ICITST

Author Index

A B C D E F G H I J K L M N O P R S T U V W X Y Z

Author Session Start page Title
Atop A B C D E F G H I J K L M N O P R S T U V W X Y Z
Abbadi, Imad MC-O4.2   Dynamics of Trust in Clouds — Challenges and Research Agenda
MD-O4.3   Insiders Analysis in Cloud Computing Focusing on Home Healthcare System
Abdel Fattah, Amr MB-O1.2   Synchronization Recovery of Chaotic Signal Through Imperfect Channel Using Optimization Approach
MB-O1.3   Denoising Algorithm for Noisy Chaotic Signal by Using Wavelet Transform: Comprehensive Study
Abdel-Hafez, Ahmed MB-O1.2   Synchronization Recovery of Chaotic Signal Through Imperfect Channel Using Optimization Approach
MB-O1.3   Denoising Algorithm for Noisy Chaotic Signal by Using Wavelet Transform: Comprehensive Study
Abdelhalim, Mohamed TC-O4.7   Implementation of a Modified Lightweight Cryptographic TEA Algorithm in RFID System
Abdlrudha, Hadi MC-O3.4   Low Complexity High Security Image Encryption Based on Nested PWLCM Chaotic Map
Abdouli, Ameera SD-O1.3   Survey on Computationally Hard Problems and Their Applications to Cryptography
Abulaish, Muhammad WA-O3.3   Quaternary Privacy-Levels Preservation in Computer Forensics Investigation Process
Adegbenro, Olouwole WA-O3.6   Concurrent Realization of the Multiply-By-7 Elliptic Curve Scalar Multiplication Algorithm
Ahmad, Kassem MB-O2.3   Multicast Security Protocol Over Satellite DVB Based on Chaotic Sequences
Ahmed, Haseeb MD-O1.3   Designing a Hierarchical DHCP Server's Model to Automatically Provide Dedicated IP Address Anywhere in the World with Mobility
Aichroth, Patrick TC-O3.1   Access Control and Content Authentication for Hybrid DVB-T2/P2P Broadcasting
Akmayeva, Galyna MD-O2.2   UMTS Security: Enhancement of Identification, Authentication and Key Agreement Protocols
Akram, Muhammad Usman MC-O2.1   An Automated System for Fingerprint Classification Using Singular Points for Biometric Security
MC-O2.3   Retinal Recognition: Personal Identification Using Blood Vessels
Al Ameiri, Faisal MD-O4.4   Evaluation of Popular Application Sandboxing
MD-O4.5   Mobile Arabic Sign Language
Al Awadhi, Ibtesam SC-O1.4   Forensics and War-Driving on Unsecured Wireless Network
WA-O3.2   Forensic Artifacts of Facebook's Instant Messaging Service
Al Ebri, Noura SD-O1.2   Study on Secret Sharing Schemes (SSS) and Their Applications
Al Housani, Hajer SD-O1.4   Survey on Certificateless Public Key Cryptography
Al Mutawa, Noora SC-O1.4   Forensics and War-Driving on Unsecured Wireless Network
WA-O3.2   Forensic Artifacts of Facebook's Instant Messaging Service
Al Obaidli, Hanan WA-O3.1   Digital Forensics Education in UAE
Al Shehhi, Muna SC-O1.6   The Use of Boolean Functions in Stream Ciphers
Al Tair, Hend TC-O3.4   Pro-Active Multi-Agent Recommender System for Travelers
Al-Duwairi, Basheer MD-O2.4   Texture Analysis-Based Image Spam Filtering
Al-Hamadi, Hussam TD-O2.1   Formal Modeling and Verification of DLK Protocol
Al-Jaroodi, Jameela TC-O1.2   The Challenges of Arabic Language Use on the Internet
Al-Jarrah, Omar MD-O2.4   Texture Analysis-Based Image Spam Filtering
Al-Jumeily, Dhiya MC-O4.5   Research, Design and Development Review of the Cloud Computing Management System (Ccms)
Al-Qutayri, Mahmoud SC-O1.3   A Unified Countermeasure Against Side Channel Attacks on Cryptographic RFID
TC-O3.4   Pro-Active Multi-Agent Recommender System for Travelers
TD-O2.1   Formal Modeling and Verification of DLK Protocol
Al-Somani, Turki SC-O1.1   Hardware Implementations of Elliptic Curve Cryptography in Wireless Sensor Networks
SC-O1.2   Implementation of GF(2m) Elliptic Curve Cryptoprocessor on a Nano FPGA
Alahmad, Mahmoud WA-O1.1   Technologies Enabling Sustainability in the Built Environment
Albalooshi, Noora TC-O1.2   The Challenges of Arabic Language Use on the Internet
AlDahak, Amna TD-O1.3   Evaluating USARsim for Use in Fire Search and Rescue
Alghathbar, Khaled WA-O3.3   Quaternary Privacy-Levels Preservation in Computer Forensics Investigation Process
Ali, Amjad MD-O3.2   Securing Information Systems in Airports - a Practical Approach
Aljuhaishi, Nasser WA-O1.1   Technologies Enabling Sustainability in the Built Environment
AlMarashda, Khalfan SD-O1.1   On the Security of Inclusion or Omission of MixColumns in AES Cipher
AlSalami, Yousuf SD-O1.1   On the Security of Inclusion or Omission of MixColumns in AES Cipher
Amin, Asjad MD-O1.3   Designing a Hierarchical DHCP Server's Model to Automatically Provide Dedicated IP Address Anywhere in the World with Mobility
TD-O4.4   Modified Run Length Encoding Scheme with Introduction of Bit Stuffing for Efficient Data Compression
Analoui, Morteza TD-O1.5   An Economical Mechanism for Multicasting of Content Among Servers of Hybrid CDN-P2P Networks
Anghelescu, Petre MC-O3.2   FPGA Implementation of Cellular Automata Based Encryption Algorithm for Internet Communications
Anton, Constantin MD-O2.1   Reed-Muller Decoder with Associative Memories
Arakawa, Jumpei MC-O1.3   A Decentralized Access Control Mechanism Using Authorization Certificate for Distributed File Systems
Asllani, Arben MD-O3.2   Securing Information Systems in Airports - a Practical Approach
Ayyad, Mohammad TC-O4.7   Implementation of a Modified Lightweight Cryptographic TEA Algorithm in RFID System
Azer, Marianne MD-O3.5   Immunizing the SAODV Protocol Against Routing Information Disclosure
Azmi, Reza WA-O2.1   SeKMAC: A Secure Model for Key Management and Access Control in Cryptographic File System
Btop A B C D E F G H I J K L M N O P R S T U V W X Y Z
Baajour, Lama MD-O1.4   Toward an Abstract Language on Top of XACML for Web Services Security
Badra, Mohamad SC-O1.1   Hardware Implementations of Elliptic Curve Cryptography in Wireless Sensor Networks
Baek, Joonsang SC-O1.6   The Use of Boolean Functions in Stream Ciphers
SD-O1.2   Study on Secret Sharing Schemes (SSS) and Their Applications
SD-O1.3   Survey on Computationally Hard Problems and Their Applications to Cryptography
SD-O1.4   Survey on Certificateless Public Key Cryptography
Baggili, Ibrahim WA-O3.2   Forensic Artifacts of Facebook's Instant Messaging Service
Bagheri, Nasour TC-O4.5   Vulnerabilities in a New RFID Access Control Protocol
TD-O5.2   Security Analysis of LMAP++, an RFID Authentication Protocol
Bakhache, Bassem MB-O2.3   Multicast Security Protocol Over Satellite DVB Based on Chaotic Sequences
Bassil, Ramzi TC-O4.3   A PUF-Based Ultra-Lightweight Mutual-Authentication RFID Protocol
Bavafa, Majid MC-O1.4   A Survey on Space-Time & High-Rate Redundant
Bazargan, Fatma MB-O1.1   Understanding the Security Challenges of Virtualized Environments
Belaqziz, Salwa TD-O4.5   An Agent-Based Modeling Approach for Decision-Making in Gravity Irrigation Systems
Ben Ayed, Ghazi TD-O2.5   Privacy Requirements Specification for Digital Identity Management Systems Implementation: Towards a Digital Society of Privacy
Benferhat-OldAccount, Salem TD-O2.6   Encoding Default-Based SELinux-security Policy in Organization-Based Access Control Model
Benlamri, Rachid TC-O5.4   Context-Aware Real-Time Framework for Local Collaboration
Bès, Christian MC-O3.1   Study of the Robustness of an Enhanced CSK System by Using the Extended Kalman Filter
Bilski, Tomasz TD-O3.4   Security-Functionality Tradeoffs in IP Transition Phase
Bosch, Thomas TD-O4.3   XSLT Transformation Generating OWL Ontologies Automatically Based on XML Schemas
Boudguiga, Aymen MC-O3.6   An EAP ID-Based Authentication Method for Wireless Networks
Bouriche, Khalid TD-O2.6   Encoding Default-Based SELinux-security Policy in Organization-Based Access Control Model
Boustia, Narhimene WA-O2.5   Temporal Context in Multilevel Access Control Model
Branco, António Horta TC-O1.4   The Process of Summarization in the Pre-Processing Stage in Order to Improve Measurement of Texts When Clustering
Büttner, Daniela WA-O1.2   Desktop Search Engines - a State of the Art Comparison
Ctop A B C D E F G H I J K L M N O P R S T U V W X Y Z
Caragata, Daniel MB-O2.3   Multicast Security Protocol Over Satellite DVB Based on Chaotic Sequences
MC-O3.5   An Efficient and Secure SPN Cryptosystem Based on Chaotic Control Parameters
MD-O2.2   UMTS Security: Enhancement of Identification, Authentication and Key Agreement Protocols
Cenys, Antanas TC-O2.1   A Distributed Virtual Laboratory Architecture for Cybersecurity Training
Chang, Yoon Seok TC-O4.2   A Study on RFID Code Structure for Traceability System of Electric Vehicle Batteries
Chargé, Pascal MB-O2.1   Chaos Generation From 1D or 2D Circuits Including Switches
Chehab, Ali MD-O2.6   Secure Delay-Tolerant Communications in the Presence of Oppressive Governments
TC-O4.3   A PUF-Based Ultra-Lightweight Mutual-Authentication RFID Protocol
TC-O4.6   A Decentralized Energy-Aware Key Management Scheme for Wireless Sensor Networks
Chernikova, Oksana MC-O2.2   Handwriting Dynamics as a Means of Authentication
Cherrier, Estelle MB-O2.2   Noise-resisting Ciphering Based on a Chaotic Multi-Stream Pseudo-Random Number Generator
Chetto, Maryline MB-O2.3   Multicast Security Protocol Over Satellite DVB Based on Chaotic Sequences
TC-O1.5   Real-Time Scheduling for Energy Harvesting Sensors
Chibani, Youcef TC-O3.3   An Effective Hybrid Thresholding Technique for Degraded Documents Images Binarization
Chittayasothorn, Suphamit MD-O1.5   A Thin Client Application Development Using OCL and Conceptual Schema
Choudhary, Abdur Rahim TD-O1.6   Policy Rule-Sets for Policy Based Systems
Chung, Tai-Myoung TC-O5.6   Performace Evaluation of Relative Positioning Based on Low-cost GPS and VANET
Cot, Léa Dominique MC-O3.1   Study of the Robustness of an Enhanced CSK System by Using the Extended Kalman Filter
Dtop A B C D E F G H I J K L M N O P R S T U V W X Y Z
Daikpor, Michael WA-O3.6   Concurrent Realization of the Multiply-By-7 Elliptic Curve Scalar Multiplication Algorithm
Dehghan, Mehdi WA-O3.5   Performance Assessment of OLSR Protocol Under Routing Attacks
Del Soldato, Arianna WA-O1.5   The use of detection systems to improve the quality of the Italian Public Administration
DeMott, Jared MD-O3.4   Towards an Automatic Exploit Pipeline
Derraschouk, Meriem TC-O3.3   An Effective Hybrid Thresholding Technique for Degraded Documents Images Binarization
Diab, Mohamed SC-O1.5   FPGA Implementation of High Speed XTS-AES for Data Storage Devices
Dony, Robert TD-O2.4   Segmentation Based Encryption Method for Medical Images
Etop A B C D E F G H I J K L M N O P R S T U V W X Y Z
Ekberg, Jarkko TD-O3.3   Network Behaviour Anomaly Detection Using Holt-Winters Algorithm
El Assad, Safwan MB-O2.3   Multicast Security Protocol Over Satellite DVB Based on Chaotic Sequences
MC-O3.5   An Efficient and Secure SPN Cryptosystem Based on Chaotic Control Parameters
MD-O2.2   UMTS Security: Enhancement of Identification, Authentication and Key Agreement Protocols
El fazziki, Abdelaziz TD-O4.5   An Agent-Based Modeling Approach for Decision-Making in Gravity Irrigation Systems
EL Ghor, Hussein TC-O1.5   Real-Time Scheduling for Energy Harvesting Sensors
El Shahat, Omar SC-O1.5   FPGA Implementation of High Speed XTS-AES for Data Storage Devices
El-Beaino, Wissam TC-O4.3   A PUF-Based Ultra-Lightweight Mutual-Authentication RFID Protocol
El-Khatib, Khalil TC-O5.1   Encrypted Processes for Oblivious Data Retrieval
El-Mahallawy, Mohamed TC-O4.7   Implementation of a Modified Lightweight Cryptographic TEA Algorithm in RFID System
El-Sharkasy, Wael SC-O1.5   FPGA Implementation of High Speed XTS-AES for Data Storage Devices
Eladnani, Mohamed TD-O4.5   An Agent-Based Modeling Approach for Decision-Making in Gravity Irrigation Systems
Elhajj, Imad MD-O1.1   Hop Count Variability
Elhennawy, Adel TC-O4.7   Implementation of a Modified Lightweight Cryptographic TEA Algorithm in RFID System
Elmoghany, Mohamed SC-O1.5   FPGA Implementation of High Speed XTS-AES for Data Storage Devices
Elramly, Salwa MB-O1.2   Synchronization Recovery of Chaotic Signal Through Imperfect Channel Using Optimization Approach
MB-O1.3   Denoising Algorithm for Noisy Chaotic Signal by Using Wavelet Transform: Comprehensive Study
Ftop A B C D E F G H I J K L M N O P R S T U V W X Y Z
Fankhauser, Florian TC-O2.6   Trapping and Analyzing Malicious VoIP Traffic Using a Honeynet Approach
Farooqi, Norah WA-O2.6   Trust-Based Access Control for XML Databases
Fischer, Daniel WA-O1.2   Desktop Search Engines - a State of the Art Comparison
Fournier-Prunaret, Danièle MB-O2.1   Chaos Generation From 1D or 2D Circuits Including Switches
Francis, Tina MD-O4.1   Proximity Aware Overlays in Peer-to-Peer Networks
Fujii, Arisa TD-O4.6   Identity Management Architecture for Integrated Personalized Service on TV
Gtop A B C D E F G H I J K L M N O P R S T U V W X Y Z
Gahi, Youssef TC-O5.1   Encrypted Processes for Oblivious Data Retrieval
Garcia, Ana Cristina TC-O1.4   The Process of Summarization in the Pre-Processing Stage in Order to Improve Measurement of Texts When Clustering
Gardini, Laura MB-O2.1   Chaos Generation From 1D or 2D Circuits Including Switches
Garmehi, Mehran TD-O1.5   An Economical Mechanism for Multicasting of Content Among Servers of Hybrid CDN-P2P Networks
Gawanmeh, Amjad TD-O2.1   Formal Modeling and Verification of DLK Protocol
TD-O3.6   Modeling and Verification of Firewall Configurations Using Domain Restriction Method
Ghaemi Bafghi, Abbas MC-O2.6   Multiple SEIMCHA; Multiple SEmantic IMage CAPTCHA
Ghaemi Bafghi, Abbas TC-O2.5   Propagation of Trust and Confidence Using Intervals
Ghali, Cesar MD-O2.6   Secure Delay-Tolerant Communications in the Presence of Oppressive Governments
Ghernaouti Hélie, Solange TD-O2.5   Privacy Requirements Specification for Digital Identity Management Systems Implementation: Towards a Digital Society of Privacy
Granzer, Wolfgang TD-O2.2   Privacy Enabled Web Service Access Control Using SAML and XACML for Home Automation Gateways
Grechenig, Thomas TC-O2.6   Trapping and Analyzing Malicious VoIP Traffic Using a Honeynet Approach
Gruber, Markus TC-O2.6   Trapping and Analyzing Malicious VoIP Traffic Using a Honeynet Approach
Guelpeli, Marcus Vinicius TC-O1.4   The Process of Summarization in the Pre-Processing Stage in Order to Improve Measurement of Texts When Clustering
Guennoun, Mouhcine TC-O5.1   Encrypted Processes for Oblivious Data Retrieval
Guennoun, Zouhair TC-O5.1   Encrypted Processes for Oblivious Data Retrieval
Guimaraes, Mario SC-O1.4   Forensics and War-Driving on Unsecured Wireless Network
Htop A B C D E F G H I J K L M N O P R S T U V W X Y Z
Habibi Lashkari, Arash TC-O2.4   Users' Perceptions on Mobile Devices Security Awareness in Malaysia
Haider, Sajjad MC-O3.3   Security Threats in Cloud Computing
Halboob, Waleed WA-O3.3   Quaternary Privacy-Levels Preservation in Computer Forensics Investigation Process
Hanafy, Ayman MD-O3.5   Immunizing the SAODV Protocol Against Routing Information Disclosure
Harati, Ahad MC-O2.6   Multiple SEIMCHA; Multiple SEmantic IMage CAPTCHA
Haron, Galoh WA-O2.4   Extrapolating Security Requirements to an Established Software Process: Version 1.0
Hasna, Hosen WA-O1.1   Technologies Enabling Sustainability in the Built Environment
Hasselbach, Jens TC-O3.1   Access Control and Content Authentication for Hybrid DVB-T2/P2P Broadcasting
Heenaye-Mamode Khan, Maleika MC-O2.5   Dorsal Hand Vein Biometric Using Independent Component Analysis (ICA)
Hempel, Michael TC-O3.2   A General Attack Method for Steganography Removal Using Pseudo-CFA Re-interpolation
Hettak, Khelifa TD-O5.3   Redundant Reader Elimination for Directional Antenna in RFID Systems
Hildmann, Hanno MD-O2.5   Critical Infrastructure Protection Through Distributed Reactive Demand-Side Management
TC-O5.2   Demand-Side Management for Air Conditioning
TD-O1.2   Behavioural Game AI - a Theoretical Approach
Hirsch, Benjamin WA-O1.4   Education Beyond the Cloud: Anytime-anywhere Learning in a Smart Campus Environment
Houssain, Hilal SC-O1.1   Hardware Implementations of Elliptic Curve Cryptography in Wireless Sensor Networks
SC-O1.2   Implementation of GF(2m) Elliptic Curve Cryptoprocessor on a Nano FPGA
Hu, Xin MC-O1.2   Two Algorithms for Network Security Gradient Marking
MC-O1.5   A New Perspective of Network Vulnerability Analysis Using Network Security Gradient
Huet, Fabrice TC-O5.5   Virtual Cloud: Rent Out the Rented Resources
Hughes, Glyn MC-O4.5   Research, Design and Development Review of the Cloud Computing Management System (Ccms)
Hussain, Abir MC-O4.5   Research, Design and Development Review of the Cloud Computing Management System (Ccms)
Itop A B C D E F G H I J K L M N O P R S T U V W X Y Z
Iana, Vasile-Gabriel MC-O3.2   FPGA Implementation of Cellular Automata Based Encryption Algorithm for Internet Communications
Ibrahim, Magdy MB-O1.2   Synchronization Recovery of Chaotic Signal Through Imperfect Channel Using Optimization Approach
MB-O1.3   Denoising Algorithm for Noisy Chaotic Signal by Using Wavelet Transform: Comprehensive Study
Imai, Hideki MC-O4.1   A Secure Public Cloud Storage System
Ionescu, Laurentiu MD-O2.1   Reed-Muller Decoder with Associative Memories
Ionita, Silviu MC-O3.2   FPGA Implementation of Cellular Automata Based Encryption Algorithm for Internet Communications
Iqbal, Asif WA-O3.1   Digital Forensics Education in UAE
Iraqi, Youssef TC-O2.2   Mitigation of Spear Phishing Attacks: A Content-Based Authorship Identification Framework
TC-O2.3   Lexical URL Analysis for Discriminating Phishing and Legitimate E-Mail Messages
Irfan, Nazish TD-O5.3   Redundant Reader Elimination for Directional Antenna in RFID Systems
Ishaque, Nadia TC-O1.1   Using Keystroke-Level Model to Analyze IOS Optimization Techniques
Ishikawa, Kiyohiko TD-O4.6   Identity Management Architecture for Integrated Personalized Service on TV
Itani, Wassim MD-O2.6   Secure Delay-Tolerant Communications in the Presence of Oppressive Governments
Jtop A B C D E F G H I J K L M N O P R S T U V W X Y Z
Jeyalatha, Sivaramakrishnan TD-O4.1   Design and Implementation of a Web Structure Mining Algorithm Using Breadth First Search Strategy for Academic Search Application
Jones, Andrew TC-O2.2   Mitigation of Spear Phishing Attacks: A Content-Based Authorship Identification Framework
TC-O2.3   Lexical URL Analysis for Discriminating Phishing and Legitimate E-Mail Messages
Jung, Markus TD-O2.2   Privacy Enabled Web Service Access Control Using SAML and XACML for Home Automation Gateways
Ktop A B C D E F G H I J K L M N O P R S T U V W X Y Z
Kassem, Moustafa SC-O1.5   FPGA Implementation of High Speed XTS-AES for Data Storage Devices
Kastner, Wolfgang TD-O2.2   Privacy Enabled Web Service Access Control Using SAML and XACML for Home Automation Gateways
Kayssi, Ayman MD-O2.6   Secure Delay-Tolerant Communications in the Presence of Oppressive Governments
TC-O4.3   A PUF-Based Ultra-Lightweight Mutual-Authentication RFID Protocol
TC-O4.6   A Decentralized Energy-Aware Key Management Scheme for Wireless Sensor Networks
Khairallah, Mustafa SC-O1.5   FPGA Implementation of High Speed XTS-AES for Data Storage Devices
Khan, Shoab MC-O2.3   Retinal Recognition: Personal Identification Using Blood Vessels
Khater, Ismail MD-O2.4   Texture Analysis-Based Image Spam Filtering
Khonji, Mahmoud TC-O2.2   Mitigation of Spear Phishing Attacks: A Content-Based Authorship Identification Framework
TC-O2.3   Lexical URL Analysis for Discriminating Phishing and Legitimate E-Mail Messages
Kienesberger, Georg TD-O2.2   Privacy Enabled Web Service Access Control Using SAML and XACML for Home Automation Gateways
Kim, Jung Tae TC-O1.3   Design and Implementation of the Geo-Context Engine for Semantic Social Media Service
TD-O4.2   Location-based Personalized Social Media Service for the Smart Phone
Klingbeil, Thomas TC-O2.1   A Distributed Virtual Laboratory Architecture for Cybersecurity Training
Kobara, Kazukuni MC-O4.1   A Secure Public Cloud Storage System
Kopsidas, Spyros MD-O1.2   Mailbook a Social Network Against Spamming
Kuba, Martin MC-O1.6   Automated Trust Negotiation in Identity Federations Using OWL-based Abduction of Missing Credentials
Kurki, Taina WA-O2.2   Systematic Literature Review of Virtual Role
Ltop A B C D E F G H I J K L M N O P R S T U V W X Y Z
Laila, Umm-e- TC-O1.1   Using Keystroke-Level Model to Analyze IOS Optimization Techniques
Lakshmi Eswari, Ponnapu TC-O1.6   A Process Framework for Securing an e-Learning Ecosystem
Laurent, Maryline MC-O3.6   An EAP ID-Based Authentication Method for Wireless Networks
Lazzareschi, Pasquale WA-O1.5   The use of detection systems to improve the quality of the Italian Public Administration
Le Page, Michel TD-O4.5   An Agent-Based Modeling Approach for Decision-Making in Gravity Irrigation Systems
Lee, HoonKi TC-O1.3   Design and Implementation of the Geo-Context Engine for Semantic Social Media Service
TD-O4.2   Location-based Personalized Social Media Service for the Smart Phone
Lee, Jong-Hoon TC-O1.3   Design and Implementation of the Geo-Context Engine for Semantic Social Media Service
TD-O4.2   Location-based Personalized Social Media Service for the Smart Phone
Leida, Marcello TC-O3.4   Pro-Active Multi-Agent Recommender System for Travelers
Leucker, Martin WA-O2.3   An Event Pattern Language for Runtime Monitoring Based on AOP
Liao, Junguo SD-O1.5   Anonymous Electronic Voting Protocol with Traceability
Lim, Hun-Jung TC-O5.6   Performace Evaluation of Relative Positioning Based on Low-cost GPS and VANET
Ling, Lezhen SD-O1.5   Anonymous Electronic Voting Protocol with Traceability
Liu, Jie MC-O1.2   Two Algorithms for Network Security Gradient Marking
MC-O1.5   A New Perspective of Network Vulnerability Analysis Using Network Security Gradient
Lo, Nai-Wei TC-O4.1   Ownership Transfer Protocol for RFID Objects Using Lightweight Computing Operators
Loula, Pekka TD-O3.3   Network Behaviour Anomaly Detection Using Holt-Winters Algorithm
Lozhnikov, Pavel MC-O2.2   Handwriting Dynamics as a Means of Authentication
Lozi, René MB-O2.2   Noise-resisting Ciphering Based on a Chaotic Multi-Stream Pseudo-Random Number Generator
Mtop A B C D E F G H I J K L M N O P R S T U V W X Y Z
Ma, Tao TC-O3.2   A General Attack Method for Steganography Removal Using Pseudo-CFA Re-interpolation
Mahmood, Ahmed TD-O2.4   Segmentation Based Encryption Method for Medical Images
Malik, Sheheryar TC-O5.5   Virtual Cloud: Rent Out the Rented Resources
Mamode Khan, Naushad MC-O2.5   Dorsal Hand Vein Biometric Using Independent Component Analysis (ICA)
Mar, Kheng Kok MC-O4.3   Secured Virtual Diffused File System for the Cloud
Markscheffel, Bernd WA-O1.2   Desktop Search Engines - a State of the Art Comparison
Marrington, Andrew WA-O3.2   Forensic Artifacts of Facebook's Instant Messaging Service
Martin, Andrew MD-O4.3   Insiders Analysis in Cloud Computing Focusing on Home Healthcare System
Martin, Thomas SD-O1.1   On the Security of Inclusion or Omission of MixColumns in AES Cipher
Martinelli, Maurizio WA-O1.5   The use of detection systems to improve the quality of the Italian Public Administration
Marzouqi, Hamad SC-O1.3   A Unified Countermeasure Against Side Channel Attacks on Cryptographic RFID
Marzouqi, Mohamed MD-O4.5   Mobile Arabic Sign Language
TD-O1.3   Evaluating USARsim for Use in Fire Search and Rescue
Maseri, Naimeh MC-O1.4   A Survey on Space-Time & High-Rate Redundant
Mathew, Suresh MC-O4.6   Security Concerns for Cloud Computing in Aircraft Data Networks
Mathiak, Brigitte TD-O4.3   XSLT Transformation Generating OWL Ontologies Automatically Based on XML Schemas
Mazare, Alin MD-O2.1   Reed-Muller Decoder with Associative Memories
Mehrnejad, Maryam MC-O2.6   Multiple SEIMCHA; Multiple SEmantic IMage CAPTCHA
MD-O3.6   A Novel Method in Fuzzy Data Clustering Based on Chaotic PSO
Meinel, Christoph TC-O2.1   A Distributed Virtual Laboratory Architecture for Cybersecurity Training
Mendonça, Flávio WA-O1.3   A-CitizenMobile: A Case Study for Blind Users
Meybodi, Mohammad Reza TD-O1.4   An Application of Imperialist Competitive Algorithm to Solve the Quadratic Assignment Problem
Mi, Bo MC-O1.1   A Novel Key Establishment Scheme for Wireless Sensor Networks Based on Complex Network Synchronization
Mladenov, Valeri MD-O3.3   Synchronization of Sigma Delta Modulators
Mohamed, Nader TC-O1.2   The Challenges of Arabic Language Use on the Internet
Mokhtari, Aicha WA-O2.5   Temporal Context in Multilevel Access Control Model
Mourad, Azzam MD-O1.4   Toward an Abstract Language on Top of XACML for Web Services Security
Mukaddam, Ayman MD-O1.1   Hop Count Variability
Ntop A B C D E F G H I J K L M N O P R S T U V W X Y Z
Naderi, Majid TC-O4.5   Vulnerabilities in a New RFID Access Control Protocol
TD-O5.2   Security Analysis of LMAP++, an RFID Authentication Protocol
Namiluko, Cornelius MC-O4.2   Dynamics of Trust in Clouds — Challenges and Research Agenda
MD-O4.3   Insiders Analysis in Cloud Computing Focusing on Home Healthcare System
Narayanaswami, Sundaravalli MD-O3.1   Mobile Adhoc Networks: A Simulation Based Security Evaluation and Intrusion Prevention
Nasir, Qassim MC-O3.4   Low Complexity High Security Image Encryption Based on Nested PWLCM Chaotic Map
Nassr, Nezar MC-O4.4   A Parameterized RBAC Access Control Model for WS-BPEL Orchestrated Composite Web Services
Nazemi, Eslam TC-O3.5   A Policy Based Access Control Model for Web Services
Ng, Jason WA-O1.4   Education Beyond the Cloud: Anytime-anywhere Learning in a Smart Campus Environment
Nicolas, Sebastien MD-O2.5   Critical Infrastructure Protection Through Distributed Reactive Demand-Side Management
TC-O5.2   Demand-Side Management for Air Conditioning
Nogueira, António TD-O3.2   A Real-Time Traffic Classification Approach
Nogueira, José Luiz WA-O1.3   A-CitizenMobile: A Case Study for Blind Users
Noponen, Sami WA-O2.2   Systematic Literature Review of Virtual Role
North, Siobhán WA-O2.6   Trust-Based Access Control for XML Databases
Noura, Hassan MC-O3.5   An Efficient and Secure SPN Cryptosystem Based on Chaotic Control Parameters
Noureldin, Sherif MD-O3.5   Immunizing the SAODV Protocol Against Routing Information Disclosure
Otop A B C D E F G H I J K L M N O P R S T U V W X Y Z
Oreku, George MD-O4.6   Key Complication Procedure In Data Driven Ciphers Based on Controlled Substitution-Permutation Networks
Otrok, Hadi MD-O1.4   Toward an Abstract Language on Top of XACML for Web Services Security
Otsuki, Kazuhiro TD-O4.6   Identity Management Architecture for Integrated Personalized Service on TV
Ouali, Anis TD-O1.1   A MILP Based Design Tool for FTTH Access Networks with Consideration of Demand Growth
Ouari, Asma TC-O3.3   An Effective Hybrid Thresholding Technique for Degraded Documents Images Binarization
Ouda, Abdelkader TD-O3.1   Solutions to Security Issues with Legacy Integration of GSM Into UMTS
Ouzarf, Mohamed TD-O2.6   Encoding Default-Based SELinux-security Policy in Organization-Based Access Control Model
Ptop A B C D E F G H I J K L M N O P R S T U V W X Y Z
Paik, Eui-Hyun TC-O1.3   Design and Implementation of the Geo-Context Engine for Semantic Social Media Service
TD-O4.2   Location-based Personalized Social Media Service for the Smart Phone
Peng, Dongming TC-O3.2   A General Attack Method for Steganography Removal Using Pseudo-CFA Re-interpolation
Poon, Kin TD-O1.1   A MILP Based Design Tool for FTTH Access Networks with Consideration of Demand Growth
Rtop A B C D E F G H I J K L M N O P R S T U V W X Y Z
Radvilavicius, Lukas TC-O2.1   A Distributed Virtual Laboratory Architecture for Cybersecurity Training
Rahimiasl, Farshad WA-O2.1   SeKMAC: A Secure Model for Key Management and Access Control in Cryptographic File System
Ren, Zhanrui MC-O1.2   Two Algorithms for Network Security Gradient Marking
MC-O1.5   A New Perspective of Network Vulnerability Analysis Using Network Security Gradient
Rocha, Eduardo TD-O3.2   A Real-Time Traffic Classification Approach
Ruan, Shiou-Huei TC-O4.1   Ownership Transfer Protocol for RFID Objects Using Lightweight Computing Operators
Stop A B C D E F G H I J K L M N O P R S T U V W X Y Z
Saab, Salwa Adriana TC-O4.6   A Decentralized Energy-Aware Key Management Scheme for Wireless Sensor Networks
Saab, Soulaf MD-O2.6   Secure Delay-Tolerant Communications in the Presence of Oppressive Governments
Sabbari, Mehdi TC-O3.5   A Policy Based Access Control Model for Web Services
Sabeeh, Ahmed TC-O2.4   Users' Perceptions on Mobile Devices Security Awareness in Malaysia
Sadok, Hicham WA-O1.6   E-banking in Morocco: Study of Some Specifying Factors
Saeed, Muhammad Qasim MD-O2.3   A Record Composition/Decomposition Attack on the NDEF Signature Record Type Definition
Saetent, Jane MD-O1.5   A Thin Client Application Development Using OCL and Conceptual Schema
Safari, Ali TD-O1.4   An Application of Imperialist Competitive Algorithm to Solve the Quadratic Assignment Problem
Saffre, Fabrice MD-O2.5   Critical Infrastructure Protection Through Distributed Reactive Demand-Side Management
TC-O5.2   Demand-Side Management for Air Conditioning
Safkhani, Masoume TC-O4.5   Vulnerabilities in a New RFID Access Control Protocol
TD-O5.2   Security Analysis of LMAP++, an RFID Authentication Protocol
Said, Huwida SC-O1.4   Forensics and War-Driving on Unsecured Wireless Network
Salah, Khaled SC-O1.3   A Unified Countermeasure Against Side Channel Attacks on Cryptographic RFID
SD-O1.1   On the Security of Inclusion or Omission of MixColumns in AES Cipher
MD-O4.2   Performance Evaluation of Popular Cloud IaaS Providers
MD-O4.4   Evaluation of Popular Application Sandboxing
Salehi, Mahmood WA-O3.5   Performance Assessment of OLSR Protocol Under Routing Attacks
Salem Al Mazrouei, Maitha MD-O3.1   Mobile Adhoc Networks: A Simulation Based Security Evaluation and Intrusion Prevention
Salonen, Jarno WA-O2.2   Systematic Literature Review of Virtual Role
Salvador, Paulo TD-O3.2   A Real-Time Traffic Classification Approach
Samavati, Hamed WA-O3.5   Performance Assessment of OLSR Protocol Under Routing Attacks
Sandhya, Somitra TD-O5.2   Security Analysis of LMAP++, an RFID Authentication Protocol
Sasada, Koichi MC-O1.3   A Decentralized Access Control Mechanism Using Authorization Certificate for Distributed File Systems
Schanes, Christian TC-O2.6   Trapping and Analyzing Malicious VoIP Traffic Using a Honeynet Approach
Scott, Kris TC-O5.4   Context-Aware Real-Time Framework for Local Collaboration
Seneviratne, Lakmal TD-O1.3   Evaluating USARsim for Use in Fire Search and Rescue
Serban, Gheorghe MD-O2.1   Reed-Muller Decoder with Associative Memories
Seyyed Alipour, Hadiseh TC-O3.5   A Policy Based Access Control Model for Web Services
Shaikh, Farhan MC-O3.3   Security Threats in Cloud Computing
Shakeri, Hassan TC-O2.5   Propagation of Trust and Confidence Using Intervals
Shami, Abdallah TD-O3.1   Solutions to Security Issues with Legacy Integration of GSM Into UMTS
Shamseldin, Ramez MD-O1.6   Dynamically Complex System Using Adaptive Simulation for Interconnected Nodes
Sharif, Hamid TC-O3.2   A General Attack Method for Steganography Removal Using Pseudo-CFA Re-interpolation
WA-O1.1   Technologies Enabling Sustainability in the Built Environment
Shin, SeongHan MC-O4.1   A Secure Public Cloud Storage System
Shoniregun, Charles MD-O2.2   UMTS Security: Enhancement of Identification, Authentication and Key Agreement Protocols
Shrestha, Pradhumna TC-O3.2   A General Attack Method for Steganography Removal Using Pseudo-CFA Re-interpolation
Sihvonen, Hanna-Miina WA-O2.2   Systematic Literature Review of Virtual Role
Siong, Ng WA-O2.4   Extrapolating Security Requirements to an Established Software Process: Version 1.0
Sohizadeh Abyaneh, Mohammad Reza TD-O5.1   On the Privacy of Two Tag Ownership Transfer Protocols for RFIDs
Southern, Eric TD-O3.1   Solutions to Security Issues with Legacy Integration of GSM Into UMTS
Steegmans, Eric MC-O4.4   A Parameterized RBAC Access Control Model for WS-BPEL Orchestrated Composite Web Services
Sun, Yonglin MC-O1.2   Two Algorithms for Network Security Gradient Marking
MC-O1.5   A New Perspective of Network Vulnerability Analysis Using Network Security Gradient
Suresh, Nitha MC-O4.6   Security Concerns for Cloud Computing in Aircraft Data Networks
Ttop A B C D E F G H I J K L M N O P R S T U V W X Y Z
Taber, Stefan TC-O2.6   Trapping and Analyzing Malicious VoIP Traffic Using a Honeynet Approach
Tahar, Sofiene TD-O3.6   Modeling and Verification of Firewall Configurations Using Domain Restriction Method
Taheri, Mohammad Moein TC-O5.3   2-Phase Optimization Method for Energy Efficient Scheduling of Virtual Machines in Cloud DataCenters
Taheri Hanjani, Zahra MC-O1.4   A Survey on Space-Time & High-Rate Redundant
Taralova, Ina MD-O3.3   Synchronization of Sigma Delta Modulators
Tariq, Anam MC-O2.1   An Automated System for Fingerprint Classification Using Singular Points for Biometric Security
MC-O2.3   Retinal Recognition: Personal Identification Using Blood Vessels
Tassiulas, Leandros MD-O1.2   Mailbook a Social Network Against Spamming
Tavares, Thiago WA-O1.3   A-CitizenMobile: A Case Study for Blind Users
Toreini, Ehsan MC-O2.6   Multiple SEIMCHA; Multiple SEmantic IMage CAPTCHA
MD-O3.6   A Novel Method in Fuzzy Data Clustering Based on Chaotic PSO
Trevisan, Daniela WA-O1.3   A-CitizenMobile: A Case Study for Blind Users
Tripathi, Devendra TD-O3.5   A Note on Modified SET Protocol for Mobile Payment
Tsenov, Georgi MD-O3.3   Synchronization of Sigma Delta Modulators
Tutanescu, Ion MD-O2.1   Reed-Muller Decoder with Associative Memories
Tzouramanis, Theodoros WA-O3.4   A Robust Watermarking Scheme for Relational Databases
Utop A B C D E F G H I J K L M N O P R S T U V W X Y Z
Unger, Martin TD-O2.2   Privacy Enabled Web Service Access Control Using SAML and XACML for Home Automation Gateways
Vtop A B C D E F G H I J K L M N O P R S T U V W X Y Z
Varalis, Argyris MD-O1.2   Mailbook a Social Network Against Spamming
Vasarelli, Giuseppe WA-O1.5   The use of detection systems to improve the quality of the Italian Public Administration
Vejkanchana, Nattawut MD-O1.5   A Thin Client Application Development Using OCL and Conceptual Schema
Vijayakumar, B TD-O4.1   Design and Implementation of a Web Structure Mining Algorithm Using Breadth First Search Strategy for Academic Search Application
Vladeanu, Calin MC-O3.5   An Efficient and Secure SPN Cryptosystem Based on Chaotic Control Parameters
Wtop A B C D E F G H I J K L M N O P R S T U V W X Y Z
Walter, Colin MD-O2.3   A Record Composition/Decomposition Attack on the NDEF Signature Record Type Definition
Wang, Gang TC-O3.6   A Framework of VI-based Ranking and Recommendation of Web Services
Wang, Yongjun MC-O1.2   Two Algorithms for Network Security Gradient Marking
MC-O1.5   A New Perspective of Network Vulnerability Analysis Using Network Security Gradient
Wei, Dong WA-O2.3   An Event Pattern Language for Runtime Monitoring Based on AOP
Willems, Christian TC-O2.1   A Distributed Virtual Laboratory Architecture for Cybersecurity Training
Wisnieski, Timothy WA-O1.1   Technologies Enabling Sustainability in the Built Environment
Wooram, Kim TC-O4.2   A Study on RFID Code Structure for Traceability System of Electric Vehicle Batteries
WU, Tzong-Chen TC-O4.1   Ownership Transfer Protocol for RFID Objects Using Lightweight Computing Operators
Xtop A B C D E F G H I J K L M N O P R S T U V W X Y Z
Xian, Zhang WA-O2.3   An Event Pattern Language for Runtime Monitoring Based on AOP
Ytop A B C D E F G H I J K L M N O P R S T U V W X Y Z
Yagoub, Mustapha TD-O5.3   Redundant Reader Elimination for Directional Antenna in RFID Systems
Yahyaoui, Hamdi MD-O1.4   Toward an Abstract Language on Top of XACML for Web Services Security
Yamamura, Chigusa TD-O4.6   Identity Management Architecture for Integrated Personalized Service on TV
Yeun, Chan Yeob SC-O1.3   A Unified Countermeasure Against Side Channel Attacks on Cryptographic RFID
SC-O1.6   The Use of Boolean Functions in Stream Ciphers
SD-O1.2   Study on Secret Sharing Schemes (SSS) and Their Applications
SD-O1.3   Survey on Computationally Hard Problems and Their Applications to Cryptography
SD-O1.4   Survey on Certificateless Public Key Cryptography
MB-O1.1   Understanding the Security Challenges of Virtualized Environments
TD-O2.1   Formal Modeling and Verification of DLK Protocol
Ylinen, Jorma TD-O3.3   Network Behaviour Anomaly Detection Using Holt-Winters Algorithm
Yoshimura, Hiroyuki MC-O2.4   Fingerprint Templates with High Recognition Accuracy and High Security Generated by Discrete Fractional Sine Transform
Ztop A B C D E F G H I J K L M N O P R S T U V W X Y Z
Zain, Syed TC-O1.1   Using Keystroke-Level Model to Analyze IOS Optimization Techniques
Zamanifar, Kamran TC-O5.3   2-Phase Optimization Method for Energy Efficient Scheduling of Virtual Machines in Cloud DataCenters
Zayed, Mohamed TC-O3.3   An Effective Hybrid Thresholding Technique for Degraded Documents Images Binarization
Zemerly, Mohamed Jamal MB-O1.1   Understanding the Security Challenges of Virtualized Environments
MD-O4.5   Mobile Arabic Sign Language
TC-O3.4   Pro-Active Multi-Agent Recommender System for Travelers
TD-O2.1   Formal Modeling and Verification of DLK Protocol
Zineddine, Mhamed TD-O2.3   Automated Healthcare Information Privacy and Security: UAE Case
Zisiadis, Dimitris MD-O1.2   Mailbook a Social Network Against Spamming
Zulfiqar, Muhammad WA-O1.1   Technologies Enabling Sustainability in the Built Environment