default search action
IAS 2011: Melacca, Malaysia
- 7th International Conference on Information Assurance and Security, IAS 2011, Melacca, Malaysia, December 5-8, 2011. IEEE 2011, ISBN 978-1-4577-2154-0
- Ravi Sankar Veerubhotla, Ashutosh Saxena:
A DRM framework towards preventing digital piracy. 1-6 - Mohd Zalisham Jali, Steven Furnell, Paul Dowland:
Multifactor graphical passwords: An assessment of end-user performance. 7-12 - Fusun Citak Er, Ensar Gul:
Comparison of digital audio watermarking techniques for the security of VOIP communications. 13-18 - Mithun Paul, Nitin Singh Chauhan, Ashutosh Saxena:
A security analysis of smartphone data flow and feasible solutions for lawful interception. 19-24 - Nurul Haszeli Ahmad, Syed Ahmad Aljunid, Jamalul-lail Ab Manan:
Understanding vulnerabilities by refining taxonomy. 25-29 - Yadollah Zamanidoost, Antonio Navarro, Zhinoos Razavi Hesabi, Nima Rahimi Froshani, Fatemeh Farnia:
Robust video watermarking against JPEG compression in 3D-DWT domain. 30-34 - Azyan Yusra Kapi, Subariah Ibrahim:
Fixed size encoding scheme for software watermarking. 35-39 - Wun-She Yap, Sze Ling Yeo, Chee Hoo Yian:
Cryptanalysis of the full CHAIN cipher. 40-45 - Nik Azura Nik Abdullah, Norul Hidayah Lot Ahmad Zawawi, Hazlin Abdul Rani:
Analysis on Lightweight Block Cipher, KTANTAN. 46-51 - Andrew M. Colarik, Lech J. Janczewski:
Developing a grand strategy for Cyber War. 52-57 - Sofia Najwa Ramli, Rabiah Ahmad:
Surveying the Wireless Body Area Network in the realm of wireless communication. 58-61 - Ali Dehghantanha, Nur Izura Udzir, Ramlan Mahmod:
Towards data centric mobile security. 62-67 - Adnan Ahmad, Brian Whitworth:
Distributed access control for social networks. 68-73 - Yuxin Meng, Lam-for Kwok:
Adaptive context-aware packet filter scheme using statistic-based blacklist generation in network intrusion detection. 74-79 - Muhammad Najmi Ahmad Zabidi, Mohd Aizaini Maarof, Anazida Zainal:
Ensemble based categorization and adaptive model for malware detection. 80-85 - Mohammad Ali Arsyad bin Mohd Shuhaimi, Zaheera binti Zainal Abidin, Irda binti Roslan, Syarulnaziah binti Anawar:
The new services in Nagios: Network bandwidth utility, email notification and sms alert in improving the network performance. 86-91 - Sui-Guan Teo, Kenneth Koon-Ho Wong, Ed Dawson, Leonie Simpson:
State convergence and the effectiveness of time-memory-data tradeoffs. 92-97 - Mohd Faizal Mubarak, Jamalul-lail Ab Manan, Saadiah Yahya:
Trusted anonymizer-based RFID system with integrity verification. 98-103 - Haider Ismael Shahadi, Razali Jidin:
High capacity and inaudibility audio steganography scheme. 104-109 - Tee Wilkin, Shih Yin Ooi:
State of the art: Signature verification system. 110-115 - Siddharth Malik, Anjali Sardana:
Secure Vault: A privacy preserving reliable architecture for Secure Social Networking. 116-121 - Thomas Demongeot, Eric Totel, Yves Le Traon:
Preventing data leakage in service orchestration. 122-127 - Mehdi Salkhordeh Haghighi, Abedin Vahedian, Hadi Sadoghi Yazdi:
Extending Dempster Shafer method by multilayer decision template in classifier fusion. 128-133 - Fatin Norsyafawati Mohd Sabri, Norita Md Norwawi, Kamaruzzaman Seman:
Hybrid of rough set theory and Artificial Immune Recognition System as a solution to decrease false alarm rate in intrusion detection system. 134-138 - Muhammad Khurram Khan, Pei-wei Tsai, Jeng-Shyang Pan, Bin-Yih Liao:
Biometric driven initiative system for passive continuous authentication. 139-144 - Reine Lundin, Stefan Lindskog:
Guesswork changes in multi-processor attacks. 145-150 - Zaid Ahmad, Kamarularifin Abd. Jalil, Jamalul-lail Ab Manan:
Black hole effect mitigation method in AODV routing protocol. 151-155 - Sherif Saad, Issa Traoré:
A semantic analysis approach to manage IDS alerts flooding. 156-161 - Atta-ur-Rahman, Muhammad Tahir Naseem, Ijaz Mansoor Qureshi, Muhammad Zeeshan Muzaffar:
Reversible watermarking using Residue Number System. 162-166 - Hamid Reza Taremian, Mahdi Pakdaman Naeini:
Hybrid Intelligent Decision Support System for credit risk assessment. 167-172 - Farid Daryabar, Ali Dehghantanha, Nur Izura Udzir:
Investigation of bypassing malware defences and malware detections. 173-178 - Hajar Al-Hujailan, Mznah Al-Rodhaan, Abdullah Al-Dhelaan:
A cooperative intrusion detection scheme for clustered mobile ad hoc networks. 179-185 - Dongyang Xu, Zhi Tang, Yinyan Yu:
An extended rights expression model supporting dynamic digital rights management. 186-191 - Zaiton Muda, Warusia Yassin, Md Nasir Sulaiman, Nur Izura Udzir:
Intrusion detection based on k-means clustering and OneR classification. 192-197 - Haitham S. Al-Sinani:
Integrating OAuth with Information card systems. 198-203 - Ahmad Jafarabadi, Mohammad Abdollahi Azgomi:
An SIR model for the propagation of topology-aware active worms considering the join and leave of hosts. 204-209 - Sairul Izwan Safie, John J. Soraghan, Lykourgos Petropoulakis:
Pulse Active Mean (PAM): A PIN supporting feature extraction algorithm for doubly secure authentication. 210-214 - Moussa Ouedraogo, Haralambos Mouratidis, Artur Hecker, Cédric Bonhomme, Djamel Khadraoui, Eric Dubois, David Preston:
A new approach to evaluating security assurance. 215-221 - Mohammad Javad Khosravi, Samaneh Ghandali:
A secure joint wavelet based steganography and secret sharing method. 222-227 - Mehiar Dabbagh, Ali J. Ghandour, Kassem Fawaz, Wassim El-Hajj, Hazem M. Hajj:
Slow port scanning detection. 228-233 - Gou Hosoya, Hideki Yagi, Manabu Kobayashi, Shigeichi Hirasawa:
On the capacity of fingerprinting codes against unknown size of colluders. 234-239 - Subhranil Som, Niladri Shekhar Chatergee, J. K. Mandal:
Key based bit level genetic cryptographic technique (KBGCT). 240-245 - Abdul Rahman Ahlan, Muharman Lubis:
Information security awareness in university: Maintaining learnability, performance and adaptability through roles of responsibility. 246-250 - Mohammad Uruj Jaleel, Mohammad Asghar Jamil, Kashiful Haq:
Energy efficient delay leap routing in multicast using feed back neural networks. 251-255 - Adnan Ahmad, Brian Whitworth:
Access control taxonomy for social networks. 256-261 - Sheng Li, Alex C. Kot:
A novel system for fingerprint privacy protection1. 262-266 - Herman Isa, Iskandar Bahari, Hasibah Sufian, Muhammad Reza Z'aba:
AES: Current security and efficiency analysis of its alternatives. 267-274 - Sei-ichiro Kamata:
A common key encryption algorithm using N-dimensional Hilbert curves. 275-279 - H. H. Weerasena, P. B. S. Bandara, J. R. B. Kulasekara, B. M. B. Dassanayake, U. A. A. Niroshika, P. R. Wijenayake:
Strategic approach for high performance object tracking in a network of surveillance cameras. 280-285 - Ahmad Kamran Malik, Schahram Dustdar:
Enhanced sharing and privacy in distributed information sharing environments. 286-291 - Abidalrahman Moh'd, Yaser Jararweh, Lo'ai Ali Tawalbeh:
AES-512: 512-bit Advanced Encryption Standard algorithm design and evaluation. 292-297 - Chandrashekhar Meshram, Suchitra A. Meshram:
An identity based beta cryptosystem. 298-303 - Elham Nosrati, S. Navid Hashemi Tonekaboni, S. Majid Hashemi Tonekaboni:
Examining CSCF entity attacks scenarios and vulnerabilities in IP Multimedia Subsystems. 304-307 - Farshad Amin, Amir Hossein Jahangir:
Time and energy cost analysis of Kerberos security protocol in Wireless Sensor Networks. 308-313 - Simona Samardjiska, Yanling Chen, Danilo Gligoroski:
Construction of Multivariate Quadratic Quasigroups (MQQs) in arbitrary Galois fields. 314-319 - Federico Maggi, Simone Gasparini, Giacomo Boracchi:
A fast eavesdropping attack against touchscreens. 320-325 - Mohtashim Baqar, Sohaib Azhar, Zeeshan Iqbal, Irfan Shakeel, Laeeq Ahmed, Muhammad Moinuddin:
Efficient iris recognition system based on dual boundary detection using robust variable learning rate Multilayer Feed Forward neural network. 326-330 - Aly Mohamed El-Semary, Mohamed Mostafa A. Azim:
A two-tier energy-efficient secure routing protocol for Wireless Sensor Networks. 331-337 - Giampaolo Bella, Denis Butin, David Gray:
Holistic analysis of mix protocols. 338-343 - Kuan Jen Lin, Chih Ping Weng, Tsai Kun Hou:
Enhance hardware security using FIFO in pipelines. 344-349 - Murad A. Rassam, Mohd Aizaini Maarof, Anazida Zainal:
A novel intrusion detection framework for Wireless Sensor Networks. 350-353 - Erwin Hidayat, Nur A. Fajrian, Azah Kamilah Muda, Yun-Huoy Choo, Sabrina Ahmad:
A comparative study of feature extraction using PCA and LDA for face recognition. 354-359 - Karima Ait Saadi, Ahmed Bouridane, Abdelrazek Guessoum:
H.264/AVC digital fingerprinting based on content adaptive embedding. 360-365 - Luca Caviglione, Alessio Merlo, Mauro Migliardi:
What is Green Security? 366-371 - Rasib Hassan Khan, Jukka Ylitalo, Abu Shohel Ahmed:
OpenID authentication as a service in OpenStack. 372-377 - Massimiliano Rak, Loredana Liccardo, Rocco Aversa:
A SLA-based interface for security management in cloud and GRID integrations. 378-383
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.