Abstract is missing.
- Hardware implementations of Elliptic Curve Cryptography in Wireless Sensor NetworksHilal Houssain, Mohamad Badra, Turki F. Al-Somani. 1-6 [doi]
- m) Elliptic Curve cryptoprocessor on a Nano FPGATurki F. Al-Somani, Hilal Houssain. 7-12 [doi]
- A unified countermeasure against side channel attacks on cryptographic RFIDH. Marzouqi, Khaled Salah, Mahmoud A. Al-Qutayri, M. C. Y. Yeun. 13-18 [doi]
- Forensics and war-driving on unsecured wireless networkHuwida Said, Mario A. M. Guimaraes, Noora Al Mutawa, Ibtesam Al Awadhi. 19-24 [doi]
- FPGA implementation of high speed XTS-AES for data storage devicesMohamed Elmoghany, Mohamed Diab, Moustafa Kassem, Mustafa Khairallah, Omar El Shahat, Wael Sharkasy. 25-28 [doi]
- The use of Boolean functions in stream ciphersMuna Abdulla Al Shehhi, Joonsang Baek, Chan Yeob Yeun. 29-33 [doi]
- On the security of inclusion or omission of MixColumns in AES cipherKhalfan AlMarashda, Yousuf AlSalami, Khaled Salah, Thomas Martin. 34-39 [doi]
- Study on Secret Sharing Schemes (SSS) and their applicationsNoura Al Ebri, Joonsang Baek, Chan Yeob Yeun. 40-45 [doi]
- Survey on computationally hard problems and their applications to cryptographyAmeera Salem Abdouli, Joonsang Baek, Chan Yeob Yeun. 46-52 [doi]
- Survey on certificateless public key cryptographyHajer Al Housani, Joonsang Baek, Chan Yeob Yeun. 53-58 [doi]
- Anonymous electronic voting protocol with traceabilityLezhen Ling, Junguo Liao. 59-66 [doi]
- Understanding the security challenges of virtualized environmentsFatma Ahmad Bazargan, Chan Yeob Yeun, Mohamed Jamal Zemerly. 67-72 [doi]
- Synchronization recovery of chaotic signal through imperfect channel using optimization approachAmr Sayed Abdel Fattah, Salwa H. Elramly, Magdy M. Ibrahim, Ahmed Abdel-Hafez. 73-78 [doi]
- Denoising algorithm for noisy chaotic signal by using wavelet transform: Comprehensive studyAmr Sayed Abdel Fattah, Salwa H. Elramly, Magdy M. Ibrahim, Ahmed Abdel-Hafez. 79-85 [doi]
- Chaos generation from 1D or 2D circuits including switchesDaniele Fournier-Prunaret, Pascal Chargé, Laura Gardini. 86-90 [doi]
- Noise-resisting ciphering based on a chaotic multi-stream pseudo-random number generatorRené Lozi, Estelle Cherrier. 91-96 [doi]
- Multicast security protocol over satellite DVB based on chaotic sequencesKassem Ahmad, Bassem Bakhache, Safwan El Assad, Daniel Caragata, Maryline Chetto. 97-102 [doi]
- A secure public cloud storage systemSeongHan Shin, Kazukuni Kobara, Hideki Imai. 103-109 [doi]
- Dynamics of trust in Clouds - Challenges and research agendaImad M. Abbadi, Cornelius Namiluko. 110-115 [doi]
- Secured Virtual Diffused File System for the cloudKheng Kok Mar. 116-121 [doi]
- A parameterized RBAC access control model for WS-BPEL orchestrated composite web servicesNezar Nassr, Eric Steegmans. 122-127 [doi]
- Research, design and development review of the Cloud Computing Management System (CCMS)G. Hughes, Dhiya Al-Jumeily, Abir Jaafar Hussain. 128-131 [doi]
- Security concerns for cloud computing in aircraft data networksNitha Rachel Suresh, Suresh V. Mathew. 132-136 [doi]
- A novel key establishment scheme for wireless sensor networks based on complex network synchronizationBo Mi, Jianqiu Cao. 137-141 [doi]
- Two algorithms for Network Security Gradient markingXin Hu, Yonglin Sun, Yongjun Wang, Zhanrui Ren, Jie Liu. 142-147 [doi]
- A decentralized access control mechanism using authorization certificate for distributed file systemsJumpei Arakawa, Koichi Sasada. 148-153 [doi]
- A survey on space-time & high-rate redundantM. Bavafa, Zahra Taheri Hanjani, N. Navidi. 154-158 [doi]
- A new perspective of network vulnerability analysis using Network Security GradientYonglin Sun, Yongjun Wang, Xin Hu, Zhanrui Ren, Jie Liu. 159-163 [doi]
- Automated trust negotiation in identity federations using OWL-based abduction of missing credentialsMartin Kuba. 164-169 [doi]
- An automated system for fingerprint classification using singular points for biometric securityAnam Tariq, Muhammad Usman Akram, Shoab Ahmad Khan. 170-175 [doi]
- Handwriting dynamics as a means of authenticationPavel Lozhnikov, Oksana Chernikova. 176-179 [doi]
- Retinal recognition: Personal identification using blood vesselsMuhammad Usman Akram, Anam Tariq, Shoab Ahmad Khan. 180-184 [doi]
- Fingerprint templates with high recognition accuracy and high security generated by discrete fractional sine transformHiroyuki Yoshimura. 185-190 [doi]
- Dorsal hand vein biometric using Independent Component Analysis (ICA)Naushad Mamode Khan, N. M. Khan. 191-195 [doi]
- Multiple SEIMCHA: Multiple semantic image CAPTCHAMaryam Mehrnejad, Abbas Ghaemi Bafghi, Ahad Harati, Ehsan Toreini. 196-201 [doi]
- Study of the robustness of an enhanced CSK system by using the Extended Kalman FilterLéa D. Cot, Christian Bès. 202-207 [doi]
- FPGA implementation of cellular automata based encryption algorithm for internet communicationsPetre Anghelescu, Silviu Ionita, Vasile-Gabriel Iana. 208-213 [doi]
- Security threats in cloud computingFarhan Bashir Shaikh, Sajjad Haider. 214-219 [doi]
- Low complexity high security image encryption based on Nested PWLCM Chaotic MapHadi H. Abdlrudha, Qassim Nasir. 220-225 [doi]
- An efficient and secure SPN cryptosystem based on chaotic control parametersHassan Noura, Safwan El Assad, Calin Vladeanu, Daniel Caragata. 226-231 [doi]
- An EAP ID-based authentication method for wireless networksAymen Boudguiga, Maryline Laurent. 232-239 [doi]
- Hop count variabilityAyman Mukaddam, Imad H. Elhajj. 240-244 [doi]
- Mailbook: A social network against spammingDimitris Zisiadis, Spyros Kopsidas, Argyris Varalis, Leandros Tassiulas. 245-249 [doi]
- Designing a hierarchical DHCP server's model to automatically provide dedicated IP address anywhere in the world with mobilityAsjad Amin, Haseeb Ahmed, Abubakar Rafique, Muhammad Junaid Nawaz, Muhammad Salahudin, Zulfiqar Ahmed. 250-253 [doi]
- Toward an abstract language on top of XACML for web services securityAzzam Mourad, Hadi Otrok, Hamdi Yahyaoui, Lama Baajour. 254-259 [doi]
- A thin client application development using OCL and conceptual schemaJane Saetent, Nattawut Vejkanchana, Suphamit Chittayasothorn. 260-265 [doi]
- Dynamically complex system using adaptive simulation for interconnected nodesRamez Shamseldin. 266-273 [doi]
- Reed-Muller decoder with associative memoriesLaurentiu Ionescu, Constantin Anton, Ion Tutanescu, Alin Mazare, Gheorghe Serban. 274-277 [doi]
- UMTS security: Enhancement of identification, authentication and key agreement protocolsDaniel Caragata, Safwan El Assad, Charles A. Shoniregun, Galyna A. Akmayeva. 278-282 [doi]
- A Record Composition/Decomposition attack on the NDEF Signature Record Type DefinitionMuhammad Qasim Saeed, Colin D. Walter. 283-287 [doi]
- Texture Analysis-Based Image Spam FilteringBasheer Al-Duwairi, I. Khater, O. Al-Jarrah. 288-293 [doi]
- Critical infrastructure protection through distributed reactive demand-side managementHanno Hildmann, Sebastien Nicolas, Fabrice Saffre. 294-301 [doi]
- Secure delay-tolerant communications in the presence of oppressive governmentsSoulaf Saab, Wassim Itani, Ayman I. Kayssi, Ali Chehab, Cesar Ghali. 302-307 [doi]
- Mobile adhoc networks: A simulation based security evaluation and intrusion preventionMaitha Salem Al Mazrouei, Sundaravalli Narayanaswami. 308-313 [doi]
- Securing information systems in airports: A practical approachArben Asllani, Amjad Ali. 314-318 [doi]
- Synchronization of Sigma Delta ModulatorsGeorgi T. Tsenov, Valeri M. Mladenov, Ina Taralova. 319-322 [doi]
- Towards an automatic exploit pipelineJared D. DeMott, Richard J. Enbody, William F. Punch III. 323-329 [doi]
- Immunizing the SAODV protocol against routing information disclosureAyman A. Hanafy, Sherif Hazem Noureldin, Marianne A. Azer. 330-334 [doi]
- A novel method in fuzzy data clustering based on chaotic PSOEhsan Toreini, Maryam Mehrnejad. 335-340 [doi]
- Proximity aware overlays in peer-to-peer networksTina Francis. 341-344 [doi]
- Performance evaluation of popular Cloud IaaS providersKhaled Salah, M. Al-Saba, M. Akhdhor, O. Shaaban, M. I. Buhari. 345-349 [doi]
- Insiders analysis in Cloud computing focusing on home healthcare systemImad M. Abbadi, Cornelius Namiluko, Andrew Martin. 350-357 [doi]
- Evaluation of popular application sandboxingFaisal Al Ameiri, Khaled Salah. 358-362 [doi]
- Mobile Arabic sign languageFaisal Al Ameiri, Mohamed Jamal Zemerly, Mohamed Al Marzouqi. 363-367 [doi]
- Key complication procedure in data driven ciphers based on controlled substitution-permutation networksGeorge S. Oreku. 368-372 [doi]
- Using Keystroke-Level Model to analyze IOS optimization techniquesUmm-e Laila, Syed Zain Ali Shah, Nadia Ishaque. 373-377 [doi]
- The challenges of Arabic language use on the InternetNoora Albalooshi, Nader Mohamed, Jameela Al-Jaroodi. 378-382 [doi]
- Design and implementation of the Geo-Context Engine for semantic social media serviceJong-Hoon Hoon Lee, Jung-Tae Tae Kim, Heekyung Lee, Eui-Hyun H. Paik. 383-387 [doi]
- The process of summarization in the pre-processing stage in order to improve measurement of texts when clusteringMarcus Vinicius C. Guelpeli, Ana Cristina Bicharra Garcia, António Horta Branco. 388-395 [doi]
- Real-time scheduling for energy harvesting sensorsMaryline Chetto, Hussein El Ghor, Rafic Hage Chehade. 396-402 [doi]
- A process framework for securing an e-Learning ecosystemP. R. Lakshmi Eswari. 403-407 [doi]
- A distributed virtual laboratory architecture for cybersecurity trainingChristian Willems, Thomas Klingbeil, Lukas Radvilavicius, Antanas Cenys, Christoph Meinel. 408-415 [doi]
- Mitigation of spear phishing attacks: A Content-based Authorship Identification frameworkMahmoud Khonji, Youssef Iraqi, Andrew Jones. 416-421 [doi]
- Lexical URL analysis for discriminating phishing and legitimate e-mail messagesMahmoud Khonji, Youssef Iraqi, Andrew Jones. 422-427 [doi]
- Users' perceptions on mobile devices security awareness in MalaysiaAhmed A. Sabeeh, Arash Habibi Lashkari. 428-435 [doi]
- Propagation of trust and confidence using intervalsHassan Shakeri, Abbas Ghaemi Bafghi. 436-441 [doi]
- Trapping and analyzing malicious VoIP traffic using a honeynet approachMarkus Gruber, Florian Fankhauser, Stefan Taber, Christian Schanes, Thomas Grechenig. 442-447 [doi]
- Access control and content authentication for hybrid DVB-T2/P2P broadcastingJens Hasselbach, Patrick Aichroth. 448-453 [doi]
- A general attack method for steganography removal using Pseudo-CFA re-interpolationPradhumna Shrestha, Michael Hempel, Tao Ma, Dongming Peng, Hamid Sharif. 454-459 [doi]
- An effective hybrid thresholding technique for degraded documents images binarizationMohamed Zayed, Asma Ouari, Meriem Derraschouk, Youcef Chibani. 460-465 [doi]
- Pro-active multi-agent recommender system for travelersHend Al Tair, Mohamed Jamal Zemerly, Mahmoud Al-Qutayri, Marcello Leida. 466-471 [doi]
- A policy based access control model for web servicesHadiseh Seyyed Alipour, Mehdi Sabbari, Eslam Nazemi. 472-477 [doi]
- A framework of VI-based ranking and recommendation of web servicesGang Wang, Kunming Nie. 478-483 [doi]
- Ownership transfer protocol for RFID objects using lightweight computing operatorsNai-Wei Lo, Shiou-Huei Ruan, Tzong-Chen Wu. 484-489 [doi]
- A study on RFID code structure for traceability system of electric vehicle batteriesWoo Ram Kim, Yoon Seok Chang. 490-494 [doi]
- A PUF-based ultra-lightweight mutual-authentication RFID protocolRamzi Bassil, Wissam El-Beaino, Ayman I. Kayssi, Ali Chehab. 495-499 [doi]
- Vulnerabilities in a new RFID access control protocolMasoumeh Safkhani, Nasour Bagheri, Majid Naderi. 500-503 [doi]
- A decentralized energy-aware key management scheme for Wireless Sensor NetworksSalwa Adriana Saab, Ayman I. Kayssi, Ali Chehab. 504-508 [doi]
- Implementation of a modified lightweight cryptographic TEA algorithm in RFID systemM. B. Abdelhalim, Mohamed El-Mahallawy, M. Ayyad, Adel ElHennawy. 509-513 [doi]
- Encrypted processes for oblivious data retrievalYoussef Gahi, Mouhcine Guennoun, Zouhair Guennoun, Khalil El-Khatib. 514-518 [doi]
- Demand-side management for air conditioningHanno Hildmann, Sebastien Nicolas, Fabrice Saffre. 519-524 [doi]
- 2-phase optimization method for energy aware scheduling of virtual machines in cloud data centersMohammad Moein Taheri, Kamran Zamanifar. 525-530 [doi]
- Context-aware real-time framework for local collaborationKris Scott, Rachid Benlamri. 531-535 [doi]
- Virtual Cloud: Rent Out the Rented ResourcesSheheryar Malik, Fabrice Huet. 536-541 [doi]
- Performace evaluation of relative positioning based on low-cost GPS and VANETHun-lung Lim, Tai-Myoung Myoung Chung. 542-543 [doi]
- A MILP based design tool for FTTH access networks with consideration of demand growthKin Fai Poon, Anis Ouali. 544-549 [doi]
- Behavioural game AI - A theoretical approachHanno Hildmann. 550-555 [doi]
- Evaluating USARSim for use in fire search and rescueAlima AlDahak AlShamsi, M. AlMarzouqi, Lakmal Seneviratne. 556-561 [doi]
- An application of Imperialist Competitive Algorithm to solve the quadratic assignment problemAli Safari Mamaghani, Mohammad Reza Meybodi. 562-565 [doi]
- An economical mechanism for multicasting of content among servers of Hybrid CDN-P2P networksMehran Garmehi, Morteza Analoui. 566-571 [doi]
- Policy rule-sets for policy based systemsAbdur Rahim Choudhary. 572-577 [doi]
- Formal modeling and verification of DLK protocolH. M. N. Al-Hamadi, Chan Yeob Yeun, Mohamed Jamal Zemerly, Mahmoud Al-Qutayri, Amjad Gawanmeh. 578-583 [doi]
- Privacy enabled web service access control using SAML and XACML for home automation gatewaysMarkus Jung, Georg Kienesberger, Wolfgang Granzer, Martin Unger, Wolfgang Kastner. 584-591 [doi]
- Automated healthcare information privacy and security: UAE caseMhamed Zineddine. 592-595 [doi]
- Segmentation based encryption method for medical imagesAhmed B. Mahmood, Robert D. Dony. 596-601 [doi]
- Privacy requirements specification for digital identity management systems implementation: Towards a digital society of privacyGhazi Ben Ayed, Solange Ghernaouti-Helie. 602-607 [doi]
- Encoding default-based SELinux-security policy in Organization-Based Access Control ModelSalem Benferhat, Khalid Bouriche, Mohamed Ouzarf. 608-613 [doi]
- Solutions to security issues with legacy integration of GSM into UMTSEric Southern, Abdelkader H. Ouda, Abdallah Shami. 614-619 [doi]
- A real-time traffic classification approachEduardo Rocha, Paulo Salvador, António M. D. Nogueira. 620-626 [doi]
- Network behaviour anomaly detection using Holt-Winters algorithmJarkko Ekberg, Jorma Ylinen, Pekka Loula. 627-631 [doi]
- Security-functionality tradeoffs in IP transition phaseTomasz Bilski. 632-638 [doi]
- A note on modified SET protocol for mobile paymentDevendra Mani Tripathi. 639-641 [doi]
- Modeling and verification of firewall configurations using domain restriction methodAmjad Gawanmeh, Sofiène Tahar. 642-647 [doi]
- Design and implementation of a web structure mining algorithm using breadth first search strategy for academic search applicationS. Jeyalatha, B. Vijayakumar. 648-654 [doi]
- Location-based personalized social media service for the Smart Phone: Distributed social contents sharingsJung-Tae Tae Kim, Jong-Hoon Hoon Lee, Heekyung Lee, Eui-Hyun H. Paik. 655-659 [doi]
- XSLT transformation generating OWL ontologies automatically based on XML SchemasThomas Bosch, Brigitte Mathiak. 660-667 [doi]
- Modified run length encoding scheme with introduction of bit stuffing for efficient data compressionAsjad Amin, Haseeb Ahmad Qureshi, Muhammad Junaid Nawaz, Muhammad Yasir Habib, Waqas Anjum. 668-672 [doi]
- An Agent-Based Modeling approach for decision-making in Gravity Irrigation SystemsSalwa Belaqziz, Abdelaziz El Fazziki, Mohammed El Adnani, Michel Le Page. 673-680 [doi]
- Identity management architecture for integrated personalized service on TVChigusa Yamamura, Kazuhiro Otsuki, Arisa Fujii, Kiyohiko Ishikawa. 681-682 [doi]
- On the privacy of two tag ownership transfer protocols for RFIDsMohammad Reza Sohizadeh Abyaneh. 683-688 [doi]
- ++, an RFID authentication protocolMasoumeh Safkhani, Nasour Bagheri, Majid Naderi, Somitra Kumar Sanadhya. 689-694 [doi]
- Redundant reader elimination for directional antenna in RFID systemsNazish Irfan, Mustapha C. E. Yagoub, Khelifa Hettak. 695-700 [doi]
- Technologies enabling sustainability in the built environmentMahmoud Alahmad, Muhammad F. Zulfiqar, Hosen Hasna, Timothy Wisnieski, Nasser A. Aljuhaishi, Hamid Sharif. 701-706 [doi]
- Desktop search engines - A state of the art comparisonBernd Markscheffel, Daniela Büttner, Daniel Fischer. 707-712 [doi]
- A-CitizenMobile: A case study for blind usersFlávio Dumortout de Mendonça Júnior, Daniela Gorski Trevisan, Thiago Cortat Tavares, José Luiz Thomaselli Nogueira. 713-717 [doi]
- Education beyond the cloud: Anytime-anywhere learning in a smart campus environmentBenjamin Hirsch, Jason W. P. Ng. 718-723 [doi]
- The use of detection systems to improve the quality of the Italian Public AdministrationArianna Del Soldato, Pasquale Lazzareschi, Maurizio Martinelli, Giuseppe Vasarelli. 724-725 [doi]
- E-Banking in Morocco: Study of some specifying factorsHicham Sadok. 726-731 [doi]
- SeKMAC: A secure model for key management and access control in cryptographic file systemFarshad Rahimiasl, Reza Azmi. 732-737 [doi]
- Systematic literature review of virtual roleSami Noponen, Jarno Salonen, Hanna-Miina Sihvonen, Taina A. Kurki. 738-743 [doi]
- An event pattern language for runtime monitoring based on AOPXian Zhang, Martin Leucker, Wei Dong. 744-751 [doi]
- Extrapolating security requirements to an established software process: Version 1.0Galoh Rashidah Haron, Kang Siong Ng. 752-757 [doi]
- Temporal context in multilevel access control modelBoustia Narhimene, Aïcha Mokhtari. 758-763 [doi]
- Trust-based access control for XML databasesNorah Farooqi, Siobhán North. 764-765 [doi]
- Digital forensics education in UAEHanan Al Obaidli, Asif Iqbal. 766-770 [doi]
- Forensic artifacts of Facebook's instant messaging serviceNoora Al Mutawa, Ibtesam Al Awadhi, Ibrahim M. Baggili, Andrew Marrington. 771-776 [doi]
- Quaternary privacy-levels preservation in computer forensics investigation processWaleed Halboob, Muhammad Abulaish, Khaled Alghathbar. 777-782 [doi]
- A robust watermarking scheme for relational databasesTheodoros Tzouramanis. 783-790 [doi]
- Performance assessment of OLSR protocol under routing attacksMahmood Salehi, Hamed Samavati, Mahdi Dehghan. 791-796 [doi]
- Concurrent realization of the multiply-by-7 Elliptic Curve Scalar Multiplication algorithmMichael Naseimo Daikpor, Oluwole Adegbenro. 797-804 [doi]