Abstract is missing.
- Information security, risk governance and management frameworks: an overview of COBIT 5Georges Ataya. 3-5 [doi]
- Analysis of GOST 28147-89 security: methods and algorithmsLudmila K. Babenko. 6 [doi]
- Attacks on implementations of cryptographic algorithms: side-channel and fault attacksErkay Savas. 7-14 [doi]
- Trusting SSL in practiceAli Aydin Selçuk. 15 [doi]
- The SHA-3 competition: lessons learnedBart Preneel. 16-19 [doi]
- Security and protection of SCADA: a bigdata algorithmic approachR. K. Shyamasundar. 20-27 [doi]
- Social engineering attacks on the knowledge workerKatharina Krombholz, Heidelinde Hobel, Markus Huber, Edgar Weippl. 28-35 [doi]
- Conviction model for incident reaction architecture monitoring based on automatic sensors alert detectionChristophe Feltus, Djamel Khadraoui. 39-45 [doi]
- S-box construction from non-permutation power functionsHerman Isa, Norziana Jamil, Muhammad Reza Z'aba. 46-53 [doi]
- Obligations to enforce prohibitions: on the adequacy of security policiesWolter Pieters, Julian Padget, Francien Dechesne, Virginia Dignum, Huib Aldewereld. 54-61 [doi]
- Authenticated key agreement in wireless networks with automated key managementNaïm Qachri, Frédéric Lafitte, Olivier Markowitch. 62-69 [doi]
- On authentication factors: "what you can" and "how you do it"Jérôme Dossogne, Frédéric Lafitte. 70-78 [doi]
- Secure and practical threshold RSAJérôme Dossogne, Frédéric Lafitte, Dirk Van Heule. 79-85 [doi]
- Counterfeiting attacks on block-wise dependent fragile watermarking schemesHussain Nyeem, Wageeh W. Boles, Colin Boyd. 86-93 [doi]
- An authentication framework for peer-to-peer cloudGeong Sen Poh, Mohd Amril Nurman Mohd Nazir, Bok-Min Goi, Syh-Yuan Tan, Raphael Chung-Wei Phan, Maryam Safiyah Shamsudin. 94-101 [doi]
- Verification of OSPF vulnerabilities by colored Petri netSaeid Tizpaz Niari, Amir-Hossein Jahangir. 102-109 [doi]
- SAT based analysis of LTE stream cipher ZUCFrédéric Lafitte, Olivier Markowitch, Dirk Van Heule. 110-116 [doi]
- Generalized approach to modeling user activity graphs for network security and public safety monitoringN. E. Sergeev, A. A. Tselykh, A. N. Tselykh. 117-122 [doi]
- Efficient and robust data aggregation using untrusted infrastructureMarek Klonowski, Michal Koza, Miroslaw Kutylowski. 123-130 [doi]
- α - β wave bandIsao Nakanishi, Hironao Fukuda, Shigang Li. 131-135 [doi]
- Continuous security evaluation and auditing of remote platforms by combining trusted computing and security automation techniquesMudassar Aslam, Christian Gehrmann, Mats Björkman. 136-143 [doi]
- ProClick: a framework for testing clickjacking attacks in web applicationsHossain Shahriar, Vamshee Krishna Devendran, Hisham Haddad. 144-151 [doi]
- AndroSimilar: robust statistical feature signature for Android malware detectionParvez Faruki, Vijay Ganmoor, Vijay Laxmi, Manoj Singh Gaur, Ammar Bharmal. 152-159 [doi]
- Robust periocular recognition by fusing local to holistic sparse representationsJuan C. Moreno, V. B. Surya Prasath, Hugo Proença. 160-164 [doi]
- Cryptanalysis of RC4(n, m) stream cipherMohammad Ali Orumiehchiha, Josef Pieprzyk, Elham Shakour, Ron Steinfeld. 165-172 [doi]
- Blinded additively homomorphic encryption schemes for self-tallying votingJérôme Dossogne, Frédéric Lafitte. 173-180 [doi]
- Analysing attribute aggregation models in federated identity managementMd. Sadek Ferdous, Ron Poet. 181-188 [doi]
- Impact analysis of JellyFish attack on TCP-based mobile ad-hoc networksVijay Laxmi, Deepanshu Mehta, Manoj Singh Gaur, Parvez Faruki, Chhagan Lal. 189-195 [doi]
- A flexible framework for detecting IPv6 vulnerabilitiesHosnieh Rafiee, Christoph Mueller, Lukas Niemeier, Jannik Streek, Christoph Sterz, Christoph Meinel. 196-202 [doi]
- Exploring attack vectors facilitated by miniaturized computersCasey Mortensen, Ryan Winkelmaier, Jun Zheng. 203-209 [doi]
- Using transition systems to model and verify the implementation of security protocolYulong Fu, Ousmane Koné. 210-217 [doi]
- Privacy and security in IPv6 networks: challenges and possible solutionsHosnieh Rafiee, Christoph Meinel. 218-224 [doi]
- Designing flexible access control models for the cloudSalim Khamadja, Kamel Adi, Luigi Logrippo. 225-232 [doi]
- MAIL: Malware Analysis Intermediate Language: a step towards automating and optimizing malware detectionShahid Alam, R. Nigel Horspool, Issa Traoré. 233-240 [doi]
- Anonymity and privacy in multicast mobile ad hoc networksSomayeh Taheri, Salke Hartung, Dieter Hogrefe. 241-250 [doi]
- Metamodel for reputation based agents system: case study for electrical distribution SCADA designGuy Guemkam, Jonathan Blangenois, Christophe Feltus, Djamel Khadraoui. 251-255 [doi]
- Countering AES static s-box attackBehnam Rahnama, Yunus Kiran, Raz Dara. 256-260 [doi]
- Social access control language (SocACL)Edward Caprin, Yan Zhang, Khaled M. Khan. 261-265 [doi]
- A possibilistic approach to intrusion detection under imperfect logging protocolRomdhane Ben Younes, Guy Tremblay. 266-271 [doi]
- Hand shape recognition using Hu and Legendre momentsAldjia Boucetta, Kamal Eddine Melkemi. 272-276 [doi]
- An HBAC-based approximation for IBAC programsPablo Lamilla Alvarez, Yoshiaki Takata. 277-281 [doi]
- An access control framework for hybrid policiesSalim Khamadja, Kamel Adi, Luigi Logrippo. 282-286 [doi]
- An empirical study of three access control systemsLihui Hu, Jean Mayo, Charles Wallace. 287-291 [doi]
- Joux multicollisions attack in sponge constructionMohammad A. AlAhmad, Imad Fakhri Alshaikhli, Mridul Nandi. 292-296 [doi]
- Digital camera identification systemDmitry Rublev, Vladimir Fedorov, Oleg B. Makarevich. 297-300 [doi]
- Complexity measurement of a password for keystroke dynamics: preliminary studySoumik Mondal, Patrick Bours, Syed Zulkarnain Syed Idrus. 301-305 [doi]
- An improved fault-tolerant conference-key agreement protocol with forward secrecyOrhan Ermis, Serif Bahtiyar, Emin Anarim, M. Ufuk Çaglayan. 306-310 [doi]
- Nature inspired heuristics for attack of simplified DES algorithmT. Mekhaznia. 311-315 [doi]
- The darker side of Firefox extensionAnil Saini, Manoj Singh Gaur, Vijay Laxmi. 316-320 [doi]
- A review on cloud securityDuygu Sinanc, Seref Sagiroglu. 321-325 [doi]
- CGA integration into IPsec/IKEv2 authenticationAhmad AlSa'deh, Christoph Meinel, Florian Westphal, Marian Gawron, Björn Groneberg. 326-330 [doi]
- Secure true random number generator in WLAN/LANAlexander G. Chefranov, SeyedMasoud Alavi Abhari, Hooman Alavizadeh, Maryam Farajzadeh Zanjani. 331-335 [doi]
- Public key infrastructure for UAE: a case studyEman Hableel, Young-Ji Byon, Joonsang Beak. 336-340 [doi]
- Information protection systems based on universal knapsack problemV. O. Osipyan. 343-346 [doi]
- Expert key selection impact on the MANETs' performance using probabilistic key management algorithmMohammed Gharib, Mohsen Minaei, Morteza Golkari, Ali Movaghar. 347-351 [doi]
- Influence of S-Boxes to the resistance of GOST algorithm against linear cryptanalysisLudmila K. Babenko, Evgeniya Ishchukova. 352-355 [doi]
- Security policy verification in grid systemsArtem S. Konoplev, Maxim O. Kalinin. 356-358 [doi]
- Visual steganalysis of LSB-encoded audio data based on frequency domain characteristicsYüksel Arslan, Yildiray Yalman. 359-362 [doi]
- Authorized! access denied, unauthorized! access grantedAbdulaziz Almehmadi, Khalil El-Khatib. 363-367 [doi]
- A finite transition model for security protocol verificationYulong Fu, Ousmane Koné. 368-371 [doi]
- Development of a secure cluster-based wireless sensor network modelEvgeny Sergeevich Abramov, Elena Basan, Oleg B. Makarevich. 372-375 [doi]
- Content-location based key management scheme for content centric networksSarmad Ullah Khan, Rafiullah Khan. 376-379 [doi]
- About responsibilities distribution for information securityPyatkov Anton, Zolotarev Vyacheslav. 380-383 [doi]
- A clique-based method for mining fuzzy graph patterns in anti-money laundering systemsLeonid S. Bershtein, A. A. Tselykh. 384-387 [doi]
- A novel approach for dynamic authorisation planning in constrained workflow systemsMeriam Jemel, Nadia Ben Azzouna, Khaled Ghédira. 388-391 [doi]
- Features extraction of fingerprints using firefly algorithmZiyad Tariq Mustafa Al-Ta'l, Omar Younis Abdulhameed. 392-395 [doi]
- Performance analysis of the developed mandatory access control system in the DBMSBabenko Ludmila, Basan Alexandr, Oleg B. Makarevich. 396-399 [doi]
- A protocol for simultaneous use of confidentiality and integrity in large-scale storage systemsZahra Khani, Reza Azmi. 400-403 [doi]
- Using quadrocopter as a pentest toolEvgeny Sergeevich Abramov, Maxim Kobilev, Oleg B. Makarevich. 404-407 [doi]
- EndNote vs Zotero in searching library catalog via Z39.50 of academic libraries in ThailandAurathai Wareesa-ard. 411-412 [doi]
- Improved face recognition at a distance using light field camera & super resolution schemesR. Raghavendra, Kiran B. Raja, Bian Yang, Christoph Busch. 413-416 [doi]
- Building of mathematical model of flow data processing system based on given selection of elements of the setV. O. Osipyan, A. S. Zhuck, A. H. Arutyunyan, Y. A. Karpenko. 417-420 [doi]
- D0M-WLAN: a traffic analysis based approach for detecting malicious activities on wireless networksRohan Nanda, P. Venkata Krishna. 421-424 [doi]
- Securing the virtual machine images in cloud computingMuhammad Kazim, Rahat Masood, Muhammad Awais Shibli. 425-428 [doi]
- Implementing real-time transactional security property using timed edit automataN. Rajamanickam, R. Nadarajan. 429-432 [doi]
- Development the method of detection the malicious pages interconnection in the internetKsenia Tsyganok, Evgeny Tumoyan, Lyudmila K. Babenko. 433-435 [doi]
- A novel threshold-based scan detection method using genetic algorithmMorteza Barati, Karim Faez, Zahra Hakimi. 436-439 [doi]
- Towards a dynamic authorisation planning satisfying intra-instance and inter-instance constraintsMeriam Jemel, Nadia Ben Azzouna, Khaled Ghédira. 440-443 [doi]
- On designing automatic reaction strategy for critical infrastructure SCADA systemChristophe Feltus, Djamel Khadraoui. 444-445 [doi]
- The method of the information security risk assessment in cloud computing systemsOleg B. Makarevich, Irina V. Mashkina, Alina Sentsova. 446-447 [doi]
- Preventing malicious data harvesting from deallocated memory areasMaxim Anikeev, Felix C. Freiling. 448-449 [doi]
- Linking business goals to information security plans and activitiesGeorges Ataya. 453 [doi]
- Addressing security challenges in WiMAX environmentArif Sari, Behnam Rahnama. 454-456 [doi]
- Improbable differential cryptanalysisCihangir Tezcan. 457 [doi]
- Insecurities within browser: issues and challengesManoj Singh Gaur, Dhiren Patel, Anil Saini. 458 [doi]
- Security vulnerabilities and mitigation techniques of web applicationsHossain Shahriar. 459 [doi]
- Security through human-factors and biometricsSambit Bakshi, Tugkan Tuglular. 463 [doi]
- Multidisciplinary prospective in cryptologySattar B. Sadkhan, Nidaa A. Abbass. 464 [doi]
- Industry program panelChristophe Feltus. 465 [doi]