Author Index
A B C D E F G H I J K L M N O P R S T U V W X Y Z
Author | Session | Start page | Title |
---|---|---|---|
A A B C D E F G H I J K L M N O P R S T U V W X Y Z | |||
Abbadi, Imad | MC-O4.2 | Dynamics of Trust in Clouds — Challenges and Research Agenda | |
MD-O4.3 | Insiders Analysis in Cloud Computing Focusing on Home Healthcare System | ||
Abdel Fattah, Amr | MB-O1.2 | Synchronization Recovery of Chaotic Signal Through Imperfect Channel Using Optimization Approach | |
MB-O1.3 | Denoising Algorithm for Noisy Chaotic Signal by Using Wavelet Transform: Comprehensive Study | ||
Abdel-Hafez, Ahmed | MB-O1.2 | Synchronization Recovery of Chaotic Signal Through Imperfect Channel Using Optimization Approach | |
MB-O1.3 | Denoising Algorithm for Noisy Chaotic Signal by Using Wavelet Transform: Comprehensive Study | ||
Abdelhalim, Mohamed | TC-O4.7 | Implementation of a Modified Lightweight Cryptographic TEA Algorithm in RFID System | |
Abdlrudha, Hadi | MC-O3.4 | Low Complexity High Security Image Encryption Based on Nested PWLCM Chaotic Map | |
Abdouli, Ameera | SD-O1.3 | Survey on Computationally Hard Problems and Their Applications to Cryptography | |
Abulaish, Muhammad | WA-O3.3 | Quaternary Privacy-Levels Preservation in Computer Forensics Investigation Process | |
Adegbenro, Olouwole | WA-O3.6 | Concurrent Realization of the Multiply-By-7 Elliptic Curve Scalar Multiplication Algorithm | |
Ahmad, Kassem | MB-O2.3 | Multicast Security Protocol Over Satellite DVB Based on Chaotic Sequences | |
Ahmed, Haseeb | MD-O1.3 | Designing a Hierarchical DHCP Server's Model to Automatically Provide Dedicated IP Address Anywhere in the World with Mobility | |
Aichroth, Patrick | TC-O3.1 | Access Control and Content Authentication for Hybrid DVB-T2/P2P Broadcasting | |
Akmayeva, Galyna | MD-O2.2 | UMTS Security: Enhancement of Identification, Authentication and Key Agreement Protocols | |
Akram, Muhammad Usman | MC-O2.3 | Retinal Recognition: Personal Identification Using Blood Vessels | |
MC-O2.1 | An Automated System for Fingerprint Classification Using Singular Points for Biometric Security | ||
Al Ameiri, Faisal | MD-O4.4 | Evaluation of Popular Application Sandboxing | |
MD-O4.5 | Mobile Arabic Sign Language | ||
Al Awadhi, Ibtesam | SC-O1.4 | Forensics and War-Driving on Unsecured Wireless Network | |
WA-O3.2 | Forensic Artifacts of Facebook's Instant Messaging Service | ||
Al Ebri, Noura | SD-O1.2 | Study on Secret Sharing Schemes (SSS) and Their Applications | |
Al Housani, Hajer | SD-O1.4 | Survey on Certificateless Public Key Cryptography | |
Al Mutawa, Noora | SC-O1.4 | Forensics and War-Driving on Unsecured Wireless Network | |
WA-O3.2 | Forensic Artifacts of Facebook's Instant Messaging Service | ||
Al Obaidli, Hanan | WA-O3.1 | Digital Forensics Education in UAE | |
Al Shehhi, Muna | SC-O1.6 | The Use of Boolean Functions in Stream Ciphers | |
Al Tair, Hend | TC-O3.4 | Pro-Active Multi-Agent Recommender System for Travelers | |
Al-Duwairi, Basheer | MD-O2.4 | Texture Analysis-Based Image Spam Filtering | |
Al-Hamadi, Hussam | TD-O2.1 | Formal Modeling and Verification of DLK Protocol | |
Al-Jaroodi, Jameela | TC-O1.2 | The Challenges of Arabic Language Use on the Internet | |
Al-Jarrah, Omar | MD-O2.4 | Texture Analysis-Based Image Spam Filtering | |
Al-Jumeily, Dhiya | MC-O4.5 | Research, Design and Development Review of the Cloud Computing Management System (Ccms) | |
Al-Qutayri, Mahmoud | SC-O1.3 | A Unified Countermeasure Against Side Channel Attacks on Cryptographic RFID | |
TC-O3.4 | Pro-Active Multi-Agent Recommender System for Travelers | ||
TD-O2.1 | Formal Modeling and Verification of DLK Protocol | ||
Al-Somani, Turki | SC-O1.1 | Hardware Implementations of Elliptic Curve Cryptography in Wireless Sensor Networks | |
SC-O1.2 | Implementation of GF(2m) Elliptic Curve Cryptoprocessor on a Nano FPGA | ||
Alahmad, Mahmoud | WA-O1.1 | Technologies Enabling Sustainability in the Built Environment | |
Albalooshi, Noora | TC-O1.2 | The Challenges of Arabic Language Use on the Internet | |
AlDahak, Amna | TD-O1.3 | Evaluating USARsim for Use in Fire Search and Rescue | |
Alghathbar, Khaled | WA-O3.3 | Quaternary Privacy-Levels Preservation in Computer Forensics Investigation Process | |
Ali, Amjad | MD-O3.2 | Securing Information Systems in Airports - a Practical Approach | |
Aljuhaishi, Nasser | WA-O1.1 | Technologies Enabling Sustainability in the Built Environment | |
AlMarashda, Khalfan | SD-O1.1 | On the Security of Inclusion or Omission of MixColumns in AES Cipher | |
AlSalami, Yousuf | SD-O1.1 | On the Security of Inclusion or Omission of MixColumns in AES Cipher | |
Amin, Asjad | MD-O1.3 | Designing a Hierarchical DHCP Server's Model to Automatically Provide Dedicated IP Address Anywhere in the World with Mobility | |
TD-O4.4 | Modified Run Length Encoding Scheme with Introduction of Bit Stuffing for Efficient Data Compression | ||
Analoui, Morteza | TD-O1.5 | An Economical Mechanism for Multicasting of Content Among Servers of Hybrid CDN-P2P Networks | |
Anghelescu, Petre | MC-O3.2 | FPGA Implementation of Cellular Automata Based Encryption Algorithm for Internet Communications | |
Anton, Constantin | MD-O2.1 | Reed-Muller Decoder with Associative Memories | |
Arakawa, Jumpei | MC-O1.3 | A Decentralized Access Control Mechanism Using Authorization Certificate for Distributed File Systems | |
Asllani, Arben | MD-O3.2 | Securing Information Systems in Airports - a Practical Approach | |
Ayyad, Mohammad | TC-O4.7 | Implementation of a Modified Lightweight Cryptographic TEA Algorithm in RFID System | |
Azer, Marianne | MD-O3.5 | Immunizing the SAODV Protocol Against Routing Information Disclosure | |
Azmi, Reza | WA-O2.1 | SeKMAC: A Secure Model for Key Management and Access Control in Cryptographic File System | |
B A B C D E F G H I J K L M N O P R S T U V W X Y Z | |||
Baajour, Lama | MD-O1.4 | Toward an Abstract Language on Top of XACML for Web Services Security | |
Badra, Mohamad | SC-O1.1 | Hardware Implementations of Elliptic Curve Cryptography in Wireless Sensor Networks | |
Baek, Joonsang | SC-O1.6 | The Use of Boolean Functions in Stream Ciphers | |
SD-O1.4 | Survey on Certificateless Public Key Cryptography | ||
SD-O1.2 | Study on Secret Sharing Schemes (SSS) and Their Applications | ||
SD-O1.3 | Survey on Computationally Hard Problems and Their Applications to Cryptography | ||
Baggili, Ibrahim | WA-O3.2 | Forensic Artifacts of Facebook's Instant Messaging Service | |
Bagheri, Nasour | TC-O4.5 | Vulnerabilities in a New RFID Access Control Protocol | |
TD-O5.2 | Security Analysis of LMAP++, an RFID Authentication Protocol | ||
Bakhache, Bassem | MB-O2.3 | Multicast Security Protocol Over Satellite DVB Based on Chaotic Sequences | |
Bassil, Ramzi | TC-O4.3 | A PUF-Based Ultra-Lightweight Mutual-Authentication RFID Protocol | |
Bavafa, Majid | MC-O1.4 | A Survey on Space-Time & High-Rate Redundant | |
Bazargan, Fatma | MB-O1.1 | Understanding the Security Challenges of Virtualized Environments | |
Belaqziz, Salwa | TD-O4.5 | An Agent-Based Modeling Approach for Decision-Making in Gravity Irrigation Systems | |
Ben Ayed, Ghazi | TD-O2.5 | Privacy Requirements Specification for Digital Identity Management Systems Implementation: Towards a Digital Society of Privacy | |
Benferhat-OldAccount, Salem | TD-O2.6 | Encoding Default-Based SELinux-security Policy in Organization-Based Access Control Model | |
Benlamri, Rachid | TC-O5.4 | Context-Aware Real-Time Framework for Local Collaboration | |
Bès, Christian | MC-O3.1 | Study of the Robustness of an Enhanced CSK System by Using the Extended Kalman Filter | |
Bilski, Tomasz | TD-O3.4 | Security-Functionality Tradeoffs in IP Transition Phase | |
Bosch, Thomas | TD-O4.3 | XSLT Transformation Generating OWL Ontologies Automatically Based on XML Schemas | |
Boudguiga, Aymen | MC-O3.6 | An EAP ID-Based Authentication Method for Wireless Networks | |
Bouriche, Khalid | TD-O2.6 | Encoding Default-Based SELinux-security Policy in Organization-Based Access Control Model | |
Boustia, Narhimene | WA-O2.5 | Temporal Context in Multilevel Access Control Model | |
Branco, António Horta | TC-O1.4 | The Process of Summarization in the Pre-Processing Stage in Order to Improve Measurement of Texts When Clustering | |
Büttner, Daniela | WA-O1.2 | Desktop Search Engines - a State of the Art Comparison | |
C A B C D E F G H I J K L M N O P R S T U V W X Y Z | |||
Caragata, Daniel | MB-O2.3 | Multicast Security Protocol Over Satellite DVB Based on Chaotic Sequences | |
MC-O3.5 | An Efficient and Secure SPN Cryptosystem Based on Chaotic Control Parameters | ||
MD-O2.2 | UMTS Security: Enhancement of Identification, Authentication and Key Agreement Protocols | ||
Cenys, Antanas | TC-O2.1 | A Distributed Virtual Laboratory Architecture for Cybersecurity Training | |
Chang, Yoon Seok | TC-O4.2 | A Study on RFID Code Structure for Traceability System of Electric Vehicle Batteries | |
Chargé, Pascal | MB-O2.1 | Chaos Generation From 1D or 2D Circuits Including Switches | |
Chehab, Ali | MD-O2.6 | Secure Delay-Tolerant Communications in the Presence of Oppressive Governments | |
TC-O4.3 | A PUF-Based Ultra-Lightweight Mutual-Authentication RFID Protocol | ||
TC-O4.6 | A Decentralized Energy-Aware Key Management Scheme for Wireless Sensor Networks | ||
Chernikova, Oksana | MC-O2.2 | Handwriting Dynamics as a Means of Authentication | |
Cherrier, Estelle | MB-O2.2 | Noise-resisting Ciphering Based on a Chaotic Multi-Stream Pseudo-Random Number Generator | |
Chetto, Maryline | MB-O2.3 | Multicast Security Protocol Over Satellite DVB Based on Chaotic Sequences | |
TC-O1.5 | Real-Time Scheduling for Energy Harvesting Sensors | ||
Chibani, Youcef | TC-O3.3 | An Effective Hybrid Thresholding Technique for Degraded Documents Images Binarization | |
Chittayasothorn, Suphamit | MD-O1.5 | A Thin Client Application Development Using OCL and Conceptual Schema | |
Choudhary, Abdur Rahim | TD-O1.6 | Policy Rule-Sets for Policy Based Systems | |
Chung, Tai-Myoung | TC-O5.6 | Performace Evaluation of Relative Positioning Based on Low-cost GPS and VANET | |
Cot, Léa Dominique | MC-O3.1 | Study of the Robustness of an Enhanced CSK System by Using the Extended Kalman Filter | |
D A B C D E F G H I J K L M N O P R S T U V W X Y Z | |||
Daikpor, Michael | WA-O3.6 | Concurrent Realization of the Multiply-By-7 Elliptic Curve Scalar Multiplication Algorithm | |
Dehghan, Mehdi | WA-O3.5 | Performance Assessment of OLSR Protocol Under Routing Attacks | |
Del Soldato, Arianna | WA-O1.5 | The use of detection systems to improve the quality of the Italian Public Administration | |
DeMott, Jared | MD-O3.4 | Towards an Automatic Exploit Pipeline | |
Derraschouk, Meriem | TC-O3.3 | An Effective Hybrid Thresholding Technique for Degraded Documents Images Binarization | |
Diab, Mohamed | SC-O1.5 | FPGA Implementation of High Speed XTS-AES for Data Storage Devices | |
Dony, Robert | TD-O2.4 | Segmentation Based Encryption Method for Medical Images | |
E A B C D E F G H I J K L M N O P R S T U V W X Y Z | |||
Ekberg, Jarkko | TD-O3.3 | Network Behaviour Anomaly Detection Using Holt-Winters Algorithm | |
El Assad, Safwan | MB-O2.3 | Multicast Security Protocol Over Satellite DVB Based on Chaotic Sequences | |
MC-O3.5 | An Efficient and Secure SPN Cryptosystem Based on Chaotic Control Parameters | ||
MD-O2.2 | UMTS Security: Enhancement of Identification, Authentication and Key Agreement Protocols | ||
El fazziki, Abdelaziz | TD-O4.5 | An Agent-Based Modeling Approach for Decision-Making in Gravity Irrigation Systems | |
EL Ghor, Hussein | TC-O1.5 | Real-Time Scheduling for Energy Harvesting Sensors | |
El Shahat, Omar | SC-O1.5 | FPGA Implementation of High Speed XTS-AES for Data Storage Devices | |
El-Beaino, Wissam | TC-O4.3 | A PUF-Based Ultra-Lightweight Mutual-Authentication RFID Protocol | |
El-Khatib, Khalil | TC-O5.1 | Encrypted Processes for Oblivious Data Retrieval | |
El-Mahallawy, Mohamed | TC-O4.7 | Implementation of a Modified Lightweight Cryptographic TEA Algorithm in RFID System | |
El-Sharkasy, Wael | SC-O1.5 | FPGA Implementation of High Speed XTS-AES for Data Storage Devices | |
Eladnani, Mohamed | TD-O4.5 | An Agent-Based Modeling Approach for Decision-Making in Gravity Irrigation Systems | |
Elhajj, Imad | MD-O1.1 | Hop Count Variability | |
Elhennawy, Adel | TC-O4.7 | Implementation of a Modified Lightweight Cryptographic TEA Algorithm in RFID System | |
Elmoghany, Mohamed | SC-O1.5 | FPGA Implementation of High Speed XTS-AES for Data Storage Devices | |
Elramly, Salwa | MB-O1.2 | Synchronization Recovery of Chaotic Signal Through Imperfect Channel Using Optimization Approach | |
MB-O1.3 | Denoising Algorithm for Noisy Chaotic Signal by Using Wavelet Transform: Comprehensive Study | ||
F A B C D E F G H I J K L M N O P R S T U V W X Y Z | |||
Fankhauser, Florian | TC-O2.6 | Trapping and Analyzing Malicious VoIP Traffic Using a Honeynet Approach | |
Farooqi, Norah | WA-O2.6 | Trust-Based Access Control for XML Databases | |
Fischer, Daniel | WA-O1.2 | Desktop Search Engines - a State of the Art Comparison | |
Fournier-Prunaret, Danièle | MB-O2.1 | Chaos Generation From 1D or 2D Circuits Including Switches | |
Francis, Tina | MD-O4.1 | Proximity Aware Overlays in Peer-to-Peer Networks | |
Fujii, Arisa | TD-O4.6 | Identity Management Architecture for Integrated Personalized Service on TV | |
G A B C D E F G H I J K L M N O P R S T U V W X Y Z | |||
Gahi, Youssef | TC-O5.1 | Encrypted Processes for Oblivious Data Retrieval | |
Garcia, Ana Cristina | TC-O1.4 | The Process of Summarization in the Pre-Processing Stage in Order to Improve Measurement of Texts When Clustering | |
Gardini, Laura | MB-O2.1 | Chaos Generation From 1D or 2D Circuits Including Switches | |
Garmehi, Mehran | TD-O1.5 | An Economical Mechanism for Multicasting of Content Among Servers of Hybrid CDN-P2P Networks | |
Gawanmeh, Amjad | TD-O3.6 | Modeling and Verification of Firewall Configurations Using Domain Restriction Method | |
TD-O2.1 | Formal Modeling and Verification of DLK Protocol | ||
Ghaemi Bafghi, Abbas | MC-O2.6 | Multiple SEIMCHA; Multiple SEmantic IMage CAPTCHA | |
Ghaemi Bafghi, Abbas | TC-O2.5 | Propagation of Trust and Confidence Using Intervals | |
Ghali, Cesar | MD-O2.6 | Secure Delay-Tolerant Communications in the Presence of Oppressive Governments | |
Ghernaouti, Solange | TD-O2.5 | Privacy Requirements Specification for Digital Identity Management Systems Implementation: Towards a Digital Society of Privacy | |
Granzer, Wolfgang | TD-O2.2 | Privacy Enabled Web Service Access Control Using SAML and XACML for Home Automation Gateways | |
Grechenig, Thomas | TC-O2.6 | Trapping and Analyzing Malicious VoIP Traffic Using a Honeynet Approach | |
Gruber, Markus | TC-O2.6 | Trapping and Analyzing Malicious VoIP Traffic Using a Honeynet Approach | |
Guelpeli, Marcus Vinicius | TC-O1.4 | The Process of Summarization in the Pre-Processing Stage in Order to Improve Measurement of Texts When Clustering | |
Guennoun, Mouhcine | TC-O5.1 | Encrypted Processes for Oblivious Data Retrieval | |
Guennoun, Zouhair | TC-O5.1 | Encrypted Processes for Oblivious Data Retrieval | |
Guimaraes, Mario | SC-O1.4 | Forensics and War-Driving on Unsecured Wireless Network | |
H A B C D E F G H I J K L M N O P R S T U V W X Y Z | |||
Habibi Lashkari, Arash | TC-O2.4 | Users' Perceptions on Mobile Devices Security Awareness in Malaysia | |
Haider, Sajjad | MC-O3.3 | Security Threats in Cloud Computing | |
Halboob, Waleed | WA-O3.3 | Quaternary Privacy-Levels Preservation in Computer Forensics Investigation Process | |
Hanafy, Ayman | MD-O3.5 | Immunizing the SAODV Protocol Against Routing Information Disclosure | |
Harati, Ahad | MC-O2.6 | Multiple SEIMCHA; Multiple SEmantic IMage CAPTCHA | |
Haron, Galoh | WA-O2.4 | Extrapolating Security Requirements to an Established Software Process: Version 1.0 | |
Hasna, Hosen | WA-O1.1 | Technologies Enabling Sustainability in the Built Environment | |
Hasselbach, Jens | TC-O3.1 | Access Control and Content Authentication for Hybrid DVB-T2/P2P Broadcasting | |
Heenaye-Mamode Khan, Maleika | MC-O2.5 | Dorsal Hand Vein Biometric Using Independent Component Analysis (ICA) | |
Hempel, Michael | TC-O3.2 | A General Attack Method for Steganography Removal Using Pseudo-CFA Re-interpolation | |
Hettak, Khelifa | TD-O5.3 | Redundant Reader Elimination for Directional Antenna in RFID Systems | |
Hildmann, Hanno | MD-O2.5 | Critical Infrastructure Protection Through Distributed Reactive Demand-Side Management | |
TC-O5.2 | Demand-Side Management for Air Conditioning | ||
TD-O1.2 | Behavioural Game AI - a Theoretical Approach | ||
Hirsch, Benjamin | WA-O1.4 | Education Beyond the Cloud: Anytime-anywhere Learning in a Smart Campus Environment | |
Houssain, Hilal | SC-O1.1 | Hardware Implementations of Elliptic Curve Cryptography in Wireless Sensor Networks | |
SC-O1.2 | Implementation of GF(2m) Elliptic Curve Cryptoprocessor on a Nano FPGA | ||
Hu, Xin | MC-O1.5 | A New Perspective of Network Vulnerability Analysis Using Network Security Gradient | |
MC-O1.2 | Two Algorithms for Network Security Gradient Marking | ||
Huet, Fabrice | TC-O5.5 | Virtual Cloud: Rent Out the Rented Resources | |
Hughes, Glyn | MC-O4.5 | Research, Design and Development Review of the Cloud Computing Management System (Ccms) | |
Hussain, Abir | MC-O4.5 | Research, Design and Development Review of the Cloud Computing Management System (Ccms) | |
I A B C D E F G H I J K L M N O P R S T U V W X Y Z | |||
Iana, Vasile-Gabriel | MC-O3.2 | FPGA Implementation of Cellular Automata Based Encryption Algorithm for Internet Communications | |
Ibrahim, Magdy | MB-O1.2 | Synchronization Recovery of Chaotic Signal Through Imperfect Channel Using Optimization Approach | |
MB-O1.3 | Denoising Algorithm for Noisy Chaotic Signal by Using Wavelet Transform: Comprehensive Study | ||
Imai, Hideki | MC-O4.1 | A Secure Public Cloud Storage System | |
Ionescu, Laurentiu | MD-O2.1 | Reed-Muller Decoder with Associative Memories | |
Ionita, Silviu | MC-O3.2 | FPGA Implementation of Cellular Automata Based Encryption Algorithm for Internet Communications | |
Iqbal, Asif | WA-O3.1 | Digital Forensics Education in UAE | |
Iraqi, Youssef | TC-O2.2 | Mitigation of Spear Phishing Attacks: A Content-Based Authorship Identification Framework | |
TC-O2.3 | Lexical URL Analysis for Discriminating Phishing and Legitimate E-Mail Messages | ||
Irfan, Nazish | TD-O5.3 | Redundant Reader Elimination for Directional Antenna in RFID Systems | |
Ishaque, Nadia | TC-O1.1 | Using Keystroke-Level Model to Analyze IOS Optimization Techniques | |
Ishikawa, Kiyohiko | TD-O4.6 | Identity Management Architecture for Integrated Personalized Service on TV | |
Itani, Wassim | MD-O2.6 | Secure Delay-Tolerant Communications in the Presence of Oppressive Governments | |
J A B C D E F G H I J K L M N O P R S T U V W X Y Z | |||
Jeyalatha, Sivaramakrishnan | TD-O4.1 | Design and Implementation of a Web Structure Mining Algorithm Using Breadth First Search Strategy for Academic Search Application | |
Jones, Andrew | TC-O2.2 | Mitigation of Spear Phishing Attacks: A Content-Based Authorship Identification Framework | |
TC-O2.3 | Lexical URL Analysis for Discriminating Phishing and Legitimate E-Mail Messages | ||
Jung, Markus | TD-O2.2 | Privacy Enabled Web Service Access Control Using SAML and XACML for Home Automation Gateways | |
K A B C D E F G H I J K L M N O P R S T U V W X Y Z | |||
Kassem, Moustafa | SC-O1.5 | FPGA Implementation of High Speed XTS-AES for Data Storage Devices | |
Kastner, Wolfgang | TD-O2.2 | Privacy Enabled Web Service Access Control Using SAML and XACML for Home Automation Gateways | |
Kayssi, Ayman | MD-O2.6 | Secure Delay-Tolerant Communications in the Presence of Oppressive Governments | |
TC-O4.3 | A PUF-Based Ultra-Lightweight Mutual-Authentication RFID Protocol | ||
TC-O4.6 | A Decentralized Energy-Aware Key Management Scheme for Wireless Sensor Networks | ||
Khairallah, Mustafa | SC-O1.5 | FPGA Implementation of High Speed XTS-AES for Data Storage Devices | |
Khan, Shoab | MC-O2.3 | Retinal Recognition: Personal Identification Using Blood Vessels | |
Khater, Ismail | MD-O2.4 | Texture Analysis-Based Image Spam Filtering | |
Khonji, Mahmoud | TC-O2.2 | Mitigation of Spear Phishing Attacks: A Content-Based Authorship Identification Framework | |
TC-O2.3 | Lexical URL Analysis for Discriminating Phishing and Legitimate E-Mail Messages | ||
Kienesberger, Georg | TD-O2.2 | Privacy Enabled Web Service Access Control Using SAML and XACML for Home Automation Gateways | |
Kim, Jung Tae | TC-O1.3 | Design and Implementation of the Geo-Context Engine for Semantic Social Media Service | |
TD-O4.2 | Location-based Personalized Social Media Service for the Smart Phone | ||
Klingbeil, Thomas | TC-O2.1 | A Distributed Virtual Laboratory Architecture for Cybersecurity Training | |
Kobara, Kazukuni | MC-O4.1 | A Secure Public Cloud Storage System | |
Kopsidas, Spyros | MD-O1.2 | Mailbook a Social Network Against Spamming | |
Kuba, Martin | MC-O1.6 | Automated Trust Negotiation in Identity Federations Using OWL-based Abduction of Missing Credentials | |
Kurki, Taina | WA-O2.2 | Systematic Literature Review of Virtual Role | |
L A B C D E F G H I J K L M N O P R S T U V W X Y Z | |||
Laila, Umm-e- | TC-O1.1 | Using Keystroke-Level Model to Analyze IOS Optimization Techniques | |
Lakshmi Eswari, Ponnapu | TC-O1.6 | A Process Framework for Securing an e-Learning Ecosystem | |
Laurent, Maryline | MC-O3.6 | An EAP ID-Based Authentication Method for Wireless Networks | |
Lazzareschi, Pasquale | WA-O1.5 | The use of detection systems to improve the quality of the Italian Public Administration | |
Le Page, Michel | TD-O4.5 | An Agent-Based Modeling Approach for Decision-Making in Gravity Irrigation Systems | |
Lee, HoonKi | TC-O1.3 | Design and Implementation of the Geo-Context Engine for Semantic Social Media Service | |
TD-O4.2 | Location-based Personalized Social Media Service for the Smart Phone | ||
Lee, Jonghoon | TC-O1.3 | Design and Implementation of the Geo-Context Engine for Semantic Social Media Service | |
TD-O4.2 | Location-based Personalized Social Media Service for the Smart Phone | ||
Leida, Marcello | TC-O3.4 | Pro-Active Multi-Agent Recommender System for Travelers | |
Leucker, Martin | WA-O2.3 | An Event Pattern Language for Runtime Monitoring Based on AOP | |
Liao, Junguo | SD-O1.5 | Anonymous Electronic Voting Protocol with Traceability | |
Lim, Hun-Jung | TC-O5.6 | Performace Evaluation of Relative Positioning Based on Low-cost GPS and VANET | |
Ling, Lezhen | SD-O1.5 | Anonymous Electronic Voting Protocol with Traceability | |
Liu, Jie | MC-O1.5 | A New Perspective of Network Vulnerability Analysis Using Network Security Gradient | |
MC-O1.2 | Two Algorithms for Network Security Gradient Marking | ||
Lo, Nai-Wei | TC-O4.1 | Ownership Transfer Protocol for RFID Objects Using Lightweight Computing Operators | |
Loula, Pekka | TD-O3.3 | Network Behaviour Anomaly Detection Using Holt-Winters Algorithm | |
Lozhnikov, Pavel | MC-O2.2 | Handwriting Dynamics as a Means of Authentication | |
Lozi, René | MB-O2.2 | Noise-resisting Ciphering Based on a Chaotic Multi-Stream Pseudo-Random Number Generator | |
M A B C D E F G H I J K L M N O P R S T U V W X Y Z | |||
Ma, Tao | TC-O3.2 | A General Attack Method for Steganography Removal Using Pseudo-CFA Re-interpolation | |
Mahmood, Ahmed | TD-O2.4 | Segmentation Based Encryption Method for Medical Images | |
Malik, Sheheryar | TC-O5.5 | Virtual Cloud: Rent Out the Rented Resources | |
Mamode Khan, Naushad | MC-O2.5 | Dorsal Hand Vein Biometric Using Independent Component Analysis (ICA) | |
Mar, Kheng Kok | MC-O4.3 | Secured Virtual Diffused File System for the Cloud | |
Markscheffel, Bernd | WA-O1.2 | Desktop Search Engines - a State of the Art Comparison | |
Marrington, Andrew | WA-O3.2 | Forensic Artifacts of Facebook's Instant Messaging Service | |
Martin, Andrew | MD-O4.3 | Insiders Analysis in Cloud Computing Focusing on Home Healthcare System | |
Martin, Thomas | SD-O1.1 | On the Security of Inclusion or Omission of MixColumns in AES Cipher | |
Martinelli, Maurizio | WA-O1.5 | The use of detection systems to improve the quality of the Italian Public Administration | |
Marzouqi, Hamad | SC-O1.3 | A Unified Countermeasure Against Side Channel Attacks on Cryptographic RFID | |
Marzouqi, Mohamed | MD-O4.5 | Mobile Arabic Sign Language | |
TD-O1.3 | Evaluating USARsim for Use in Fire Search and Rescue | ||
Maseri, Naimeh | MC-O1.4 | A Survey on Space-Time & High-Rate Redundant | |
Mathew, Suresh | MC-O4.6 | Security Concerns for Cloud Computing in Aircraft Data Networks | |
Mathiak, Brigitte | TD-O4.3 | XSLT Transformation Generating OWL Ontologies Automatically Based on XML Schemas | |
Mazare, Alin | MD-O2.1 | Reed-Muller Decoder with Associative Memories | |
Mehrnejad, Maryam | MC-O2.6 | Multiple SEIMCHA; Multiple SEmantic IMage CAPTCHA | |
MD-O3.6 | A Novel Method in Fuzzy Data Clustering Based on Chaotic PSO | ||
Meinel, Christoph | TC-O2.1 | A Distributed Virtual Laboratory Architecture for Cybersecurity Training | |
Mendonça, Flávio | WA-O1.3 | A-CitizenMobile: A Case Study for Blind Users | |
Meybodi, Mohammad Reza | TD-O1.4 | An Application of Imperialist Competitive Algorithm to Solve the Quadratic Assignment Problem | |
Mi, Bo | MC-O1.1 | A Novel Key Establishment Scheme for Wireless Sensor Networks Based on Complex Network Synchronization | |
Mladenov, Valeri | MD-O3.3 | Synchronization of Sigma Delta Modulators | |
Mohamed, Nader | TC-O1.2 | The Challenges of Arabic Language Use on the Internet | |
Mokhtari, Aicha | WA-O2.5 | Temporal Context in Multilevel Access Control Model | |
Mourad, Azzam | MD-O1.4 | Toward an Abstract Language on Top of XACML for Web Services Security | |
Mukaddam, Ayman | MD-O1.1 | Hop Count Variability | |
N A B C D E F G H I J K L M N O P R S T U V W X Y Z | |||
Naderi, Majid | TC-O4.5 | Vulnerabilities in a New RFID Access Control Protocol | |
TD-O5.2 | Security Analysis of LMAP++, an RFID Authentication Protocol | ||
Namiluko, Cornelius | MC-O4.2 | Dynamics of Trust in Clouds — Challenges and Research Agenda | |
MD-O4.3 | Insiders Analysis in Cloud Computing Focusing on Home Healthcare System | ||
Narayanaswami, Sundaravalli | MD-O3.1 | Mobile Adhoc Networks: A Simulation Based Security Evaluation and Intrusion Prevention | |
Nasir, Qassim | MC-O3.4 | Low Complexity High Security Image Encryption Based on Nested PWLCM Chaotic Map | |
Nassr, Nezar | MC-O4.4 | A Parameterized RBAC Access Control Model for WS-BPEL Orchestrated Composite Web Services | |
Nazemi, Eslam | TC-O3.5 | A Policy Based Access Control Model for Web Services | |
Ng, Jason | WA-O1.4 | Education Beyond the Cloud: Anytime-anywhere Learning in a Smart Campus Environment | |
Nicolas, Sebastien | MD-O2.5 | Critical Infrastructure Protection Through Distributed Reactive Demand-Side Management | |
TC-O5.2 | Demand-Side Management for Air Conditioning | ||
Nogueira, António | TD-O3.2 | A Real-Time Traffic Classification Approach | |
Nogueira, José Luiz | WA-O1.3 | A-CitizenMobile: A Case Study for Blind Users | |
Noponen, Sami | WA-O2.2 | Systematic Literature Review of Virtual Role | |
North, Siobhán | WA-O2.6 | Trust-Based Access Control for XML Databases | |
Noura, Hassan | MC-O3.5 | An Efficient and Secure SPN Cryptosystem Based on Chaotic Control Parameters | |
Noureldin, Sherif | MD-O3.5 | Immunizing the SAODV Protocol Against Routing Information Disclosure | |
O A B C D E F G H I J K L M N O P R S T U V W X Y Z | |||
Oreku, George | MD-O4.6 | Key Complication Procedure In Data Driven Ciphers Based on Controlled Substitution-Permutation Networks | |
Otrok, Hadi | MD-O1.4 | Toward an Abstract Language on Top of XACML for Web Services Security | |
Otsuki, Kazuhiro | TD-O4.6 | Identity Management Architecture for Integrated Personalized Service on TV | |
Ouali, Anis | TD-O1.1 | A MILP Based Design Tool for FTTH Access Networks with Consideration of Demand Growth | |
Ouari, Asma | TC-O3.3 | An Effective Hybrid Thresholding Technique for Degraded Documents Images Binarization | |
Ouda, Abdelkader | TD-O3.1 | Solutions to Security Issues with Legacy Integration of GSM Into UMTS | |
Ouzarf, Mohamed | TD-O2.6 | Encoding Default-Based SELinux-security Policy in Organization-Based Access Control Model | |
P A B C D E F G H I J K L M N O P R S T U V W X Y Z | |||
Paik, Eui-Hyun | TC-O1.3 | Design and Implementation of the Geo-Context Engine for Semantic Social Media Service | |
TD-O4.2 | Location-based Personalized Social Media Service for the Smart Phone | ||
Peng, Dongming | TC-O3.2 | A General Attack Method for Steganography Removal Using Pseudo-CFA Re-interpolation | |
Poon, Kin | TD-O1.1 | A MILP Based Design Tool for FTTH Access Networks with Consideration of Demand Growth | |
R A B C D E F G H I J K L M N O P R S T U V W X Y Z | |||
Radvilavicius, Lukas | TC-O2.1 | A Distributed Virtual Laboratory Architecture for Cybersecurity Training | |
Rahimiasl, Farshad | WA-O2.1 | SeKMAC: A Secure Model for Key Management and Access Control in Cryptographic File System | |
Ren, Zhanrui | MC-O1.5 | A New Perspective of Network Vulnerability Analysis Using Network Security Gradient | |
MC-O1.2 | Two Algorithms for Network Security Gradient Marking | ||
Rocha, Eduardo | TD-O3.2 | A Real-Time Traffic Classification Approach | |
Ruan, Shiou-Huei | TC-O4.1 | Ownership Transfer Protocol for RFID Objects Using Lightweight Computing Operators | |
S A B C D E F G H I J K L M N O P R S T U V W X Y Z | |||
Saab, Salwa Adriana | TC-O4.6 | A Decentralized Energy-Aware Key Management Scheme for Wireless Sensor Networks | |
Saab, Soulaf | MD-O2.6 | Secure Delay-Tolerant Communications in the Presence of Oppressive Governments | |
Sabbari, Mehdi | TC-O3.5 | A Policy Based Access Control Model for Web Services | |
Sabeeh, Ahmed | TC-O2.4 | Users' Perceptions on Mobile Devices Security Awareness in Malaysia | |
Sadok, Hicham | WA-O1.6 | E-banking in Morocco: Study of Some Specifying Factors | |
Saeed, Muhammad Qasim | MD-O2.3 | A Record Composition/Decomposition Attack on the NDEF Signature Record Type Definition | |
Saetent, Jane | MD-O1.5 | A Thin Client Application Development Using OCL and Conceptual Schema | |
Safari, Ali | TD-O1.4 | An Application of Imperialist Competitive Algorithm to Solve the Quadratic Assignment Problem | |
Saffre, Fabrice | MD-O2.5 | Critical Infrastructure Protection Through Distributed Reactive Demand-Side Management | |
TC-O5.2 | Demand-Side Management for Air Conditioning | ||
Safkhani, Masoume | TC-O4.5 | Vulnerabilities in a New RFID Access Control Protocol | |
TD-O5.2 | Security Analysis of LMAP++, an RFID Authentication Protocol | ||
Said, Huwida | SC-O1.4 | Forensics and War-Driving on Unsecured Wireless Network | |
Salah, Khaled | SC-O1.3 | A Unified Countermeasure Against Side Channel Attacks on Cryptographic RFID | |
SD-O1.1 | On the Security of Inclusion or Omission of MixColumns in AES Cipher | ||
MD-O4.4 | Evaluation of Popular Application Sandboxing | ||
MD-O4.2 | Performance Evaluation of Popular Cloud IaaS Providers | ||
Salehi, Mahmood | WA-O3.5 | Performance Assessment of OLSR Protocol Under Routing Attacks | |
Salem Al Mazrouei, Maitha | MD-O3.1 | Mobile Adhoc Networks: A Simulation Based Security Evaluation and Intrusion Prevention | |
Salonen, Jarno | WA-O2.2 | Systematic Literature Review of Virtual Role | |
Salvador, Paulo | TD-O3.2 | A Real-Time Traffic Classification Approach | |
Samavati, Hamed | WA-O3.5 | Performance Assessment of OLSR Protocol Under Routing Attacks | |
Sandhya, Somitra | TD-O5.2 | Security Analysis of LMAP++, an RFID Authentication Protocol | |
Sasada, Koichi | MC-O1.3 | A Decentralized Access Control Mechanism Using Authorization Certificate for Distributed File Systems | |
Schanes, Christian | TC-O2.6 | Trapping and Analyzing Malicious VoIP Traffic Using a Honeynet Approach | |
Scott, Kris | TC-O5.4 | Context-Aware Real-Time Framework for Local Collaboration | |
Seneviratne, Lakmal | TD-O1.3 | Evaluating USARsim for Use in Fire Search and Rescue | |
Serban, Gheorghe | MD-O2.1 | Reed-Muller Decoder with Associative Memories | |
Seyyed Alipour, Hadiseh | TC-O3.5 | A Policy Based Access Control Model for Web Services | |
Shaikh, Farhan | MC-O3.3 | Security Threats in Cloud Computing | |
Shakeri, Hassan | TC-O2.5 | Propagation of Trust and Confidence Using Intervals | |
Shami, Abdallah | TD-O3.1 | Solutions to Security Issues with Legacy Integration of GSM Into UMTS | |
Shamseldin, Ramez | MD-O1.6 | Dynamically Complex System Using Adaptive Simulation for Interconnected Nodes | |
Sharif, Hamid | TC-O3.2 | A General Attack Method for Steganography Removal Using Pseudo-CFA Re-interpolation | |
WA-O1.1 | Technologies Enabling Sustainability in the Built Environment | ||
Shin, SeongHan | MC-O4.1 | A Secure Public Cloud Storage System | |
Shoniregun, Charles | MD-O2.2 | UMTS Security: Enhancement of Identification, Authentication and Key Agreement Protocols | |
Shrestha, Pradhumna | TC-O3.2 | A General Attack Method for Steganography Removal Using Pseudo-CFA Re-interpolation | |
Sihvonen, Hanna-Miina | WA-O2.2 | Systematic Literature Review of Virtual Role | |
Siong, Ng | WA-O2.4 | Extrapolating Security Requirements to an Established Software Process: Version 1.0 | |
Sohizadeh Abyaneh, Mohammad Reza | TD-O5.1 | On the Privacy of Two Tag Ownership Transfer Protocols for RFIDs | |
Southern, Eric | TD-O3.1 | Solutions to Security Issues with Legacy Integration of GSM Into UMTS | |
Steegmans, Eric | MC-O4.4 | A Parameterized RBAC Access Control Model for WS-BPEL Orchestrated Composite Web Services | |
Sun, Yonglin | MC-O1.5 | A New Perspective of Network Vulnerability Analysis Using Network Security Gradient | |
MC-O1.2 | Two Algorithms for Network Security Gradient Marking | ||
Suresh, Nitha | MC-O4.6 | Security Concerns for Cloud Computing in Aircraft Data Networks | |
T A B C D E F G H I J K L M N O P R S T U V W X Y Z | |||
Taber, Stefan | TC-O2.6 | Trapping and Analyzing Malicious VoIP Traffic Using a Honeynet Approach | |
Tahar, Sofiene | TD-O3.6 | Modeling and Verification of Firewall Configurations Using Domain Restriction Method | |
Taheri, Mohammad Moein | TC-O5.3 | 2-Phase Optimization Method for Energy Efficient Scheduling of Virtual Machines in Cloud DataCenters | |
Taheri Hanjani, Zahra | MC-O1.4 | A Survey on Space-Time & High-Rate Redundant | |
Taralova, Ina | MD-O3.3 | Synchronization of Sigma Delta Modulators | |
Tariq, Anam | MC-O2.3 | Retinal Recognition: Personal Identification Using Blood Vessels | |
MC-O2.1 | An Automated System for Fingerprint Classification Using Singular Points for Biometric Security | ||
Tassiulas, Leandros | MD-O1.2 | Mailbook a Social Network Against Spamming | |
Tavares, Thiago | WA-O1.3 | A-CitizenMobile: A Case Study for Blind Users | |
Toreini, Ehsan | MC-O2.6 | Multiple SEIMCHA; Multiple SEmantic IMage CAPTCHA | |
MD-O3.6 | A Novel Method in Fuzzy Data Clustering Based on Chaotic PSO | ||
Trevisan, Daniela | WA-O1.3 | A-CitizenMobile: A Case Study for Blind Users | |
Tripathi, Devendra | TD-O3.5 | A Note on Modified SET Protocol for Mobile Payment | |
Tsenov, Georgi | MD-O3.3 | Synchronization of Sigma Delta Modulators | |
Tutanescu, Ion | MD-O2.1 | Reed-Muller Decoder with Associative Memories | |
Tzouramanis, Theodoros | WA-O3.4 | A Robust Watermarking Scheme for Relational Databases | |
U A B C D E F G H I J K L M N O P R S T U V W X Y Z | |||
Unger, Martin | TD-O2.2 | Privacy Enabled Web Service Access Control Using SAML and XACML for Home Automation Gateways | |
V A B C D E F G H I J K L M N O P R S T U V W X Y Z | |||
Varalis, Argyris | MD-O1.2 | Mailbook a Social Network Against Spamming | |
Vasarelli, Giuseppe | WA-O1.5 | The use of detection systems to improve the quality of the Italian Public Administration | |
Vejkanchana, Nattawut | MD-O1.5 | A Thin Client Application Development Using OCL and Conceptual Schema | |
Vijayakumar, B | TD-O4.1 | Design and Implementation of a Web Structure Mining Algorithm Using Breadth First Search Strategy for Academic Search Application | |
Vladeanu, Calin | MC-O3.5 | An Efficient and Secure SPN Cryptosystem Based on Chaotic Control Parameters | |
W A B C D E F G H I J K L M N O P R S T U V W X Y Z | |||
Walter, Colin | MD-O2.3 | A Record Composition/Decomposition Attack on the NDEF Signature Record Type Definition | |
Wang, Gang | TC-O3.6 | A Framework of VI-based Ranking and Recommendation of Web Services | |
Wang, Yongjun | MC-O1.5 | A New Perspective of Network Vulnerability Analysis Using Network Security Gradient | |
MC-O1.2 | Two Algorithms for Network Security Gradient Marking | ||
Wei, Dong | WA-O2.3 | An Event Pattern Language for Runtime Monitoring Based on AOP | |
Willems, Christian | TC-O2.1 | A Distributed Virtual Laboratory Architecture for Cybersecurity Training | |
Wisnieski, Timothy | WA-O1.1 | Technologies Enabling Sustainability in the Built Environment | |
Wooram, Kim | TC-O4.2 | A Study on RFID Code Structure for Traceability System of Electric Vehicle Batteries | |
WU, Tzong-Chen | TC-O4.1 | Ownership Transfer Protocol for RFID Objects Using Lightweight Computing Operators | |
X A B C D E F G H I J K L M N O P R S T U V W X Y Z | |||
Xian, Zhang | WA-O2.3 | An Event Pattern Language for Runtime Monitoring Based on AOP | |
Y A B C D E F G H I J K L M N O P R S T U V W X Y Z | |||
Yagoub, Mustapha | TD-O5.3 | Redundant Reader Elimination for Directional Antenna in RFID Systems | |
Yahyaoui, Hamdi | MD-O1.4 | Toward an Abstract Language on Top of XACML for Web Services Security | |
Yamamura, Chigusa | TD-O4.6 | Identity Management Architecture for Integrated Personalized Service on TV | |
Yeun, Chan Yeob | SC-O1.6 | The Use of Boolean Functions in Stream Ciphers | |
SC-O1.3 | A Unified Countermeasure Against Side Channel Attacks on Cryptographic RFID | ||
SD-O1.4 | Survey on Certificateless Public Key Cryptography | ||
SD-O1.2 | Study on Secret Sharing Schemes (SSS) and Their Applications | ||
SD-O1.3 | Survey on Computationally Hard Problems and Their Applications to Cryptography | ||
MB-O1.1 | Understanding the Security Challenges of Virtualized Environments | ||
TD-O2.1 | Formal Modeling and Verification of DLK Protocol | ||
Ylinen, Jorma | TD-O3.3 | Network Behaviour Anomaly Detection Using Holt-Winters Algorithm | |
Yoshimura, Hiroyuki | MC-O2.4 | Fingerprint Templates with High Recognition Accuracy and High Security Generated by Discrete Fractional Sine Transform | |
Z A B C D E F G H I J K L M N O P R S T U V W X Y Z | |||
Zain, Syed | TC-O1.1 | Using Keystroke-Level Model to Analyze IOS Optimization Techniques | |
Zamanifar, Kamran | TC-O5.3 | 2-Phase Optimization Method for Energy Efficient Scheduling of Virtual Machines in Cloud DataCenters | |
Zayed, Mohamed | TC-O3.3 | An Effective Hybrid Thresholding Technique for Degraded Documents Images Binarization | |
Zemerly, Mohamed Jamal | MB-O1.1 | Understanding the Security Challenges of Virtualized Environments | |
MD-O4.5 | Mobile Arabic Sign Language | ||
TC-O3.4 | Pro-Active Multi-Agent Recommender System for Travelers | ||
TD-O2.1 | Formal Modeling and Verification of DLK Protocol | ||
Zineddine, Mhamed | TD-O2.3 | Automated Healthcare Information Privacy and Security: UAE Case | |
Zisiadis, Dimitris | MD-O1.2 | Mailbook a Social Network Against Spamming | |
Zulfiqar, Muhammad | WA-O1.1 | Technologies Enabling Sustainability in the Built Environment |