default search action
6th SIN 2013: Aksaray, Turkey
- Atilla Elçi, Manoj Singh Gaur, Mehmet A. Orgun, Oleg B. Makarevich:
The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013. ACM 2013, ISBN 978-1-4503-2498-4 - Georges Ataya:
Information security, risk governance and management frameworks: an overview of COBIT 5. 3-5 - Ludmila K. Babenko:
Analysis of GOST 28147-89 security: methods and algorithms. 6 - Erkay Savas:
Attacks on implementations of cryptographic algorithms: side-channel and fault attacks. 7-14 - Ali Aydin Selçuk:
Trusting SSL in practice. 15 - Bart Preneel:
The SHA-3 competition: lessons learned. 16-19 - R. K. Shyamasundar:
Security and protection of SCADA: a bigdata algorithmic approach. 20-27 - Katharina Krombholz, Heidelinde Hobel, Markus Huber, Edgar R. Weippl:
Social engineering attacks on the knowledge worker. 28-35 - Christophe Feltus, Djamel Khadraoui:
Conviction model for incident reaction architecture monitoring based on automatic sensors alert detection. 39-45 - Herman Isa, Norziana Jamil, Muhammad Reza Z'aba:
S-box construction from non-permutation power functions. 46-53 - Wolter Pieters, Julian A. Padget, Francien Dechesne, Virginia Dignum, Huib Aldewereld:
Obligations to enforce prohibitions: on the adequacy of security policies. 54-61 - Naïm Qachri, Frédéric Lafitte, Olivier Markowitch:
Authenticated key agreement in wireless networks with automated key management. 62-69 - Jérôme Dossogne, Frédéric Lafitte:
On authentication factors: "what you can" and "how you do it". 70-78 - Jérôme Dossogne, Frédéric Lafitte, Dirk Van Heule:
Secure and practical threshold RSA. 79-85 - Hussain Nyeem, Wageeh W. Boles, Colin Boyd:
Counterfeiting attacks on block-wise dependent fragile watermarking schemes. 86-93 - Geong Sen Poh, Mohd Amril Nurman Mohd Nazir, Bok-Min Goi, Syh-Yuan Tan, Raphael Chung-Wei Phan, Maryam Safiyah Shamsudin:
An authentication framework for peer-to-peer cloud. 94-101 - Saeid Tizpaz-Niari, Amir Hossein Jahangir:
Verification of OSPF vulnerabilities by colored Petri net. 102-109 - Frédéric Lafitte, Olivier Markowitch, Dirk Van Heule:
SAT based analysis of LTE stream cipher ZUC. 110-116 - Nikolay Sergeev, Alexey A. Tselykh, Alexander N. Tselykh:
Generalized approach to modeling user activity graphs for network security and public safety monitoring. 117-122 - Marek Klonowski, Michal Koza, Miroslaw Kutylowski:
Efficient and robust data aggregation using untrusted infrastructure. 123-130 - Isao Nakanishi, Hironao Fukuda, Shigang Li:
Biometric verification using brain waves toward on-demand user management systems: performance differences between divided regions in α - β wave band. 131-135 - Mudassar Aslam, Christian Gehrmann, Mats Björkman:
Continuous security evaluation and auditing of remote platforms by combining trusted computing and security automation techniques. 136-143 - Hossain Shahriar, Vamshee Krishna Devendran, Hisham Haddad:
ProClick: a framework for testing clickjacking attacks in web applications. 144-151 - Parvez Faruki, Vijay Ganmoor, Vijay Laxmi, Manoj Singh Gaur, Ammar Bharmal:
AndroSimilar: robust statistical feature signature for Android malware detection. 152-159 - Juan Carlos Moreno, V. B. Surya Prasath, Hugo Proença:
Robust periocular recognition by fusing local to holistic sparse representations. 160-164 - Mohammad Ali Orumiehchiha, Josef Pieprzyk, Elham Shakour, Ron Steinfeld:
Cryptanalysis of RC4(n, m) stream cipher. 165-172 - Jérôme Dossogne, Frédéric Lafitte:
Blinded additively homomorphic encryption schemes for self-tallying voting. 173-180 - Md. Sadek Ferdous, Ron Poet:
Analysing attribute aggregation models in federated identity management. 181-188 - Vijay Laxmi, Deepanshu Mehta, Manoj Singh Gaur, Parvez Faruki, Chhagan Lal:
Impact analysis of JellyFish attack on TCP-based mobile ad-hoc networks. 189-195 - Hosnieh Rafiee, Christoph Mueller, Lukas Niemeier, Jannik Streek, Christoph Sterz, Christoph Meinel:
A flexible framework for detecting IPv6 vulnerabilities. 196-202 - Casey Mortensen, Ryan Winkelmaier, Jun Zheng:
Exploring attack vectors facilitated by miniaturized computers. 203-209 - Yulong Fu, Ousmane Koné:
Using transition systems to model and verify the implementation of security protocol. 210-217 - Hosnieh Rafiee, Christoph Meinel:
Privacy and security in IPv6 networks: challenges and possible solutions. 218-224 - Salim Khamadja, Kamel Adi, Luigi Logrippo:
Designing flexible access control models for the cloud. 225-232 - Shahid Alam, R. Nigel Horspool, Issa Traoré:
MAIL: Malware Analysis Intermediate Language: a step towards automating and optimizing malware detection. 233-240 - Somayeh Taheri, Salke Hartung, Dieter Hogrefe:
Anonymity and privacy in multicast mobile ad hoc networks. 241-250 - Guy Guemkam, Jonathan Blangenois, Christophe Feltus, Djamel Khadraoui:
Metamodel for reputation based agents system: case study for electrical distribution SCADA design. 251-255 - Behnam Rahnama, Yunus Kiran, Raz Dara:
Countering AES static s-box attack. 256-260 - Edward Caprin, Yan Zhang, Khaled M. Khan:
Social access control language (SocACL). 261-265 - Romdhane Ben Younes, Guy Tremblay:
A possibilistic approach to intrusion detection under imperfect logging protocol. 266-271 - Aldjia Boucetta, Kamal Eddine Melkemi:
Hand shape recognition using Hu and Legendre moments. 272-276 - Pablo Lamilla Álvarez, Yoshiaki Takata:
An HBAC-based approximation for IBAC programs. 277-281 - Salim Khamadja, Kamel Adi, Luigi Logrippo:
An access control framework for hybrid policies. 282-286 - Lihui Hu, Jean Mayo, Charles Wallace:
An empirical study of three access control systems. 287-291 - Mohammad A. AlAhmad, Imad Fakhri Alshaikhli, Mridul Nandi:
Joux multicollisions attack in sponge construction. 292-296 - Dmitry Rublev, Vladimir Fedorov, Oleg B. Makarevich:
Digital camera identification system. 297-300 - Soumik Mondal, Patrick Bours, Syed Zulkarnain Syed Idrus:
Complexity measurement of a password for keystroke dynamics: preliminary study. 301-305 - Orhan Ermis, Serif Bahtiyar, Emin Anarim, M. Ufuk Çaglayan:
An improved fault-tolerant conference-key agreement protocol with forward secrecy. 306-310 - T. Mekhaznia:
Nature inspired heuristics for attack of simplified DES algorithm. 311-315 - Anil Saini, Manoj Singh Gaur, Vijay Laxmi:
The darker side of Firefox extension. 316-320 - Duygu Sinanc, Seref Sagiroglu:
A review on cloud security. 321-325 - Ahmad AlSa'deh, Christoph Meinel, Florian Westphal, Marian Gawron, Björn Groneberg:
CGA integration into IPsec/IKEv2 authentication. 326-330 - Alexander G. Chefranov, SeyedMasoud Alavi Abhari, Hooman Alavizadeh, Maryam Farajzadeh-Zanjani:
Secure true random number generator in WLAN/LAN. 331-335 - Eman Hableel, Young-Ji Byon, Joonsang Baek:
Public key infrastructure for UAE: a case study. 336-340 - Valeriy O. Osipyan:
Information protection systems based on universal knapsack problem. 343-346 - Mohammed Gharib, Mohsen Minaei, Morteza Golkari, Ali Movaghar:
Expert key selection impact on the MANETs' performance using probabilistic key management algorithm. 347-351 - Ludmila K. Babenko, Evgeniya Ishchukova:
Influence of S-Boxes to the resistance of GOST algorithm against linear cryptanalysis. 352-355 - Artem S. Konoplev, Maxim O. Kalinin:
Security policy verification in grid systems. 356-358 - Yüksel Arslan, Yildiray Yalman:
Visual steganalysis of LSB-encoded audio data based on frequency domain characteristics. 359-362 - Abdulaziz Almehmadi, Khalil El-Khatib:
Authorized! access denied, unauthorized! access granted. 363-367 - Yulong Fu, Ousmane Koné:
A finite transition model for security protocol verification. 368-371 - Evgeny Sergeevich Abramov, Elena Basan, Oleg B. Makarevich:
Development of a secure cluster-based wireless sensor network model. 372-375 - Sarmad Ullah Khan, Rafiullah Khan:
Content-location based key management scheme for content centric networks. 376-379 - Pyatkov Anton, Vyacheslav Zolotarev:
About responsibilities distribution for information security. 380-383 - Leonid S. Bershtein, Alexey A. Tselykh:
A clique-based method for mining fuzzy graph patterns in anti-money laundering systems. 384-387 - Meriam Jemel, Nadia Ben Azzouna, Khaled Ghédira:
A novel approach for dynamic authorisation planning in constrained workflow systems. 388-391 - Ziyad Tariq Mustafa Al-Ta'l, Omar Younis Abdulhameed:
Features extraction of fingerprints using firefly algorithm. 392-395 - Ludmila K. Babenko, Alexandr S. Basan, Oleg B. Makarevich:
Performance analysis of the developed mandatory access control system in the DBMS. 396-399 - Zahra Khani, Reza Azmi:
A protocol for simultaneous use of confidentiality and integrity in large-scale storage systems. 400-403 - Evgeny Sergeevich Abramov, Maxim Kobilev, Oleg B. Makarevich:
Using quadrocopter as a pentest tool. 404-407 - Aurathai Wareesa-ard:
EndNote vs Zotero in searching library catalog via Z39.50 of academic libraries in Thailand. 411-412 - Ramachandra Raghavendra, Kiran B. Raja, Bian Yang, Christoph Busch:
Improved face recognition at a distance using light field camera & super resolution schemes. 413-416 - Valeriy O. Osipyan, A. S. Zhuck, A. H. Arutyunyan, Y. A. Karpenko:
Building of mathematical model of flow data processing system based on given selection of elements of the set. 417-420 - Rohan Nanda, P. Venkata Krishna:
D0M-WLAN: a traffic analysis based approach for detecting malicious activities on wireless networks. 421-424 - Muhammad Kazim, Rahat Masood, Muhammad Awais Shibli:
Securing the virtual machine images in cloud computing. 425-428 - N. Rajamanickam, R. Nadarajan:
Implementing real-time transactional security property using timed edit automata. 429-432 - Ksenia Tsyganok, Evgeny Tumoyan, Lyudmila K. Babenko:
Development the method of detection the malicious pages interconnection in the internet. 433-435 - Morteza Barati, Karim Faez, Zahra Hakimi:
A novel threshold-based scan detection method using genetic algorithm. 436-439 - Meriam Jemel, Nadia Ben Azzouna, Khaled Ghédira:
Towards a dynamic authorisation planning satisfying intra-instance and inter-instance constraints. 440-443 - Christophe Feltus, Djamel Khadraoui:
On designing automatic reaction strategy for critical infrastructure SCADA system. 444-445 - Oleg B. Makarevich, Irina V. Mashkina, Alina Sentsova:
The method of the information security risk assessment in cloud computing systems. 446-447 - Maxim Anikeev, Felix C. Freiling:
Preventing malicious data harvesting from deallocated memory areas. 448-449 - Georges Ataya:
Linking business goals to information security plans and activities. 453 - Arif Sari, Behnam Rahnama:
Addressing security challenges in WiMAX environment. 454-456 - Cihangir Tezcan:
Improbable differential cryptanalysis. 457 - Manoj Singh Gaur, Dhiren R. Patel, Anil Saini:
Insecurities within browser: issues and challenges. 458 - Hossain Shahriar:
Security vulnerabilities and mitigation techniques of web applications. 459 - Sambit Bakshi, Tugkan Tuglular:
Security through human-factors and biometrics. 463 - Sattar B. Sadkhan, Nidaa A. Abbass:
Multidisciplinary prospective in cryptology. 464 - Christophe Feltus:
Industry program panel. 465
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.