Abstract is missing.
- ICITST-2013: Keynote speaker 1: Principles of information security risk managementJeffrey J. Wiley. 13 [doi]
- ICITST-2013: Keynote speaker 2: Security challenge of TOR and the deep webDavid Stupples. 14 [doi]
- ICITST-2013: Keynote speaker 3: Blurred nets: Disruption and the risk to future 'Internet of Things' (IoT) architecturesTyson T. Brooks. 15 [doi]
- ICITST-2013: Keynote speaker 4: Writing a sustainable research paperCharles A. Shoniregun. 16 [doi]
- RISC'13 Workshop: Keynote speaker 5Yoon Seok Chang. 17 [doi]
- Enhancement of two spatial steganography algorithms by using a chaotic system: Comparative analysisDalia Battikh, Safwan El Assad, Bassem Bakhache, Olivier Déforges, M. Khalil. 20-25 [doi]
- Lightweight chaos-based cryptosystem for secure imagesZ. Fawaz, Safwan El Assad, M. Frajallah, A. Khalil, René Lozi, Olivier Déforges. 26-30 [doi]
- Cryptanalysis of a chaos-based encryption algorithm for distributed systemsDaniel Caragata, Karim Tabia, Mauricio Luduena. 31-36 [doi]
- High-speed encryption method based on switched chaotic model with changeable parametersOleg Garasym, Ina Taralova. 37-42 [doi]
- A mutual authentication protocol for low-cost RFID tags formally verified using CasperFDR and AVISPASarah Abughazalah, Konstantinos Markantonakis, Keith Mayes. 44-51 [doi]
- Formally defining NFC M-coupon requirements, with a case studyAbdullah Ali Alshehri, Steve Schneider. 52-58 [doi]
- Feasibility analysis of transportation applications based on APIs of social network servicesYoung-Ji Byon, Young-Seon Jeong, Said M. Easa, Joonsang Baek. 59-64 [doi]
- Securing E-Seal real time tracking system for Internet of ThingsMouza Ahmad Bani Shemaili, Chan Yeob Yeun, Mohamed Jamal Zemerly, Khalid Mubarak, Yoon Seok Chang. 65-69 [doi]
- A reference architecture for big data solutions introducing a model to perform predictive analytics using big data technologyBas Geerdink. 71-76 [doi]
- A comparison of major issues for the development of forensics in cloud computingMustafa Aydin, Jeremy Jacob. 77-82 [doi]
- Multidimensional community detection in TwitterNasser Zalmout, Moustafa Ghanem. 83-88 [doi]
- An analytical study of Arabic sentiments: Maktoob case studyMohammed N. Al-Kabi, Nawaf A. Abdulla, Mahmoud Al-Ayyoub. 89-94 [doi]
- A recommendation scheme utilizing Collaborative FilteringNicholas Dzugan, Lance Fannin, S. Kami Makki. 96-100 [doi]
- Sentiment analysis of arabic social media content: a comparative studyRawan T. Khasawneh, Heider Wahsheh, Mohammed Al-Kabi, Izzat Mahmoud Alsmadi. 101-106 [doi]
- Framework for handling personal data proposed system of the self-control on buying informationYuri Nakagawa, Yuuki Matsuda, Tetsuro Ogi. 107-112 [doi]
- End-to-End cryptographic voting: Potentials and limitationsMohammed Awad, Ernst L. Leiss. 113-118 [doi]
- A system for social network analysisLuciene Cristina Alves Rinaldi, Briseida Dogo de Resende, Rodrigo Bossini Tavares Moreira, Márcio Lobo Netto. 120-125 [doi]
- A privacy-aware query authentication index for encrypted database in cloudMiyoung Jang, Ara Jo, Jae-Woo Chang. 126-131 [doi]
- Mining salient images from a large-scale blogosphereXian Chen, Meilian Chen, Hyoseop Shin, Eun Yi Kim. 132-136 [doi]
- Cloudlet-based for big data collection in body area networksMuhannad Quwaider, Yaser Jararweh. 137-141 [doi]
- A Cloud Enabled Social Media Monitoring Platform for Events Detection and PredictionElhadj Benkhelifa, Thomas Welsh. 142-148 [doi]
- Considering an elastic scaling model for cloud SecurityAine MacDermott, Qi Shi, Madjid Merabti, Kashif Kifayat. 150-155 [doi]
- Security risk analysis as a serviceMohammed A. Alhomidi, Martin J. Reed. 156-161 [doi]
- Evaluating security mechanisms implemented on public Platform-as-a-Service cloud environments case study: Windows AzureA. Akinbi, E. Pereira, C. Beaumont. 162-167 [doi]
- A framework for assuring the conformance of cloud-based emailMelanie Willett, Rossouw von Solms. 168-173 [doi]
- Characteristics analysis for the cyberlockers files study on Rapidgator Speedyshare and 1FichierNan Zhao, Loïc Baud, Patrick Bellot. 176-181 [doi]
- DA5DCSWS: A Distributed Architecture for semantic Web services Discovery and CompositionAdel Boukhadra, Karima Benatchba, Amar Balla. 182-187 [doi]
- ProtoML: A rule-based validation language for Google Protocol BuffersMiklós Kálmán. 188-193 [doi]
- The hybrid model for web services security access control and information flow controlSaadia Kedjar, Abdelkamel Tari. 194-202 [doi]
- Indirect NFC-loginBernd Borchert, Max Günther. 204-209 [doi]
- Labeled clustering a unique method to label unsupervised classesMuhammad Shaheen, Saeed Iqbal, Fazl-e-Basit. 210-214 [doi]
- A workflow for parallel and distributed computing of large-scale genomic dataHyun-Hwa Choi, Byoung-Seob Kim, Shin-Young Ahn, Seung-Jo Bae. 215-218 [doi]
- Internet Unite-and-Conquer architectureKamyab Karimi, Carl Hauser. 219-230 [doi]
- Evaluation of the UTAUT model for acceptable user experiences in Identity Access Management SystemsSara Jeza Alotaibi, Mike Wald. 232-237 [doi]
- Energy efficient time synchronization for target tracking in heterogeneous sensor networksDaehee Kim, Sangwook Kang, Sunshin An. 238-243 [doi]
- Broker-based Cross-Cloud Federation ManagerJacques Bou Abdo, Jacques Demerjian, Hakima Chaouchi, Kablan Barbar, Guy Pujolle. 244-251 [doi]
- Implementing a high-performance recommendation system using Phoenix++Chongxiao Cao, Fengguang Song, Daniel G. Waddington. 252-257 [doi]
- A machine learning based method for optimal journal classificationSaeed Iqbal, Muhammad Shaheen, Fazl-e-Basit. 259-264 [doi]
- Data management of RFID-based track-and-trace anti-counterfeiting in apparel supply chainS. H. Choi, B. Yang, H. H. Cheung, Y. X. Yang. 265-269 [doi]
- Web Service constraint optimizationAspen Olmsted, Csilla Farkas. 270-275 [doi]
- RUFC: A flexible framework for reliable UDP with flow controlAhmed Osama Fathy Atya, Jilong Kuang. 276-281 [doi]
- SV-2FA: Two-factor user authentication with SMS and voiceprint challenge responseHaruhiko Fujii, Yukio Tsuruoka. 283-287 [doi]
- Smartphone security: Overview of security software solutionsDaniel Fischer, Bernd Markscheffel, T. Seyffarth. 288-289 [doi]
- Analysis of security attacks on AODV routingMohamed A. Abdelshafy, Peter J. B. King. 290-295 [doi]
- A taxonomy for securely sharing information among others in a trust domainNalin Asanka Gamagedara Arachchilage, Cornelius Namiluko, Andrew Martin. 296-304 [doi]
- Enhanced Virtual Private Social Networks: Implementing user content confidentialityCharles Clarke, Eckhard Pfluegel, Dimitris Tsaptsinos. 306-312 [doi]
- DGM approach to network attacker and defender strategiesAlese Boniface Kayode, Iwasokun Gabriel Babatunde, Haruna Danjuma Israel. 313-320 [doi]
- Zombie-cookies: Case studies and mitigationOve Sörensen. 321-326 [doi]
- Intrusion detection system for Wireless Nano sensor NetworksAneel Rahim, Paul Malone. 327-330 [doi]
- Pedagogical hypermédias systemsBrika Ammar, Nader Fahima. 332-337 [doi]
- Adaptation of Web services using policiesMargarita Velasco, David While, Pathmeswaran Raju. 338-343 [doi]
- Feedback-driven clustering for automated linking of web pagesAdam Oest, Manjeet Rege. 344-349 [doi]
- Context-aware RESTful services on mobile devicesCharl van der Westhuizen, Marijke Coetzee. 350-355 [doi]
- BoxLock: Mobile-based Serpent cryptographic algorithm and One-Time Password mechanism implementation for Dropbox files securityAditya Yulianto, Maria Irmina Prasetiyowati. 357-362 [doi]
- Towards healthcare data security in cloud computingHuda Elmogazy, Omaima Bamasak. 363-368 [doi]
- Combining steganography and biometric cryptosystems for secure mutual authentication and key exchangeHisham Al-Assam, Rasber D. Rashid, Sabah Jassim. 369-374 [doi]
- Virtual machine remote detection method using network timestamp in cloud computingMatrazali Noorafiza, Hiroshi Maeda, Toshiyuki Kinoshita, Ryuya Uda. 375-380 [doi]
- Analysing and attacking the 4-way handshake of IEEE 802.11i standardAbdullah Alabdulatif, Xiaoqi Ma, Lars Nolle. 382-387 [doi]
- Towards the design of a film-based graphical password schemeLuigi Catuogno, Clemente Galdi. 388-393 [doi]
- Embedded implementation of Edwards curve- and extended Jacobi quartic curve-based cryptosystemsChiara Peretti, Paolo Gastaldo, Marco Stramezzi, Rodolfo Zunino. 394-400 [doi]
- DCT sign-based robust image hashingSupakorn Prungsinchai, Fouad Khelifi, Ahmed Bouridane. 401-405 [doi]
- Assisted Learning Virtual Support (ALVS) for postgraduate students, through the Graduate Virtual Research Environment (GVRE)Robert Costello, Nigel Shaw. 407-410 [doi]
- Improving the effectiveness of collaborative learning processes in Libyan Higher EducationThuraya Kenan, Crinela Pislaru, Abdussalam Elzawi, Maysoun Restoum. 411-416 [doi]
- Results on implementing personal learning environments in Tanzanian secondary schoolsLeonard James Mselle, Tabu S. Kondo. 417-421 [doi]
- Edge detection methods in palm-print identificationO. A. Akinsowon, B. K. Alese. 422-426 [doi]
- Threat methodology for securing scalable video in the CloudAfnan Ullah Khan, Manuel Oriol, Mariam Kiran. 428-436 [doi]
- Counter botnet activities in the Netherlands a study on organisation and effectivenessTimo Schless, Harald P. E. Vranken. 437-442 [doi]
- Automation and evaluation of the semantic annotation of Web resourcesSahar Maalej Dammak, Anis Jedidi, Rafik Bouaziz. 443-448 [doi]
- Post-Quantum Crystography: A combination of Post-Quantum Cryptography and SteganographyA. J. Gabriel, B. K. Alese, A. O. Adetunmbi, O. S. Adewale. 449-452 [doi]
- A model of component interaction between Formal, Technical and Informal components within IS/IT security governanceNadianatra Musa, Bob Clift. 454-462 [doi]
- An access control model for easy management of patient privacy in EHR systemsMario Sicuranza, Angelo Esposito. 463-470 [doi]
- Evaluation of third party tracking on the webAsma Hamed, Hella Kaffel Ben Ayed, Mohamed Ali Kaafar, Ahmed Kharraz. 471-477 [doi]
- Design and implementation of the contents visualization system for social networksJong-Hoon Lee, Jung-Tae Kim, Ik-Kyun Kim, Ki Jun Han. 479-483 [doi]
- Design and development of Anti-XSS proxyHossain Shahriar, Sarah North, Wei-Chuen Chen, Edward Mawangi. 484-489 [doi]
- Exploratory study of the attitudes of academic staff in Libyan Universities towards the role of the InternetAbdussalam Elzawi, Steve Wade, Thuraya Kenan, Crinela Pislaru. 490-493 [doi]
- Design and implementation of microcontroller based short message service control systemNwankwo Nonso Prince. 494-499 [doi]
- A methodology to build run-time monitors for security-aware workflowsClara Bertolissi, Silvio Ranise. 501-502 [doi]
- Grayscale image encryption using a hyperchaotic unstable dissipative systemL. J. Ontanon-Garcia, M. Garcia-Martinez, E. Campos-Cantón, Sergej Celikovský. 503-507 [doi]
- Social engineering in social networking sites: Affect-based modelAbdullah Algarni, Yue Xu, Taizan Chan, Yu-Chu Tian. 508-515 [doi]
- A failure to communicate: Security vulnerabilities in the GridStreamX Edgeware applicationTyson Brooks, Michelle Kaarst-Brown, Carlos Caicedo, Joon Park, Lee McKnight. 516-523 [doi]
- A new encryption scheme based on hybrid ProblemsHemlal Sahu, Birendra Kumar Sharma. 524-527 [doi]
- Trustworthy evidence gathering mechanism for multilayer cloud complianceMarkus Florian, Sarita Paudel, Markus Tauber. 529-530 [doi]
- A comparative study between modern encryption algorithms based on cloud computing environmentOmer K. Jasim Mohammad, Safia Abbass, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem. 531-535 [doi]
- Electrocardiogram (ECG) signals as biometrics in securing Wireless Body Area NetworkSofia Najwa Ramli, Rabiah Ahmad, Mohd Faizal Abdollah. 536-541 [doi]
- Security in the cloud based systems: Structure and breachesVivek Shandilya, Sajjan G. Shiva. 542-547 [doi]
- Pseudo Eye: The next-generation shopping application using Augmented RealityAnanda Kanagaraj S, Arjun G, Sree Sharmila T. 549-553 [doi]
- Information Access Assistant Service (IAAS)Kiswendsida K. Kabore, Oumarou Sie, Florence Sedes, André Péninou. 554-557 [doi]
- Towards an efficient shopping mechanism for M-commerceShafiq-Ur Rehman, Naveed Ejaz. 558-562 [doi]
- Extraction methods of e-mail discussion processes considering diversity of description granularity and their complicated relationshipsHiroki Nakayama, Ryo Onuma, Hiroaki Kaminaga, Youzou Miyadera, Setsuo Yokoyama, Shoichi Nakamura. 563-568 [doi]
- Reinforcing network security by converting massive data flow to continuous connections for IDSMaher Salem, Ulrich Buehler. 570-575 [doi]
- Access control enforcement in Named Data NetworkingBalkis Hamdane, Ahmed Serhrouchni, Sihem Guemara El Fatmi. 576-581 [doi]
- Introducing a new algorithm for medical image encryption based on chaotic feature of cellular automataIman Ranaee, Mahdi Majidi Nia, Reza Jahantigh, Amirhossein Gharib. 582-587 [doi]
- SecureDIS: A framework for secure Data Integration SystemsFatimah Y. Akeel, Gary B. Wills, Andrew M. Gravell. 588-593 [doi]
- Automatic data reuse for accelerating data intensive applications in the CloudLiangxiu Han, Zheng Xie, Richard A. Baldock. 596-600 [doi]
- Adaptive market place for converged cloud computing modelIbrahim Kabiru Musa, Stuart D. Walker. 601-606 [doi]
- Access control in probative value CloudMounira Msahli, Rached Abdeljaoued, Ahmed Serhrouchni. 607-611 [doi]
- Security risks in the short-range communication of ubiquitous applicationAntti Evesti, Jani Suomalainen, Reijo Savola. 612-617 [doi]
- Anomaly detection in Online Social Networks using structure-based techniqueAbdolazim Rezaei, Zarinah Mohd Kasirun, Vala Ali Rohani, Touraj Khodadadi. 619-622 [doi]
- E-Government web services and security of Personally Identifiable Information in developing nations a case of some Nigerian embassiesLove Adedayo, Sergey Butakov, Ron Ruhl, Dale Lindskog. 623-629 [doi]
- A prosodic Text-to-Speech system for Yorùbá languageAkintoba Emmanuel Akinwonmi, Boniface Kayode Alese. 630-635 [doi]
- Implementation and evaluation of classroom simulation for trainee teacher using second life environmentsFahad Alotaibi, Jordan Dimitrov. 636-643 [doi]
- Security standards taxonomy for Cloud applications in Critical Infrastructure ITSarita Paudel, Markus Tauber, Ivona Brandic. 645-646 [doi]
- Performability models for designing disaster tolerant Infrastructure-as-a-Service cloud computing systemsBruno Silva, Paulo Maciel, Armin Zimmermann. 647-652 [doi]
- Cloud security and compliance concerns: Demystifying stakeholders' roles and responsibilitiesMuteveri Kandira, Jabu Mtsweni, Keshnee Padayachee. 653-658 [doi]
- Keystone federated securityDinkar Sitaram, H. L. Phalachandra, Anush Vishwanath, Pramod Ramesh, Meghana Prashanth, Akshay G. Joshi, Anoop R. Desai, Harikrishna Prabhu C. R, Prafulla, Shwetha R, Yashaswini A. 659-664 [doi]
- Security in software engineering requirementWafa Slaibi Al-Shorafat. 666-673 [doi]
- Real-time adaptive arrival prediction system for public transportDenis Obrul, Borut Zalik. 674-677 [doi]
- Methods for strategic accumulation of context information in research activitiesRyo Onuma, Hiroki Nakayama, Hiroaki Kaminaga, Yasuhiko Morimoto, Youzou Miyadera, Shoichi Nakamura. 678-683 [doi]
- Using multi-agent systems to solve food distribution problem in disaster areaUmar Manzoor, Maria Zubair, Kanwal Batool. 684-689 [doi]