researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
1991
2009
2010
2011
Filter by Tag
[+]
OR
AND
NOT
1
C++
Meta-Environment
access control
analysis
architecture
certification
data-flow
design
e-science
graph-rewriting
meta-model
mobile
protocol
rewriting
routing
rule-based
security
systematic-approach
testing
wireless sensor networks
Filter by Author
[+]
OR
AND
NOT
1
Dakshina Ranjan Kisku
Debnath Bhattacharyya
Firdous Kausar
Hao Xu
Hiroshi Masuyama
Hyuntae Kim
Jae Sang Cha
Jamuna Kanta Sing
Jang Mook Kang
Jangsik Park
Maricel O. Balitanas
Mohammed Meziani
Mukhtar Hussain
Mustafa Mat Deris
Phalguni Gupta
Pierre-Louis Cayrel
Sidi Mohamed El Yousfi Alaoui
Tai-Hoon Kim
Toshihiko Sasama
You-Jin Song
Filter by Top terms
[+]
OR
AND
NOT
1
algorithm
analysis
approach
authentication
control
data
detection
efficient
information
method
mobile
network
networks
scheme
secure
security
sensor
system
using
wireless
ISA (sersc-isa)
Editions
Publications
Viewing Publication 1 - 100 from 256
2011
Improved Identity-Based Identification and Signature Schemes Using Quasi-Dyadic Goppa Codes
Sidi Mohamed El Yousfi Alaoui
,
Pierre-Louis Cayrel
,
Mohammed Meziani
.
sersc-isa 2011
:
146-155
[doi]
The Proactive and Reactive Digital Forensics Investigation Process: A Systematic Literature Review
Soltan Alharbi
,
Jens H. Weber-Jahnke
,
Issa Traoré
.
sersc-isa 2011
:
87-100
[doi]
High Speed and Low-Complexity Mode Decision for Advanced Video Coding
Byoungman An
,
YoungSeop Kim
,
Oh-Jin Kwon
.
sersc-isa 2011
:
339-348
[doi]
Supervisory Control and Data Acquisition System CAIN Issues
Maricel O. Balitanas
,
Tai-Hoon Kim
.
sersc-isa 2011
:
227-235
[doi]
Retrofit to CAIN of IP-Based Supervisory Control and Data Acquisition System
Maricel O. Balitanas
,
Seung-Hwan Jeon
,
Tai-Hoon Kim
.
sersc-isa 2011
:
211-218
[doi]
Development of Integrated Adapter Based on Multi-sensor Networks for Tracking and Surveillance
Jun-Pil Boo
,
Do-Hyeun Kim
.
sersc-isa 2011
:
333-338
[doi]
A Comparative Study of a New Associative Classification Approach for Mining Rare and Frequent Classification Rules
Ines Bouzouita
,
Michel Liquiere
,
Samir Elloumi
,
Ali Jaoua
.
sersc-isa 2011
:
43-52
[doi]
Recent Progress in Code-Based Cryptography
Pierre-Louis Cayrel
,
Sidi Mohamed El Yousfi Alaoui
,
Gerhard Hoffmann
,
Mohammed Meziani
,
Robert Niebuhr
.
sersc-isa 2011
:
21-32
[doi]
GPU Implementation of the Keccak Hash Function Family
Pierre-Louis Cayrel
,
Gerhard Hoffmann
,
Michael Schneider 0002
.
sersc-isa 2011
:
33-42
[doi]
Requirements Analysis and Critical Requirement Derivation Method Using Macrostruktur
Yong-Kyun Cho
,
Young-Bum Park
.
sersc-isa 2011
:
367-377
[doi]
RFID Implementation and Security Issues
Young B. Choi
,
Tae-Hwan Oh
,
Rajath Chouta
.
sersc-isa 2011
:
236-249
[doi]
Design of a Retargetable Decompiler for a Static Platform-Independent Malware Analysis
Lukás Durfina
,
Jakub Kroustek
,
Petr Zemek
,
Dusan Kolár
,
Tomas Hruska
,
Karel Masarik
,
Alexander Meduna
.
sersc-isa 2011
:
72-86
[doi]
Improvement of Message Processing Method for SOA Based Digital Set-Top Box System
Ji-Yeon Hwang
,
Seung-Jung Shin
,
DaeHyun Ryu
.
sersc-isa 2011
:
306-312
[doi]
User-Oriented Pseudo Biometric Image Based One-Time Password Mechanism on Smart Phone
Wonjun Jang
,
Sikwan Cho
,
Hyung-Woo Lee
.
sersc-isa 2011
:
395-404
[doi]
A Study for Security Scheme and the Right to Be Forgotten Based on Social Network Service for Smart-Phone Environment
Jang Mook Kang
,
You-Jin Song
,
Jae Sang Cha
,
Seon-Hee Lee
.
sersc-isa 2011
:
326-332
[doi]
A Scheme for Role-Based 3D CCTV Using CS-RBAC (Context-Sensitivity Role-Based Access Control)
Jang Mook Kang
,
Jae Sang Cha
,
You-Jin Song
,
Goo-Man Park
,
Eun-Young Ko
,
Myong-chul Shin
,
Jeong Jin Kang
,
YouSik Hong
.
sersc-isa 2011
:
378-383
[doi]
Non-interactive Deniable Authentication Protocol Using Generalized ECDSA Signature Scheme
Jayaprakash Kar
.
sersc-isa 2011
:
166-176
[doi]
Information Security Awareness Campaign: An Alternate Approach
Bilal Khan
,
Khaled Alghathbar
,
Muhammad Khurram Khan
.
sersc-isa 2011
:
1-10
[doi]
A Noise Robust Echo Canceller with Post-processing Using Liner Predictor and Wiener filter
Hyuntae Kim
,
DaeHyun Ryu
,
Jangsik Park
.
sersc-isa 2011
:
264-274
[doi]
Vehicle Tracking Based on Kalman Filter in Tunnel
Gyuyeong Kim
,
Hyuntae Kim
,
Jangsik Park
,
Yunsik Yu
.
sersc-isa 2011
:
250-256
[doi]
Information Security and Assurance - International Conference, ISA 2011, Brno, Czech Republic, August 15-17, 2011. Proceedings
Tai-Hoon Kim
,
Hojjat Adeli
,
Rosslin John Robles
,
Maricel O. Balitanas
, editors,
Volume 200 of
Communications in Computer and Information Science
, Springer,
2011.
[doi]
An Efficient Private Registry Management System Using DHT Based on FIPA Agent Platform
Seung-Hyun Lee
,
Kyung-Soo Jang
,
Kee-Hyun Choi
,
Choon-Sung Nam
,
Dong Ryeol Shin
.
sersc-isa 2011
:
282-291
[doi]
Multistep Attack Detection and Alert Correlation in Intrusion Detection Systems
Fabio Manganiello
,
Mirco Marchetti
,
Michele Colajanni
.
sersc-isa 2011
:
101-110
[doi]
Lower Bounds for Interpolating Polynomials for Square Roots of the Elliptic Curve Discrete Logarithm
Gerasimos C. Meletiou
,
Yannis C. Stamatiou
,
Apostolos Tsiakalos
.
sersc-isa 2011
:
177-187
[doi]
2SC: An Efficient Code-Based Stream Cipher
Mohammed Meziani
,
Pierre-Louis Cayrel
,
Sidi Mohamed El Yousfi Alaoui
.
sersc-isa 2011
:
111-122
[doi]
S-FSB: An Improved Variant of the FSB Hash Family
Mohammed Meziani
,
Özgür Dagdelen
,
Pierre-Louis Cayrel
,
Sidi Mohamed El Yousfi Alaoui
.
sersc-isa 2011
:
132-145
[doi]
Towards Algebraic Cryptanalysis of HFE Challenge 2
Mohamed Saied Emam Mohamed
,
Jintai Ding
,
Johannes Buchmann
.
sersc-isa 2011
:
123-131
[doi]
Using SAT Solving to Improve Differential Fault Analysis of Trivium
Mohamed Saied Emam Mohamed
,
Stanislav Bulygin
,
Johannes Buchmann
.
sersc-isa 2011
:
62-71
[doi]
A Detrministic Factorization and Primality Testing Algorithm for Integers of the Form Z Mod 6 = -1
Noureldien Abdelrhman Noureldien
,
Mahmud Awadelkariem
,
DeiaEldien M. Ahmed
.
sersc-isa 2011
:
156-165
[doi]
Implementation Fire Detection Algorithm Using Fixed Point Digital Signal Processor
Jangsik Park
,
Hyuntae Kim
,
Yunsik Yu
.
sersc-isa 2011
:
275-281
[doi]
Vessel Tracking Using Adaboost Algorithm and AIS Information
Jangsik Park
,
Hyuntae Kim
,
Gyuyeong Kim
,
Yunsik Yu
.
sersc-isa 2011
:
384-388
[doi]
Securing Communication between SCADA Master Station and Mobile Remote Components
Rosslin John Robles
,
Gilcheol Park
.
sersc-isa 2011
:
203-210
[doi]
Application Program Interface as Back-Up Data Source for SCADA Systems
Rosslin John Robles
,
Tai-Hoon Kim
.
sersc-isa 2011
:
219-226
[doi]
An Intelligent Clustering Method for Highly Similar Digital Photos Using Pyramid Matching with Human Perceptual 25 Color Histogram
Dong-Sung Ryu
,
Kwanghwi Kim
,
Hwan-Gue Cho
.
sersc-isa 2011
:
359-366
[doi]
A Data Management Method to Secure Data in Cloud Computing Environment
You-Jin Song
,
Jae Sang Cha
,
Jang Mook Kang
,
Wan Sik kim
.
sersc-isa 2011
:
313-317
[doi]
A Study for Method of Construct Encryption Scheme for Supporting Range Query Based on Bucket ID Transformation about Sensor Applications
You-Jin Song
,
Jae Sang Cha
,
Jang Mook Kang
.
sersc-isa 2011
:
292-305
[doi]
The Contents Based Music Retrieval Method Using Audio Feature Analysis against Polyphonic Music
Chai-Jong Song
,
Seok-Pil Lee
,
Hochong Park
.
sersc-isa 2011
:
257-263
[doi]
VLSI Architecture of Adaptive Viterbi Decoder for Wireless Communication
Dongjae Song
,
Soongyu Kwon
,
Chun-Guan Kim
,
Jong-Tae Kim
.
sersc-isa 2011
:
318-325
[doi]
Towards Next Generation System Architecture for Emergency Services
Jari Veijalainen
,
Veikko Hara
.
sersc-isa 2011
:
188-202
[doi]
Equivalent Key Recovery Attack on H 2-MAC Instantiated with MD5
Wei Wang
.
sersc-isa 2011
:
11-20
[doi]
Relative Self-Localization Base on Fish-Eye Lenses and SIFT Algorithm for Indoor Mobile Robot
Xing Xiong
,
Byung-Jae Choi
.
sersc-isa 2011
:
389-394
[doi]
Robust Congestion Control Design for Input Time Delayed AQM System
Ji Hoon Yang
,
Seung-Jung Shin
,
Dong Kyun Lim
,
Jeong Jin Kang
.
sersc-isa 2011
:
349-358
[doi]
Secret Key Awareness Security Public Key Encryption Scheme
Guoyan Zhang
,
Qiuliang Xu
.
sersc-isa 2011
:
53-61
[doi]
2010
Mining Significant Least Association Rules Using Fast SLP-Growth Algorithm
Zailani Abdullah
,
Tutut Herawan
,
Mustafa Mat Deris
.
sersc-isa 2010
:
324-336
[doi]
Security Risks of Cloud Computing and Its Emergence as 5th Utility Service
Mushtaq Ahmad
.
sersc-isa 2010
:
209-219
[doi]
Towards the Designing of a Robust Intrusion Detection System through an Optimized Advancement of Neural Networks
Iftikhar Ahmad
,
Azween B. Abdullah
,
Abdullah Sharaf Alghamdi
.
sersc-isa 2010
:
597-602
[doi]
A New Holistic Security Approach for Government Critical Systems: Flooding Prevention
Mohammed A. Alhabeeb
,
Abdullah M. Almuhaideb
,
Phu Dung Le
,
Bala Srinivasan
.
sersc-isa 2010
:
249-264
[doi]
Using an Integrated Ontology Database to Categorize Web Pages
Rujiang Bai
,
Xiaoyue Wang
,
Junhua Liao
.
sersc-isa 2010
:
300-309
[doi]
Extract Semantic Information from WordNet to Improve Text Classification Performance
Rujiang Bai
,
Xiaoyue Wang
,
Junhua Liao
.
sersc-isa 2010
:
409-420
[doi]
IPV6 Mobile Network Protocol Weaknesses and a Cryptosystem Approach
Maricel O. Balitanas
,
Tai-Hoon Kim
.
sersc-isa 2010
:
116-127
[doi]
Security Analysis of the Proposed Practical Security Mechanisms for High Speed Data Transfer Protocol
Danilo Valeros Bernardo
,
Doan B. Hoang
.
sersc-isa 2010
:
100-114
[doi]
Lane Design for Speed Optimization
Debnath Bhattacharyya
,
Arijit Chakraborty
,
Feruza Sattarova Yusufovna
,
Young-hun Lee
,
Tai-Hoon Kim
.
sersc-isa 2010
:
97-107
[doi]
Directed Graph Pattern Synthesis in LSB Technique on Video Steganography
Debnath Bhattacharyya
,
Arup Kumar Bhaumik
,
Minkyu Choi
,
Tai-Hoon Kim
.
sersc-isa 2010
:
61-69
[doi]
Biometric Authentication Using Infrared Imaging of Hand Vein Patterns
Debnath Bhattacharyya
,
A. Shrotri
,
S. C. Rethrekar
,
M. H. Patil
,
Farkhod A. Alisherov
,
Tai-Hoon Kim
.
sersc-isa 2010
:
108-115
[doi]
SIMACT: A 3D Open Source Smart Home Simulator for Activity Recognition
Kevin Bouchard
,
Amir Ajroud
,
Bruno Bouchard
,
Abdenour Bouzouane
.
sersc-isa 2010
:
524-533
[doi]
Post-quantum Cryptography: Code-Based Signatures
Pierre-Louis Cayrel
,
Mohammed Meziani
.
sersc-isa 2010
:
82-99
[doi]
Infrastructure Aided Privacy Preserving-Authentication in VANETs
Brijesh Kumar Chaurasia
,
Shekhar Verma
,
G. S. Tomar
.
sersc-isa 2010
:
179-189
[doi]
Security Improvement on a Remote User Authentication Scheme Using Smart Cards
Tien-Ho Chen
,
Han-Cheng Hsiang
,
Wei Kuan Shih
.
sersc-isa 2010
:
9-16
[doi]
CAS4UA: A Context-Aware Service System Based on Workflow Model for Ubiquitous Agriculture
Yongyun Cho
,
Hyun Yoe
,
Haeng-Kon Kim
.
sersc-isa 2010
:
572-585
[doi]
Dynamic Routing for Mitigating the Energy Hole Based on Heuristic Mobile Sink in Wireless Sensor Networks
Seong-Yong Choi
,
Jin-Su Kim
,
Seung-Jin Han
,
Jun Hyeog Choi
,
Kee-Wook Rim
,
Jung-Hyun Lee
.
sersc-isa 2010
:
159-174
[doi]
A Numerical Study on B&B Algorithms for Solving Sum-Of-Ratios Problem
Lianbo Gao
,
Jianming Shi
.
sersc-isa 2010
:
356-362
[doi]
Receiver Based Traffic Control Mechanism to Protect Low Capacity Network in Infrastructure Based Wireless Mesh Network
Syed Sherjeel Ahmad Gilani
,
Muhammad Zubair
,
Zeeshan Shafi Khan
.
sersc-isa 2010
:
225-232
[doi]
Maximized Posteriori Attributes Selection from Facial Salient Landmarks for Face Recognition
Phalguni Gupta
,
Dakshina Ranjan Kisku
,
Jamuna Kanta Sing
,
Massimo Tistarelli
.
sersc-isa 2010
:
1-8
[doi]
Maximized Posteriori Attributes Selection from Facial Salient Landmarks for Face Recognition
Phalguni Gupta
,
Dakshina Ranjan Kisku
,
Jamuna Kanta Sing
,
Massimo Tistarelli
.
sersc-isa 2010
:
337-344
[doi]
Attacks on Bluetooth Security Architecture and Its Countermeasures
Mian Muhammad Waseem Iqbal
,
Firdous Kausar
,
Muhammad Arif Wahla
.
sersc-isa 2010
:
190-197
[doi]
Intrusion Correlation Using Ontologies and Multi-agent Systems
Gustavo A. Isaza
,
Andrés G. Castillo
,
Marcelo López
,
Luis Fernando Castillo
,
Manuel López
.
sersc-isa 2010
:
51-63
[doi]
Modified Anonymous Authentication Scheme with Enhanced Security for Wireless Communication
Muhammad Asif Khan
,
Firdous Kausar
,
Ashraf Masood
.
sersc-isa 2010
:
198-208
[doi]
Chinese Prosody Generation Based on C-ToBI Representation for Text-To-Speech
Byeongchang Kim
.
sersc-isa 2010
:
558-571
[doi]
Development of a Digital Textbook Standard Format Based on XML
Mihye Kim
,
Kwan-Hee Yoo
,
Chan Park
,
Jae Soo Yoo
.
sersc-isa 2010
:
363-377
[doi]
An XML-Based Digital Textbook and Its Educational Effectiveness
Mihye Kim
,
Kwan-Hee Yoo
,
Chan Park
,
Jae Soo Yoo
,
Hoseung Byun
,
Wanyoung Cho
,
Jeeheon Ryu
,
Namgyun Kim
.
sersc-isa 2010
:
509-523
[doi]
Advances in Computer Science and Information Technology, AST/UCMA/ISA/ACN 2010 Conferences, Miyazaki, Japan, June 23-25, 2010. Joint Proceedings
Tai-Hoon Kim
,
Hojjat Adeli
, editors,
Volume 6059 of
Lecture Notes in Computer Science
, Springer,
2010.
[doi]
Pattern Recognition Using Artificial Neural Network: A Review
Tai-Hoon Kim
.
sersc-isa 2010
:
138-148
[doi]
A Bootstrap Software Reliability Assessment Method to Squeeze Out Remaining Faults
Mitsuhiro Kimura
,
Takaji Fujiwara
.
sersc-isa 2010
:
435-446
[doi]
Feature Level Fusion of Face and Palmprint Biometrics by Isomorphic Graph-Based Improved K-Medoids Partitioning
Dakshina Ranjan Kisku
,
Phalguni Gupta
,
Jamuna Kanta Sing
.
sersc-isa 2010
:
70-81
[doi]
Fuzzy-Based Detection of Injected False Data in Wireless Sensor Networks
Hae Young Lee
,
Tae Ho Cho
,
Hyung-Jong Kim
.
sersc-isa 2010
:
128-137
[doi]
Tag ID Subdivision Scheme for Efficient Authentication and Security-Enhancement of RFID System in USN
Kijeong Lee
,
Byungjoo Park
,
Gil Cheol Park
.
sersc-isa 2010
:
64-71
[doi]
Multiple Asynchronous Requests on a Client-Based Mashup Page
Eunjung Lee
,
Kyong-Jin Seo
.
sersc-isa 2010
:
287-299
[doi]
A Power Control Scheme for an Energy-Efficient MAC Protocol
Ho Chul Lee
,
Jeong-hwan Hwang
,
Meong-hun Lee
,
Haeng-Kon Kim
,
Hyun Yoe
.
sersc-isa 2010
:
586-596
[doi]
Design of an Efficient Message Collecting Scheme for the Slot-Based Wireless Mesh Network
Junghoon Lee
,
Gyung-Leen Park
.
sersc-isa 2010
:
534-543
[doi]
A Roadside Unit Placement Scheme for Vehicular Telematics Networks
Junghoon Lee
,
Cheolmin Kim
.
sersc-isa 2010
:
196-202
[doi]
Analysis on the Improved SVD-Based Watermarking Scheme
Huo-Chong Ling
,
Raphael C.-W. Phan
,
Swee-Huay Heng
.
sersc-isa 2010
:
143-149
[doi]
An Integrated Approach to Detect Fault-Prone Modules Using Complexity and Text Feature Metrics
Osamu Mizuno
,
Hideaki Hata
.
sersc-isa 2010
:
457-468
[doi]
Dual-Byte-Marker Algorithm for Detecting JFIF Header
Kamaruddin Malik Mohamad
,
Tutut Herawan
,
Mustafa Mat Deris
.
sersc-isa 2010
:
17-26
[doi]
Hiding Data in JPEG Using in-DQT Technique
Kamaruddin Malik Mohamad
,
Tutut Herawan
,
Mustafa Mat Deris
.
sersc-isa 2010
:
27-36
[doi]
Fault Attacks against the Miller's Algorithm in Edwards Coordinates
Nadia El Mrabet
.
sersc-isa 2010
:
72-85
[doi]
Energy Efficiency of Collaborative Communication with Imperfect Frequency Synchronization in Wireless Sensor Networks
Husnain Naqvi
,
Stevan M. Berber
,
Zoran A. Salcic
.
sersc-isa 2010
:
214-227
[doi]
TOKEN: Trustable Keystroke-Based Authentication for Web-Based Applications on Smartphones
Mohammad Nauman
,
Tamleek Ali
.
sersc-isa 2010
:
286-297
[doi]
Grammar Encoding in DNA-Like Secret Sharing Infrastructure
Marek R. Ogiela
,
Urszula Ogiela
.
sersc-isa 2010
:
175-182
[doi]
Design and Implementation of Binary Tree Based Proactive Routing Protocols for Large MANETS
Pavan Kumar Pandey
,
G. P. Biswas
.
sersc-isa 2010
:
397-408
[doi]
High Performance MAC Architecture for 3GPP Modem
Sejin Park
,
Yong Kim
,
Inchul Song
,
Kichul Han
,
Jookwang Kim
,
KyungHo Kim
.
sersc-isa 2010
:
228-238
[doi]
Performance Evaluation of Video Streaming in Vehicular Adhoc Network
Aneel Rahim
,
Zeeshan Shafi Khan
,
Fahad Bin Muhaya
.
sersc-isa 2010
:
220-224
[doi]
Secure Mechanism for Handling Targeted Attacks in Infrastructure Based Wireless Mesh Networks
Rehan Shafi
,
Aneel Rahim
,
Fahad Bin Muhaya
,
Shehzad Ashraf
,
Muhammad Sher
.
sersc-isa 2010
:
233-240
[doi]
A New Cross-Layer Unstructured P2P File Sharing Protocol over Mobile Ad Hoc Network
Nadir Shah
,
Depei Qian
.
sersc-isa 2010
:
250-263
[doi]
MPLS Unleashed: Remedy Using IPSEC over MPLS VPN
Syed Noor-ul-Hassan Shirazi
,
Muhammad Asim
,
Muhammad Irfan
,
Nassar Ikram
.
sersc-isa 2010
:
241-248
[doi]
Agent Based Approach to Regression Testing
Praveen Ranjan Srivastava
,
Tai-Hoon Kim
.
sersc-isa 2010
:
345-355
[doi]
Tracing Potential School Shooters in the Digital Sphere
Jari Veijalainen
,
Alexander Semenov
,
Jorma Kyppö
.
sersc-isa 2010
:
163-178
[doi]
Knowledge-Base Semantic Gap Analysis for the Vulnerability Detection
Raymond Wu
,
Keisuke Seki
,
Ryusuke Sakamoto
,
Masayuki Hisada
.
sersc-isa 2010
:
278-285
[doi]
Multi-agent Reinforcement Learning Model for Effective Action Selection
Sang-Jo Youk
,
Bong-Keun Lee
.
sersc-isa 2010
:
309-317
[doi]
Modified Structures of Viterbi Alogrithm for Forced-State Method in Concatenated Coding System of ISDB-T
Zhian Zheng
,
Yoshitomo Kaneda
,
Dang Hai Pham
,
Tomohisa Wada
.
sersc-isa 2010
:
239-249
[doi]
Applications of Adaptive Belief Propagation Decoding for Long Reed-Solomon Codes
Zhian Zheng
,
Dang Hai Pham
,
Tomohisa Wada
.
sersc-isa 2010
:
150-158
[doi]
Sign in
or
sign up
to see more results.