default search action
WorldCIS 2011: London, United Kingdom
- 2011 World Congress on Internet Security, WorldCIS 2011, London, UK, February 21-23, 2011. IEEE 2011, ISBN 978-1-4244-8879-7
Session 1: Internet Security
- Sascha Mühlbach, Andreas Koch:
A novel network platform for secure and efficient malware collection based on reconfigurable hardware logic. 9-14 - Jie Wang, Raphael C.-W. Phan, John N. Whitley, David J. Parish:
DDoS attacks traffic and Flash Crowds traffic simulation with a hardware test center platform. 15-20 - Nuno Teodoro, Carlos Serrão:
Assessing the Portuguese Web applications security. 21-26
Session 2: Middleware support for networking
- Zubair A. Baig, AbdulRahman Shaheen, Radwan E. Abdel-Aal:
An AODE-based intrusion detection system for computer networks. 28-35 - Umar Manzoor, Janita Irfan, Samia Nefti:
Autonomous agents for Testing and Verification of Softwares after Deployment over Network. 36-41 - Ryan Wilson, Charlie Obimbo:
Self-organizing feature maps for User-to-Root and Remote-to-Local network intrusion detection on the KDD Cup 1999 dataset. 42-47
Session 3: Security, trust and privacy
- Yulin Wang, Yixin Chen, Jing Feng, Hong Ding, Wenjia Ding:
Internet-based management and consumption of digital assets. 49-53 - Hao Zhao, Sead Muftic:
The concept of Secure Mobile Wallet. 54-58 - Massoud Masoumi, Soheil Mohammadi:
A new and efficient approach to protect AES against differential power analysis. 59-66
Session 4: Cryptography
- Huiyun Li, Keke Wu, Guoqing Xu, Hai Yuan, Peng Luo:
Simple power analysis attacks using chosen message against ECC hardware implementations. 68-72 - Moncef Amara, Amar Siad:
Hardware implementation of arithmetic for elliptic curve cryptosystems over GF(2m). 73-78 - Hiroyuki Tanaka, Shoichi Saito, Hiroshi Matsuo:
Removing directory servers from anonymous communication systems using ID-Based Encryption to improve scalability. 79-84
Session 5: Data Security
- Abdul Ghafoor Abbasi, Sead Muftic, Shahzad Mumtaz:
Security extensions of Windows environment based on FIPS 201 (PIV) smart card. 86-92 - Lisha Chen-Wilson, Andrew M. Gravell, David Argles:
Giving you back control of your data digital signing practical issues and the eCert solution. 93-99 - James Alexander George Hamilton, Sebastian Danicic:
A survey of static software watermarking. 100-107
Session 6: Software Architectures
- Assad Ali, Pavol Zavarsky, Dale Lindskog, Ron Ruhl:
A software application to analyze the effects of temporal and environmental metrics on overall CVSS v2 score. 109-113 - Paolo Falcarin, Stefano Di Carlo, Alessandro Cabutto, Nicola Garazzino, Davide Barberis:
Exploiting code mobility for dynamic binary obfuscation. 114-120 - Woo Joon Han, Il Song Han:
Bio-inspired visual user detection for intelligent interface. 121-123
Session 7: Data Security
- Thomas Weigold, Alain P. Hiltgen:
Secure confirmation of sensitive transaction data in modern Internet banking services. 125-132 - Feng Zhang, Sead Muftic, Gernot Schmoelzer:
Secure service-oriented architecture for mobile transactions. 133-138 - Abdullah M. Alnajim:
High level anti-phishing countermeasure: A case study. 139-144
Session 8: Internet Security
- Stephen Groat, Matthew Dunlop, Randy C. Marchany, Joseph G. Tront:
What DHCPv6 says about you. 146-151 - Tatsuya Minegishi, Ayahiko Niimi:
Detection of fraud use of credit card by extended VFDT. 152-159 - Mohamad Ibrahim Ladan:
Web services: Security challenges. 160-163
Session 9: Broadband access technologies
- Subhasish Mazumdar, Anand Paturi:
Tamper-resistant database logging on mobile devices. 165-170 - Yusnani Mohd Yussoff, Habibah Hashim:
IBE-Trust: A security framework for Wireless Sensor Networks. 171-176 - Marialisa Scatà, Aurelio La Corte:
Security analysis and countermeasures assessment against spit attacks on VoIP systems. 177-183
Session 10: Future Internet Design and Applications
- Cristina-Elena Vintila:
Secure application access to IMS via 4G GAA architecture. 185-191 - Abdalhossein Rezai, Parviz Keshavarzi:
High-performance modular exponentiation algorithm by using a new modified modular multiplication algorithm and common-multiplicand-multiplication method. 192-197 - Michele Schiano di Zenise, Andrea Vitaletti, David Argles:
A user-centric approach to eCertificate for electronic identities (eIDs) management in mobile environment. 198-203
Session 11: Security, Trust and Privacy
- Dharmalingam Ramalingam, Arun Nagarle Shivashankarappa:
Effective server virtualization with enhanced security strategy for large organization. 205-209 - Elahe Borghei, Reza Azmi, Alireza Ghahremanian, Hamed Nemati:
Virtual machine based security architecture. 210-215 - Corrado Ronchi, Akmal Khodjanov, Muzaffar Mahkamov, Shukhrat Zakhidov:
Security, privacy and efficiency of Internet banking transactions. 216-222 - Ahmad Almulhem:
A graphical password authentication system. 223-225
Session 12: Cryptography
- Yuechuan Wei, Chao Li, Bing Sun:
Related-key impossible differential cryptanalysis on Crypton and Crypton v1.0. 227-232 - Petre Anghelescu:
Encryption algorithm using Programmable Cellular Automata. 233-239 - Arshad Ali:
New most efficient state recovery attacks on an eSTREAM candidate F-FCSR-H v2 and F-FCSR-H stream ciphers. 240-246
Session 13: Data Security
- Funminiyi Olajide, Nick Savage:
On the extraction of forensically relevant information from physical memory. 248-252 - K. Chitra, Ali Al-Dahoud:
Concurrency control and consistency maintenance with DTD and SSM for weakly connected environments. 253-257 - Ibrahim Kamel, Kareem Kamel:
Toward protecting the integrity of relational databases. 258-261
Session 14: Internet Security
- Simin Ghesmati, Majid Sate, Abbas Asosheh:
A 2-level model for e-commerce security. 263-268 - Taiwo Ayodele, Charles A. Shoniregun, Galyna A. Akmayeva:
Security review of email summarization systems. 269-271 - Daniel Caragata, Safwan El Assad, Ion Tutanescu, Charles A. Shoniregun, Galyna A. Akmayeva:
Security of mobile Internet access with UMTS/HSDPA/LTE. 272-276 - Hatem Fawzi Halaoui:
E-STOS: Extending Smart Traffic Online System with traffic laws time delays. 277-282
Session 15: Internet Security and Soft ware Architecture
- Sara Jeza Alotaibi, David Argles:
FingerID: A new security model based on fingerprint recognition for distributed systems. 284-289 - Constantin Anton, Cosmin Stirbu, Romeo-Vasile Badea:
Automatic hand writer identification using the feed forward neural networks. 290-293
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.