Abstract is missing.
- Assessing the security of subsampling process using modified EKF and nonlinear least squares methodsLea D. Cot, René Lozi. 27-31 [doi]
- Dynamic routing in covert channel overlays based on control protocolsPeter Backs, Steffen Wendzel, Jörg Keller. 32-39 [doi]
- How to guarantee secured transactions with QoS and real-time constraintsMaryline Chetto, Hassan Noura, Safwan El Assad, Mousa Farajallah. 40-44 [doi]
- Improved blind DCT watermarking by using chaotic sequencesRelu Laurentiu Tataru, Safwan El Assad, Olivier Déforges. 46-50 [doi]
- Validating the existence of watermarks on digital images using a mobile phoneLorenzo Antonio Delgado-Guillen, Jose Juan Garcia Hernandez, Cesar Torres-Huitzil. 51-55 [doi]
- Chaotic generator synthesis: Dynamical and statistical analysisIna Taralova, René Lozi, Safwan El Assad. 56-59 [doi]
- A new method to improve cryptographic properties of chaotic discrete dynamical systemsDascalescu Ana Cristina, Boriga Radu Eugen. 60-65 [doi]
- Chaos Based Information Hiding and SecuritySafwan El Assad. 67-72 [doi]
- Detecting counterfeit-money using RFID-enabled mobile devicesMohamed Hamdy Eldefrawy, Muhammad Khurram Khan. 74-79 [doi]
- Vulnerability analysis of two ultra-lightweight RFID authentication protocols: RAPP and gossamerEyad Taqieddin, Jagannathan Sarangapani. 80-86 [doi]
- A new lightweight hybrid cryptographic algorithm for the internet of thingsMouza Ahmad Bani Shemaili, Chan Yeob Yeun, Khalid Mubarak, Mohamed Jamal Zemerly. 87-92 [doi]
- Deploying Computer-Based Learning under suboptimal conditionsLeonard James Mselle, Tabu S. Kondo. 94-98 [doi]
- Examining ubiquitous security-capital issues in implementing a Campus-System-as-a-Service(CSaaS) model in the cloud computing age: Case study sub-Saharan regionJameson Mbale, Kauna Mufeti, Victor Hamutenya. 99-104 [doi]
- Investigation of cultural aspects within information systems security researchLena Connolly, Michael Lang. 105-111 [doi]
- Enhancing privacy in social applications with the notion of group contextElke Franz, Thomas Springer, Norbert Harder. 112-118 [doi]
- User-intent custom adaptive search service based on ontology and similar-word retrieval algorithm compositionSukyoung Kim, Kihong Ahn. 121-126 [doi]
- A web tool for monitoring HTTP asynchronous method invocationsCarlos R. Jaimez González, Wulfrano A. Luna-Ramirez, Simon M. Lucas. 127-132 [doi]
- A shared secret security broker implementation in a commercial contextTom Yuan Gao, David Kearney. 133-138 [doi]
- The survey of cache management in the shared storage environmentJunfeng Xu, Bo Sun, Chengxiang Si. 139-142 [doi]
- Evaluation and brokering of service level agreements for negotiation of cloud infrastructuresAlba Amato, Beniamino Di Martino, Salvatore Venticinque. 144-149 [doi]
- Secure cross-cloud single sign-on (SSO) using eIDsBernd Zwattendorfer, Arne Tauber. 150-155 [doi]
- Risk based SLA management in clouds: A legal perspectiveTom Kirkham, Karim Djemame, Mariam Kiran, Ming Jiang, Django Armstrong, George Kousiouris, George Vafiadis, Athanasia Evangelinou. 156-160 [doi]
- MedCloud: Healthcare cloud computing systemDalia Sobhy, Yasser El-Sonbaty, Mohamad Abou Elnasr. 161-166 [doi]
- A scheme for the generation of strong cryptographic key pairs based on ICMetricsRuhma Tahir, Huosheng Hu, Dongbing Gu, Klaus D. McDonald-Maier, Gareth Howells. 168-174 [doi]
- Implementation of Convolutional codes on FPGASajjad Ahmed Ghauri, Hasan Humayun, Muhammad Ehsan ul Haq, Farhan Sohail. 175-178 [doi]
- QR decomposition-based cryptography: Via image generation (QR-CRYPT)Abdul Qayum, Prakash Kumar. 179-184 [doi]
- Trusted Location Based ServicesPeter Teufl, Thomas Zefferer, Sandra Kreuzhuber, Christian M. Lesjak. 185-192 [doi]
- Reliability aware scheduling in cloud computingSheheryar Malik, Fabrice Huet, Denis Caromel. 194-200 [doi]
- Usage control in cloud systemsAliaksandr Lazouski, Gaetano Mancini, Fabio Martinelli, Paolo Mori. 202-207 [doi]
- Cloud security: Can the cloud be secured?Kiran Karnad, Saravanan Nagenthram. 208-210 [doi]
- Detecting anomalies in IaaS environments through virtual machine host system call analysisSuaad S. Alarifi, Stephen D. Wolthusen. 211-218 [doi]
- Usability of profile based student authentication and traffic light system in online examinationsAbrar Ullah, Hannan Xiao, Mariana Lilley, Trevor Barker. 220-225 [doi]
- How effective is social media advertising? A study of Facebook Social AdvertisementsDawn Carmichael, David Cleave. 226-229 [doi]
- Application of semantic search in Idea Management SystemsGeovanny Poveda, Adam Westerski, Carlos Angel Iglesias. 230-236 [doi]
- Emergency care in situations of natural disaster: A Multi-Agent approachAline Izida, Thiago da Rocha Tedrus, Maria das Graças Bruno Marietto, Margarethe Steinberger-Elias, Wagner Tanaka Botelho, Robson dos Santos França. 237-242 [doi]
- Modelsim simulation for real-time stereo matching using DP algorithmJeongMok Ha, Hong Jeong. 244-248 [doi]
- MANET secure key exchange using spraying diffie-hellman algorithmAriel Stulman, Jonathan Lahav, Avraham Shmueli. 249-252 [doi]
- Smart authentication for real-time business process monitoringAbdelrahman AlMahmoud, Maurizio Colombo, Chan Yeob Yeun, Hassan Al-Muhairi. 253-258 [doi]
- On the security and usability of dual credential authentication in UK online bankingMike Just, David Aspinall. 259-264 [doi]
- Forensics data acquisition methods for mobile phonesKhawla Abdulla Alghafli, Andrew Jones, Thomas Anthony Martin. 265-269 [doi]
- Traditional musical Virtual Reality on M-learningSettachai Chaisanit, Napatwadee Sangboonnum Hongthong, Surachai Suksakulchai, Chuchart Pinpat. 271-274 [doi]
- High volume web service resource consumptionAspen Olmsted, Csilla Farkas. 275-280 [doi]
- Access control for a Smart Grid SOAMarkus Jung, Thomas Hofer, Susen Dobelt, Georg Kienesberger, Florian Judex, Wolfgang Kastner. 281-287 [doi]
- Ontology based image retrievalUmar Manzoor, Naveed Ejaz, Nadeem Akhtar, Muhammad Umar, M. Shoaib Khan, Hafsa Umar. 288-293 [doi]
- Security of audio secret sharing scheme encrypting audio secretsKotaro Yoshida, Yodai Watanabe. 294-295 [doi]
- The mobileak project: Forensics methodology for mobile application privacy assessmentPasquale Stirparo, Ioannis Kounelis. 297-303 [doi]
- Determinants of student performance in advanced programming courseY. Y. Chen, Shakirah Mohd Taib, Che Sarah Che Nordin. 304-307 [doi]
- Ensuring software safety in safety critical domainsGhada Moussa Bahig, Amr El-Kadi. 308-312 [doi]
- Data integration of electronic health records using artificial neural networksOmniyah Gul, Mahmoud Al-Qutayri, Quang Hieu Vu, Chan Yeob Yeun. 313-317 [doi]
- Two novel server-side attacks against log file in Shared Web Hosting serversSeyed Ali Mirheidari, Sajjad Arshad, Saeidreza Khoshkdahan, Rasool Jalili. 318-323 [doi]
- Re-engineering of web reverse proxy with shibboleth authenticationGaloh Rashidah Haron, Dharmadharshni Maniam, Vijayakumari Sadasivam, Wong Hon Loon. 325-330 [doi]
- Proposal of a cryptography method using gray scale digital imagesM. Y. R. Gadelha, Cicero Ferreira Fernandes Costa Filho, Marly Guimarães Fernandes Costa. 331-335 [doi]
- Evaluation of practical trust based access control for XML databasesNorah Farooqi, Siobhán North. 336-340 [doi]
- Issues in inter-organisational encryption systems: The problem with FedLinkGreg Miiller. 341-346 [doi]
- Assessing the security of Node.js platformAndres Ojamaa, Karl Düüna. 348-355 [doi]
- Quantifying the impact on distrust of e-commerce trust factors: A non-parametric studyAna A. Andrade, Vitor V. Lopes, Augusto Q. Novais. 356-361 [doi]
- Uncertainty with STOS: Intelligent solution for uncertain navigation problemsHatem Fawzi Halaoui. 362-367 [doi]
- Learning from oversight by telecommunications regulatory agenciesDaphne Rixon, Mary Furey. 368-374 [doi]
- A trust based model for federated identity architecture to mitigate identity theftEghbal Ghazizadeh, Mazdak Zamani, Jamalul-lail Ab Manan, Reza Khaleghparast, Ali Taherian. 376-381 [doi]
- A light weight centralized file monitoring approach for securing files in Cloud environmentSanchika Gupta, Anjali Sardana, Padam Kumar. 382-387 [doi]
- Evaluating security and privacy in cloud computing services: A Stakeholder's perspectiveAbdullah Abuhussein, Harkeerat Singh Bedi, Sajjan Shiva. 388-395 [doi]
- Improvement of multi-user searchable encrypted data schemeTran Thao Phuong, Kazumasa Omote, Nguyen Gia Luyen, Nguyen Dinh Thuc. 396-401 [doi]
- Correlated node behavior in wireless ad hoc networks: An epidemic modelA. H. Azni, Rabiah Ahmad, Zul Azri Muhamad Noh. 403-410 [doi]
- Forensics filesystem with cluster-level identifiers for efficient data recoveryMohammed Alhussein, Avinash Srinivasan, Duminda Wijesekera. 411-415 [doi]
- A round level approach to fault detection in PP-2 symmetric block cipherEwa Idzikowska. 416-419 [doi]
- Feedback manipulation flooding attack: Feasibility evaluation and impact quantification on Stream Control Transmission ProtocolV. Anil Kumar, Debabrata Das. 420-425 [doi]
- ERASE- entropy-based sanitization of sensitive data for privacy preservationJeffrey Medsger, Avinash Srinivasan. 427-432 [doi]
- Bootstrapping body sensor networks using human controlled LED-camera channelsXin Huang, Shangyuan Guo, Bangdao Chen, A. W. Roscoe. 433-438 [doi]
- Secure mobile social networks using USIM in a closed environmentOmer Nawaz, Christian Gehrmann, Markus Fiedler. 439-446 [doi]
- Content Extraction Signatures RevisitedHsi-Chung Lin. 447-451 [doi]
- Towards a UTAUT-based model for studying the integrating physical and virtual Identity Access Management Systems in e-government domainSara Jeza Alotaibi, Mike Wald. 453-458 [doi]
- NitroScript: A PHP template engine for customizing of e-commerce applicationsJerry Walsh, Donogh Roche, Franclin S. Foping. 459-464 [doi]
- A cloud computing solution for sharing healthcare informationYan Hu, Fangjie Lu, Israr Khan, Guohua Bai. 465-470 [doi]
- Using Bayes Network for Prediction of Type-2 diabetesYang Guo, Guohua Bai, Yan Hu. 471-472 [doi]
- A survey of threats and security measures for data transmission over GSM/UMTS networksDaniel Fischer, Bernd Markscheffel, Sebastian Frosch, Daniela Büttner. 477-482 [doi]
- Vulnerability elimination by force of new mobile OS Comparative research of security techniques on BlackBerry OS (incl. PlayBook)Yury Chemerkin. 483-487 [doi]
- Black hat training of white hat resources: The future of security is gamingJason Flood, Mark Denihan, Anthony Keane, Fredrick Mtenzi. 488-491 [doi]
- An assessment of features related to phishing websites using an automated techniqueRami M. Mohammad, Fadi A. Thabtah, Lee McCluskey. 492-497 [doi]
- A Multi-Agent System for information management and augmented reality in asymmetric warsSidney de Castro, Maria das Graças Bruno Marietto, Robson dos Santos França, Wagner Tanaka Botelho. 499-504 [doi]
- Securing Elliptic Curve based El-Gamal against Pollard Rho attack using Elliptic Curve based Diffie-Hellman Key ExchangeTafta Zani, Ari Moesriami Barmawi, Maman Abdurohman. 505-512 [doi]
- Community OTOP Web Portal for Eastern Region of ThailandUthairatt Phangphol, Settachai Chaisanit, Tau-tong Puangsuwan, Veena Khongpit, Parichat Kunpluem. 513-514 [doi]
- Multi function control system using GSM modem based SM5100B ModuleAfif Mghawish, Akram A. AbdelQader, Mahmoud A. Al-Jezawi, Mohammad AbuMahfouz. 515-518 [doi]
- 2D Gun's type classification using edge detection algorithm and SUSAN low level image processingVeena Khongpit, Uthairatt Phangphol, M. L. Kulthon Kasemsan, Chonawat Srisa-an. 521-523 [doi]
- Hackers and Hollywood 2: Considering televisual Cyberthreats in Security Risk AnalysisDamian Gordon. 524-527 [doi]
- Hidden Markov Model based anomaly intrusion detectionRuchi Jain, Nasser S. Abouzakhar. 528-533 [doi]
- Systematic analysis and evaluation of web privacy policies and implementationsBrad Miller, Kaitlyn Buck, J. D. Tygar. 534-540 [doi]
- Error correction and detection system based on Hopfield networksLaurentiu Ionescu, Constantin Anton, Ion Tutanescu, Alin Mazare, Gheorghe Serban. 541-544 [doi]
- The edutainment of virtual music instrument for Thai xylophone (Ranad-ek)Laddawan Meeanan, Apichai Trangansri, Pornpipat Hongthai, Settachai Chaisanit, Ratchadawan Nimnual. 546-547 [doi]
- Fault-tolerant middleware based on multistream pipeline for private storage servicesJ. L. Gonzalez, Victor Sosa-Sosa, Borja Bergua, Luis Miguel Sánchez, Jesús Carretero. 548-555 [doi]
- e-Ticketing system for football events in MalaysiaN. Abdul Hamid, M. F. Al A'zhim, M. L. Yap. 556-561 [doi]
- Towards benchmarking intrusion detection systems for virtualized cloud environmentsAleksandar Milenkoski, Samuel Kounev. 562-563 [doi]
- Multi-probes fusion framework for matching simultaneous latent impressionsRozita Mohd Yusof, Norrozila Sulaiman. 564-567 [doi]
- Are contemporary trade unions utilizing the opportunities for revival presented by internet technology? A comparison of Croatian, UK and USA practiceMaja Vidovic, Josip Kolic. 569-574 [doi]
- Security management mechanism for composite applications based on hash chainsLimin Fan. 575-577 [doi]
- E-Government in developing countries: Framework of challenges and opportunitiesAhmad Mousa Odat. 578-582 [doi]
- Investigation of factors affecting growth of e-banking services in Saudi ArabiaZawlikhah Al Somali, Gheorghita Ghinea. 583-588 [doi]
- SecGOD Google Docs: Now i feel safer!Antonis Michalas, Menelaos Bakopoulos. 589-595 [doi]
- User interactive Internet of things privacy preserved access controlXin Huang, Rong Fu, Bangdao Chen, Tingting Zhang, A. W. Roscoe. 597-602 [doi]
- Text fingerprint key generationMohamed Sameh Hassanein, Gheorghita Ghinea. 603-609 [doi]
- Analysis of access control protocols using labelled tableauxJi Ma. 610-615 [doi]
- A dynamic fuzzy commitment scheme using ARRSES forecastingSomsak Choto, Nol Premasathian. 616-619 [doi]
- A Bayesian Belief Network analysis of the Internet governance conflictMartin A. Negron. 621-627 [doi]
- Comparing distinct approaches for panic behavior computer simulations: A theoretical analysisMaria das Graças Bruno Marietto, Robson dos Santos França, Margarethe Steinberger-Elias, Wagner Tanaka Botelho, Emerson Aguiar Noronha, Vera Lúcia da Silva. 628-633 [doi]
- Analysis & modeling multi-breeded Mean-Minded ant colony optimization of agent based Road Vehicle Routing ManagementChiranjib Sur, Sanjeev Sharma, Anupam Shukla. 634-641 [doi]
- The process of building knowledge and communication of social systems emulated by multiagent systems capable of cause and emerging learningMaria Das Gracas Bruno Marietto, Margarethe Born Steinberger-Elias, Marllon Felipe Muniz De Farias Alves, Rita Vucinic Teles. 642-647 [doi]
- On cloud storage and the cloud of clouds approachDaniel Slamanig, Christian Hanser. 649-655 [doi]
- Autonomous agent-based inspection for inter-VM traffic in a Cloud environmentKarim Benzidane, Saad Khoudali, Abderrahim Sekkaki. 656-661 [doi]
- The design of adaptive intrusion tolerant system(ITS) based on historical dataYongki Kim, Jungmin Lim, Seokjoo Doo, Hyunsoo Yoon. 662-667 [doi]
- Smart-frame: A flexible, scalable, and secure information management framework for smart gridsJoonsang Baek, Quang Hieu Vu, Andrew Jones, Sameera Al-Mulla, Chan Yeob Yeun. 668-673 [doi]
- Economic efficiency control on data centre resources in heterogeneous cost scenariosBenjamin Heckmann, Marcus Zinn, Ronald C. Moore, Christoph Wentzel, Andrew D. Phippen. 675-679 [doi]
- RACS: A framework for Resource Aware Cloud computingSheheryar Malik, Fabrice Huet, Denis Caromel. 680-687 [doi]
- Decision points for adoption cloud computing in small, medium enterprises (SMEs)Ashwini Rath, Sanjay Kumar, Sanjay Mohapatra, Rahul Thakurta. 688-691 [doi]
- Context-aware Personal Learning EnvironmentMafawez T. Alharbi, Amelia Platt, Ali H. Al-Bayatti. 692-697 [doi]
- Query paraphrasing using genetic approach for intelligent information retrievalMourad Ykhlef, Abeer AlDayel. 699-703 [doi]
- Evolution pattern for Service Evolution in CloudsZhe Wang, Xiaodong Liu, Kevin Chalmers, Guojian Cheng. 704-709 [doi]
- Implementation methodology of Rely/Guarantee plug-in for ProtégéSaid Rabah Azzam, Shikun Zhou. 710-714 [doi]
- Forensic memory evidence of windows applicationFunminiyi Olajide, Nick Savage, Galyna A. Akmayeva, Richard Trafford. 715-718 [doi]
- Challenges of managing secure elements within the NFC ecosystemPardis Pourghomi, Gheorghita Ghinea. 720-725 [doi]
- Securing Internet Information Services (IIS) configuration filesSaneeha Khalid, Haider Abbas, Maruf Pasha, Asad Raza. 726-729 [doi]
- Off-line NFC Tag AuthenticationMuhammad Qasim Saeed, Colin D. Walter. 730-735 [doi]
- Towards coupling user and device locations using biometrical authentication on smartphonesMatthias Trojahn, Philipp Marcus. 736-741 [doi]
- Honeydoop - a system for on-demand virtual high interaction honeypotsSaurabh Kulkarni, Madhumitra Mutalik, Prathamesh Kulkarni, Tarun Gupta. 743-747 [doi]
- Semantic hedgehog for log analysisJeffrey J. Wiley, Frank P. Coyle. 748-752 [doi]
- Exploiting UML and acceleo for developing Semantic Web ServicesJabu Mtsweni. 753-758 [doi]
- Assessment of ontology alignment methodologySaid Rabah Azzam, Shikun Zhou. 759-764 [doi]
- Mobile banking contexts and prospects in Egypt: A frameworkRehaballah Elbadrawy, Rasha Abdel Aziz. 766-771 [doi]
- Managing NFC payment applications through cloud computingPardis Pourghomi, Gheorghita Ghinea. 772-777 [doi]
- Innovative solution for a telemedicine applicationS. N. Arun, W. C. Lam, K. K. Tan. 778-783 [doi]
- Authorization model of SSO for a distributed environment based on the attributesGaozheng Zhang, Mengdong Chen, Mou Shen. 784-789 [doi]
- Making of DAISY Talking book on mobile phone: A concept and architectureSurachai Suksakulchai, Wacheerapan Kaewprapan, Settachai Chaisanit. 791-792 [doi]
- M-learning for Eco-Packaging using KMRatchadawan Nimnual, Settachai Chaisanit. 793-794 [doi]
- An experimental study of three different rule ranking formulas in associative classificationNeda Abdelhamid, Aladdin Ayesh, Fadi A. Thabtah. 795-800 [doi]
- A novel architecture for secure communications in mobile systemsAlok Upadhyay, Jajati Keshari Sahoo, Vibhor Bajpai. 801-805 [doi]
- Implementation of tools for brute forcing touch inputted passwordsBruno Alves Pereira Botelho, Emilio Tissato Nakamura, Nelson Uto. 807-808 [doi]
- Perturbation for privacy-preserving participatory sensing on mobileShunsuke Aoki, Masayuki Iwai, Kaoru Sezaki. 809 [doi]
- Innovative extracting and integrating the potential and subjectively formed context-informationHiroki Nakayama, Hiroaki Kaminaga, Youzou Miyadera, Shoichi Nakamura. 810-811 [doi]
- Visual support system for semi-automatic generation of spadework of academic paper from presentation slidesYusuke Morita, Hiroyuki Anzai, Hiroaki Kaminaga, Youzou Miyadera, Shoichi Nakamura. 812-813 [doi]
- Visualization of Web exploration streams and user's genuine intentionsTakuya Matsumoto, Tatuya Yamazaki, Hiroaki Kaminaga, Youzou Miyadera, Shoichi Nakamura. 814-815 [doi]
- A system for management of research resources focusing on grasping the polish processesHiroyuki Anzai, Hiroaki Kaminaga, Yasuhiko Morimoto, Setsuo Yokoyama, Youzou Miyadera, Shoichi Nakamura. 816-817 [doi]