


default search action
9th SIN 2016: Newark, NJ, USA
- Proceedings of the 9th International Conference on Security of Information and Networks, Newark, NJ, USA, July 20-22, 2016. ACM 2016, ISBN 978-1-4503-4764-8
Access Control and Intrusion Detection
- Deepak Subramanian, Guillaume Hiet, Christophe Bidan:
Preventive information flow control through a mechanism of split addresses. 1-8 - Kiran B. Raja, Ramachandra Raghavendra
, Christoph Busch
:
Color Adaptive Quantized Patterns for Presentation Attack Detection in Ocular Biometric Systems. 9-15 - Ussama Yakub
, Vijayalakshmi Atluri
, Jaideep Vaidya:
Efficient Evaluation of Authorizations for Video Data. 16-23 - Ramachandra Raghavendra
, Kiran B. Raja, Christoph Busch
:
Impact of Drug Abuse on Face Recognition Systems: A Preliminary Study. 24-27 - Salem Benferhat, Mouslim Tolba, Karim Tabia, Abdelkader Belkhir
:
Integrating non elementary actions in access control models. 28-31 - Robert Bronte, Hossain Shahriar
, Hisham M. Haddad:
A Signature-Based Intrusion Detection System for Web Applications based on Genetic Algorithm. 32-39
Cloud Security
- Hao Jiang, Ahmed Bouabdallah, Amin Aflatoonian, Jean-Marie Bonnin, Karine Guillouard:
A Secure Multi-Tenant Framework for SDN. 40-44 - Yong-pyo Hong, Youngjun Kim:
A Study on Unified Security Mechanism and Platform for Centralized Business Contents. 45-48 - Sardar Hussain, Richard O. Sinnott
, Ron Poet:
Security-enabled Enactment of Decentralized Workflows. 49-56 - Manel Medhioub, Mohamed Hamdi, Tai-Hoon Kim:
A New Authentication Scheme for Cloud-based Storage Applications. 57-60
Computational Intelligence Techniques in Security
- Safwan Alam, Khalil El-Khatib:
Phishing Susceptibility Detection through Social Media Analytics. 61-64 - Andrey Yu. Chernov, Artem S. Konoplev, Dmitry P. Zegzhda:
Applying Virtualization Technology for the Construction of Trusted Executable Environment. 65-66 - Vladimir Eliseev
, Anastasiya Gurina
:
Algorithms for network server anomaly behavior detection without traffic content inspection. 67-71 - Alexey A. Tselykh, Margarita Knyazeva, Elena Popkova, Antonina Durfee, Alexander N. Tselykh:
An Attributed Graph Mining Approach to Detect Transfer Pricing Fraud. 72-75
Computer Network Defense
- Giovanni Bottazzi, Giuseppe F. Italiano
, Giuseppe Giulio Rutigliano
:
Frequency Domain Analysis of Large-Scale Proxy Logs for Botnet Traffic Detection. 76-80 - Peter D. Zegzhda
, Dmitry P. Zegzhda, Maxim O. Kalinin
, Alexander I. Pechenkin, Alexander Minin, Daria S. Lavrova:
Safe Integration of SIEM Systems with Internet of Things: Data Aggregation, Integrity Control, and Bioinspired Safe Routing. 81-87 - Myria Bouhaddi
, Kamel Adi, Mohammed Said Radjef
:
Evolutionary Game-Based Defense Mechanism in the MANETs. 88-95
Cryptographic Techniques and Key Management
- Sonam Chauhan, Ajay Sharma
:
Fuzzy Commitment Scheme based on Reed Solomon Codes. 96-99 - Ludmila K. Babenko
, Ekaterina Maro
, Maxim Anikeev
:
Modeling of Algebraic Analysis of GOST+ Cipher in SageMath. 100-103 - Evgeniya Ishchukova, Ludmila K. Babenko
, Maxim Anikeev
:
Fast Implementation and Cryptanalysis of GOST R 34.12-2015 Block Ciphers. 104-111 - Alexander G. Chefranov
, Amir Narimani:
Participant Authenticating, Error Detecting, and 100% Multiple Errors Repairing Chang-Chen-Wang's Secret Sharing Method Enhancement. 112-115
Network Security and Protocols
- Alexandr S. Basan
, Elena Basan
, Oleg B. Makarevich
:
Development of the Hierarchal Trust management System for Mobile Cluster-based Wireless Sensor Network. 116-122 - Jagjot Kaur, Dale Lindskog:
An Algorithm to Facilitate Intrusion Response in Mobile Ad Hoc Networks. 124-128 - Manel Elleuchi, Omar Cheikhrouhou
, Abdulfattah Mohammad Obeid, Mohamed Abid:
An Efficient Secure scheme for Wireless Sensor Networks. 129-132 - Mohammadreza Soltan Aghaei, Elham Zamani:
The Improved Protocols Based on AODV in terms of Quality and Security in MANET Network. 133-135
Security Protocols, Models, Trust and Privacy
- Martin Stokkenes, Ramachandra Raghavendra, Christoph Busch
:
Biometric Authentication Protocols on Smartphones: An Overview. 136-140 - Mouna Jouini, Latifa Ben Arfa Rabai
:
A Scalable Threats Classification Model in Information Systems. 141-144 - Goutham Reddy Alavalapati
, Eun-Jun Yoon, Ashok Kumar Das, Kee-Young Yoo:
An Enhanced Anonymous Two-factor Mutual Authentication with Key-agreement Scheme for Session Initiation Protocol. 145-149 - Kun He, Christophe Bidan, Gaëtan Le Guelvouit:
Experimentation of Privacy Protection for JPEG Contents on Image-Sharing Platforms. 150-157 - Roger Jardí-Cedó, Macià Mut Puigserver, Jordi Castellà-Roca
, Magdalena Payeras-Capellà
, Alexandre Viejo
:
Privacy-preserving Electronic Road Pricing System for Multifare Low Emission Zones. 158-165 - Xavier J. A. Bellekens
, Greig Paul, Christos Tachtatzis
, James Irvine
, Robert C. Atkinson
:
Strategies for Protecting Intellectual Property when Using CUDA Applications on Graphics Processing Units. 166-173 - Hye-Young Kim:
A Study of a Smart IT Convergence Framework in IoT. 174-175 - Vladimir I. Vorobiev, Elena L. Evnevich, Roza R. Fatkieva, Ludmila N. Fedorchenko
, Dmitriy K. Levonevskiy:
Criteria and Indices of Computer Network Protection. 176-177

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.