda:
Homogeneity analysis of power consumption for information security purposes. 113-117 - Maxim O. Kalinin:
Permanent protection of information systems with method of automated security and integrity control. 118-123 - Alessandro Barenghi, Gerardo Pelosi, Yannick Teglia:
Improving first order differential power attacks through digital signal processing. 124-133
SI.3: management and models of security and integrity
- Alexander Sergeevich Mosolov, Olga Viktorovna Grafova:
Review of european patents for methods of security system design. 134-136 - Vladimir I. Vorobiev, Ludmila N. Fedorchenko, Vadim P. Zabolotsky, Alexander V. Lyubimov:
Ontology-based analysis of information security standards and capabilities for their harmonization. 137-141 - M. Asif Khan, Mureed Hussain:
Cyber security quantification model. 142-148
CS.1: cryptography, security and networks
- Lyudmila K. Babenko, Evgeniya Ishchukova:
Differential analysis of GOST encryption algorithm. 149-157 - Dmitry M. Golubchikov, Konstantin E. Rumiantsev:
Estimation of influence of error correction and privacy amplification on keys generation rate in QKD systems. 158-163 - Alexander G. Chefranov, Ahmed Y. Mahmoud:
Elgamal public key cryptosystem and signature scheme in GU(m, p, n). 164-167 - Abdulkadir Akin, Aydin Aysu, Onur Can Ulusel, Erkay Savas:
Efficient hardware implementations of high throughput SHA-3 candidates keccak, luffa and blue midnight wish for single- and multi-message hashing. 168-177
CS.2: cryptography, security and networks
- Kazim Yumbul, Serdar Süer Erdem, Erkay Savas:
Design and implementation of robust embedded processor for cryptographic applications. 178-185 - Said Gharout, Abdelmadjid Bouabdallah, Mounir Kellil, Yacine Challal:
Key management with host mobility in dynamic groups. 186-194 - Suleyman Kondakci, Gökhan Yilmaz:
Implementation and performance evaluation of the RSEP protocol on ARM and intel platforms. 194-202
CS.3: cryptography, security and networks
- Evgeny Sergeevich Abramov, Denis Valerievich Mordvin, Oleg B. Makarevich:
Automated method for constructing of network traffic filtering rules. 203-211 - Behnam Rahnama, Atilla Elçi, Selcuk Celik:
Securing RFID-based authentication systems using ParseKey+. 212-217 - Soumya Maity, Padmalochan Bera, Soumya Kanti Ghosh:
A mobile IP based WLAN security management framework with reconfigurable hardware acceleration. 218-223
AI.1: attacks and intrusion detection
- Pedro D. Salgueiro, Salvador Abreu:
A DSL for intrusion detection based on constraint programming. 224-232 - Vadim D. Kotov, Vladimir I. Vasilyev:
Immune model based approach for network intrusion detection. 233-237 - Meisam S. A. Najjar, Mohammad Abdollahi Azgomi:
A distributed multi-approach intrusion detection system for web services. 238-244 - Taner Tuncer, Yetkin Tatar:
FPGA based programmable embedded intrusion detection system. 245-248
AI.2: attacks and intrusion detection
- Jyoti Grover, Manoj Singh Gaur, Vijay Laxmi:
A novel defense mechanism against sybil attacks in VANET. 249-255 - P. Lalith Suresh, Rajbir Kaur, Manoj Singh Gaur, Vijay Laxmi:
A collusion attack detection method for OLSR-based MANETS employing scruple packets. 256-262 - Vinod P. Nair, Harshit Jain, Yashwant K. Golecha, Manoj Singh Gaur, Vijay Laxmi:
MEDUSA: MEtamorphic malware dynamic analysis usingsignature from API. 263-269
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.