The survey of cache management in the shared storage environment (Englisch)
- Neue Suche nach: Xu, Junfeng
- Neue Suche nach: Sun, Bo
- Neue Suche nach: Si, Chengxiang
- Neue Suche nach: Xu, Junfeng
- Neue Suche nach: Sun, Bo
- Neue Suche nach: Si, Chengxiang
In:
2012 International Conference for Internet Technology and Secured Transactions
;
139-142
;
2012
- Aufsatz (Konferenz) / Elektronische Ressource
-
Titel:The survey of cache management in the shared storage environment
-
Beteiligte:
-
Erschienen in:
-
Verlag:
- Neue Suche nach: IEEE
-
Erscheinungsdatum:01.12.2012
-
Format / Umfang:264739 byte
-
ISBN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Datenquelle:
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
[Front cover]| 2012
- 2
-
International Conference for Internet Technology and Secured Transactions (ICITST-2012) [Copyright notice]| 2012
- 3
-
Welcome messageSavage, Nick / El Assad, Safwan / Shoniregun, Charles A. et al. | 2012
- 4
-
Contents page| 2012
- 15
-
Committees| 2012
- 19
-
Keynote speakers| 2012
- 20
-
Keynote speaker 1 [Open Learning and the 3D Web: Applications and Challenges]| 2012
- 21
-
Keynote speaker 2 [Cybercrime and mobile devices]| 2012
- 22
-
Keynote speaker 3 [Entropy Maximisation, Queueing and Performance Related Security Trade-offs]| 2012
- 23
-
Keynote speaker 4: RFID security and cryptography 2012 (RISC'12) workshop [Smart cards, Secure Elements and NFC Security - The Status Quo]| 2012
- 24
-
Invited speaker: RFID security and cryptography 2012 (RISC'12) workshop [Chaos Based Information Hiding and Security]| 2012
- 25
-
Workshops| 2012
- 26
-
Workshop 1 (part I): International workshop on information security, theory and practice (ISTP-2012)| 2012
- 27
-
Assessing the security of subsampling process using modified EKF and nonlinear least squares methodsCot, Lea D. / Lozi, Rene et al. | 2012
- 32
-
Dynamic routing in covert channel overlays based on control protocolsBacks, Peter / Wendzel, Steffen / Keller, Jorg et al. | 2012
- 40
-
How to guarantee secured transactions with QoS and real-time constraintsChetto, Maryline / Noura, Hassan / El Assad, Safwan / Farajallah, Mousa et al. | 2012
- 45
-
Workshop 1 (part II): International workshop on information security, theory and practice (ISTP-2012)| 2012
- 46
-
Improved blind DCT watermarking by using chaotic sequencesTataru, R. L. / El Assad, S. / Deforges, O. et al. | 2012
- 51
-
Validating the existence of watermarks on digital images using a mobile phoneDelgado-Guillen, Lorenzo Antonio / Garcia-Hernandez, Jose Juan / Torres-Huitzil, Cesar et al. | 2012
- 56
-
Chaotic generator synthesis: Dynamical and statistical analysisTaralova, Ina / Lozi, Rene / El Assad, Safwan et al. | 2012
- 60
-
A new method to improve cryptographic properties of chaotic discrete dynamical systemsCristina, Dascalescu Ana / Eugen, Boriga Radu et al. | 2012
- 66
-
Workshop 2 (part I): The 4th international workshop on RFID security and cryptography 2012 (RISC'12)| 2012
- 67
-
Chaos Based Information Hiding and SecurityEl Assad, Safwan et al. | 2012
- 73
-
Workshop 2 (part II): The 4th international workshop on RFID security and cryptography 2012 (RISC'12)| 2012
- 74
-
Detecting counterfeit-money using RFID-enabled mobile devicesEldefrawy, Mohamed Hamdy / Khan, Muhammad Khurram et al. | 2012
- 80
-
Vulnerability analysis of two ultra-lightweight RFID authentication protocols: RAPP and gossamerTaqieddin, Eyad / Sarangapani, Jagannathan et al. | 2012
- 87
-
A new lightweight hybrid cryptographic algorithm for the internet of thingsShemaili, Mouza Bani / Yeun, Chan Yeob / Mubarak, Khalid / Zemerly, Mohamed Jamal et al. | 2012
- 93
-
Workshop 3: The 3rd international workshop on ubiquitous computing security issues (UCSI'12)| 2012
- 94
-
DeployinG Computer-Based Learning under suboptimal conditionsMselle, Leonard J. / Kondo, Tabu S. et al. | 2012
- 99
-
Examining ubiquitous security-capital issues in implementing a Campus-System-as-a-Service(CSaaS) model in the cloud computing age: Case study sub-Saharan regionMbale, Jameson / Mufeti, Kauna / Hamutenya, Victor et al. | 2012
- 105
-
Investigation of cultural aspects within information systems security researchConnolly, Lena / Lang, Michael et al. | 2012
- 112
-
Enhancing privacy in social applications with the notion of group contextFranz, Elke / Springer, Thomas / Harder, Norbert et al. | 2012
- 119
-
Sessions| 2012
- 120
-
Session 1: Internet applications and technology| 2012
- 121
-
User-intent custom adaptive search service based on ontology and similar-word retrieval algorithm compositionKim, Sukyoung / Ahn, Kihong et al. | 2012
- 127
-
A web tool for monitoring HTTP asynchronous method invocationsJaimez-Gonzalez, Carlos R. / Luna-Ramirez, Wulfrano A. / Lucas, Simon M. et al. | 2012
- 133
-
A shared secret security broker implementation in a commercial contextGao, Tom Yuan / Kearney, David et al. | 2012
- 139
-
The survey of cache management in the shared storage environmentXu, Junfeng / Sun, Bo / Si, Chengxiang et al. | 2012
- 143
-
Session 2: Ubi/cloud computing| 2012
- 144
-
Evaluation and brokering of service level agreements for negotiation of cloud infrastructuresAmato, Alba / Di Martino, Beniamino / Venticinque, Salvatore et al. | 2012
- 150
-
Secure cross-cloud single sign-on (SSO) using eIDsZwattendorfer, Bernd / Tauber, Arne et al. | 2012
- 156
-
Risk based SLA management in clouds: A legal perspectiveKirkham, Tom / Djemame, Karim / Kiran, Mariam / Jiang, Ming / Armstrong, Django / Kousiouris, George / Vafiadis, George / Evangelinou, Athanasia et al. | 2012
- 161
-
MedCloud: Healthcare cloud computing systemSobhy, Dalia / El-Sonbaty, Yasser / Abou Elnasr, Mohamad et al. | 2012
- 167
-
Session 3: Information security| 2012
- 168
-
A scheme for the generation of strong cryptographic key pairs based on ICMetricsTahir, Ruhma / Hu, Huosheng / Gu, Dongbing / McDonald-Maier, Klaus / Howells, Gareth et al. | 2012
- 175
-
Implementation of Convolutional codes on FPGAGhauri, Sajjad Ahmed / Humayun, Hasan / ul Haq, Muhammad Ehsan / Sohail, Farhan et al. | 2012
- 179
-
QR decomposition-based cryptography: Via image generation (QR-CRYPT)Qayum, Abdul / Kumar, Prakash et al. | 2012
- 185
-
Trusted Location Based ServicesTeufl, Peter / Zefferer, Thomas / Kreuzhuber, Sandra / Lesjak, Christian M. et al. | 2012
- 193
-
Session 4: Cloud security| 2012
- 194
-
Reliability aware scheduling in cloud computingMalik, Sheheryar / Huet, Fabrice / Caromel, Denis et al. | 2012
- 202
-
Usage control in cloud systemsLazouski, Aliaksandr / Mancini, Gaetano / Martinelli, Fabio / Mori, Paolo et al. | 2012
- 208
-
Cloud security: Can the cloud be secured?Karnad, Kiran / Nagenthram, Saravanan et al. | 2012
- 211
-
Detecting anomalies in IaaS environments through virtual machine host system call analysisAlarifi, Suaad S. / Wolthusen, Stephen D. et al. | 2012
- 219
-
Session 5: Internet applications and technology| 2012
- 220
-
Usability of profile based student authentication and traffic light system in online examinationsUllah, Abrar / Xiao, Hannan / Lilley, Mariana / Barker, Trevor et al. | 2012
- 226
-
How effective is social media advertising? A study of Facebook Social AdvertisementsCarmichael, Dawn / Cleave, David et al. | 2012
- 230
-
Application of semantic search in Idea Management SystemsPoveda, Geovanny / Westerski, Adam / Iglesias, Carlos A. et al. | 2012
- 237
-
Emergency care in situations of natural disaster: A Multi-Agent approachIzida, Aline / da Rocha Tedrus, Thiago / das Gracas Bruno Marietto, Maria / Steinberger-Elias, Margarethe / Botelho, Wagner Tanaka / dos Santos Franca, Robson et al. | 2012
- 243
-
Session 6: Information security| 2012
- 244
-
Modelsim simulation for real-time stereo matching using DP algorithmHa, JeongMok / Jeong, Hong et al. | 2012
- 249
-
MANET secure key exchange using spraying diffie-hellman algorithmStulman, Ariel / Lahav, Jonathan / Shmueli, Avraham et al. | 2012
- 253
-
Smart authentication for real-time business process monitoringAlMahmoud, Abdelrahman / Colombo, Maurizio / Yeun, Chan Yeob / Al-Muhairi, Hassan et al. | 2012
- 259
-
On the security and usability of dual credential authentication in UK online bankingJust, Mike / Aspinall, David et al. | 2012
- 265
-
Forensics data acquisition methods for mobile phonesAlghafli, Khawla Abdulla / Jones, Andrew / Martin, Thomas Anthony et al. | 2012
- 270
-
Session 7: Multimedia and web services| 2012
- 271
-
Traditional musical Virtual Reality on M-learningChaisanit, Settachai / Hongthong, Napatwadee Sangboonnum / Suksakulchai, Surachai / Pinpat, Chuchart et al. | 2012
- 275
-
High volume web service resource consumptionOlmsted, Aspen / Farkas, Csilla et al. | 2012
- 281
-
Access control for a Smart Grid SOAJung, Markus / Hofer, Thomas / Dobelt, Susen / Kienesberger, Georg / Judex, Florian / Kastner, Wolfgang et al. | 2012
- 288
-
Ontology based image retrievalManzoor, Umar / Ejaz, Naveed / Akhtar, Nadeem / Umar, Muhammad / Khan, M. Shoaib / Umar, Hafsa et al. | 2012
- 294
-
Security of audio secret sharing scheme encrypting audio secretsYoshida, Kotaro / Watanabe, Yodai et al. | 2012
- 296
-
Session 8: Internet applications and technology| 2012
- 297
-
The mobileak project: Forensics methodology for mobile application privacy assessmentStirparo, Pasquale / Kounelis, Ioannis et al. | 2012
- 304
-
Determinants of student performance in advanced programming courseChen, Y.Y. / Mohd Taib, Shakirah / Che Nordin, Che Sarah et al. | 2012
- 308
-
Ensuring software safety in safety critical domainsBahig, Ghada Moussa / El-Kadi, Amr et al. | 2012
- 313
-
Data integration of electronic health records using artificial neural networksGul, Omniyah / Al-Qutayri, Mahmoud / Vu, Quang Hieu / Yeun, Chan Yeob et al. | 2012
- 318
-
Two novel server-side attacks against log file in Shared Web Hosting serversMirheidari, Seyed Ali / Arshad, Sajjad / Khoshkdahan, Saeidreza / Jalili, Rasool et al. | 2012
- 324
-
Session 9: Information security| 2012
- 325
-
Re-engineering of web reverse proxy with shibboleth authenticationHaron, Galoh Rashidah / Maniam, Dharmadharshni / Sadasivam, Vijayakumari / Loon, Wong Hon et al. | 2012
- 331
-
Proposal of a cryptography method using gray scale digital imagesGadelha, M. Y. R. / Costa Filho, C. F. F. / Costa, M. G. F. et al. | 2012
- 336
-
Evaluation of practical trust based access control for XML databasesFarooqi, Norah / North, Siobhan et al. | 2012
- 341
-
Issues in inter-organisational encryption systems: The problem with FedLinkMiiller, Greg et al. | 2012
- 347
-
Session 10: Internet applications and technology| 2012
- 348
-
Assessing the security of Node.js platformOjamaa, Andres / Duuna, Karl et al. | 2012
- 356
-
Quantifying the impact on distrust of e-commerce trust factors: A non-parametric studyAndrade, Ana A. / Lopes, Vitor V. / Novais, Augusto Q. et al. | 2012
- 362
-
Uncertainty with STOS: Intelligent solution for uncertain navigation problemsHalaoui, Hatem Fawzi et al. | 2012
- 368
-
Learning from oversight by telecommunications regulatory agenciesRixon, Daphne / Furey, Mary et al. | 2012
- 375
-
Session 11: Cloud security| 2012
- 376
-
A trust based model for federated identity architecture to mitigate identity theftGhazizadeh, Eghbal / Zamani, Mazdak / Ab Manan, Jamalul-lail / Khaleghparast, Reza / Taherian, Ali et al. | 2012
- 382
-
A light weight centralized file monitoring approach for securing files in Cloud environmentGupta, Sanchika / Sardana, Anjali / Kumar, Padam et al. | 2012
- 388
-
Evaluating security and privacy in cloud computing services: A Stakeholder's perspectiveAbuhussein, Abdullah / Bedi, Harkeerat / Shiva, Sajjan et al. | 2012
- 396
-
Improvement of multi-user searchable encrypted data schemeTran Thao Phuong, / Omote, Kazumasa / Nguyen Gia Luyen, / Nguyen Dinh Thuc, et al. | 2012
- 402
-
Session 12: Information security| 2012
- 403
-
Correlated node behavior in wireless ad hoc networks: An epidemic modelAzni, A.H / Ahmad, Rabiah / Mohamad Noh, Zul Azri et al. | 2012
- 411
-
Forensics filesystem with cluster-level identifiers for efficient data recoveryAlhussein, Mohammed / Srinivasan, Avinash / Wijesekera, Duminda et al. | 2012
- 416
-
A round level approach to fault detection in PP-2 symmetric block cipherIdzikowska, Ewa et al. | 2012
- 420
-
Feedback manipulation flooding attack: Feasibility evaluation and impact quantification on Stream Control Transmission ProtocolKumar, V Anil / Das, Debabrata et al. | 2012
- 426
-
Session 13: Information security| 2012
- 427
-
ERASE- entropy-based sanitization of sensitive data for privacy preservationMedsger, Jeffrey / Srinivasan, Avinash et al. | 2012
- 433
-
Bootstrapping body sensor networks using human controlled LED-camera channelsHuang, Xin / Guo, Shangyuan / Chen, Bangdao / Roscoe, A. W. et al. | 2012
- 439
-
Secure mobile social networks using USIM in a closed environmentNawaz, Omer / Gehrmann, Christian / Fiedler, Markus et al. | 2012
- 447
-
Content Extraction Signatures RevisitedHsi-Chung Lin, et al. | 2012
- 452
-
Session 14: Infonomics and e-technology| 2012
- 453
-
Towards a UTAUT-based model for studying the integrating physical and virtual Identity Access Management Systems in e-government domainAlotaibi, Sara Jeza / Wald, Mike et al. | 2012
- 459
-
NitroScript: A PHP template engine for customizing of e-commerce applicationsWalsh, Jerry / Roche, Donogh / Foping, Franclin et al. | 2012
- 465
-
A cloud computing solution for sharing healthcare informationHu, Yan / Fangjie Lu, / Khan, Israr / Bai, Guohua et al. | 2012
- 471
-
Using Bayes Network for Prediction of Type-2 diabetesYang Guo, / Guohua Bai, / Yan Hu, et al. | 2012
- 476
-
Session 15: Information security| 2012
- 477
-
A survey of threats and security measures for data transmission over GSM/UMTS networksFischer, D. / Markscheffel, B. / Frosch, S. / Buettner, D. et al. | 2012
- 483
-
Vulnerability elimination by force of new mobile OS Comparative research of security techniques on BlackBerry OS (incl. PlayBook)Chemerkin, Yury et al. | 2012
- 488
-
Black hat training of white hat resources: The future of security is gamingFlood, Jason / Denihan, Mark / Keane, Anthony / Mtenzi, Fredrick et al. | 2012
- 492
-
An assessment of features related to phishing websites using an automated techniqueMohammad, Rami M. / Thabtah, Fadi / McCluskey, Lee et al. | 2012
- 498
-
Session 16: Internet applications and technology| 2012
- 499
-
A Multi-Agent System for information management and augmented reality in asymmetric warsde Castro, Sidney / das Gracas Bruno Marietto, Maria / dos Santos Franca, Robson / Botelho, Wagner Tanaka et al. | 2012
- 505
-
Securing Elliptic Curve based El-Gamal against Pollard Rho attack using Elliptic Curve based Diffie-Hellman Key ExchangeZani, Tafta / Barmawi, Ari Moesriami / Abdurohman, Maman et al. | 2012
- 513
-
Community OTOP Web Portal for Eastern Region of ThailandPhangphol, Uthairatt / Chaisanit, Settachai / Puangsuwan, Tau-tong / Khongpit, Veena / Kunpluem, Parichat et al. | 2012
- 515
-
Multi function control system using GSM modem based SM5100B ModuleMghawish, Afif / AbdelQader, Akram A. / Al-Jezawi, Mahmoud A. / AbuMahfouz, Mohammad et al. | 2012
- 519
-
Session 17: Information security| 2012
- 521
-
2D Gun's type classification using edge detection algorithm and SUSAN low level image processingKhongpit, Veena / phangphol, Uthairatt / Kasemsan, Kulthon / Srisa-an, Chonawat et al. | 2012
- 524
-
Hackers and Hollywood 2: Considering televisual Cyberthreats in Security Risk AnalysisGordon, Damian et al. | 2012
- 528
-
Hidden Markov Model based anomaly intrusion detectionJain, Ruchi / Abouzakhar, Nasser S. et al. | 2012
- 534
-
Systematic analysis and evaluation of web privacy policies and implementationsMiller, Brad / Buck, Kaitlyn / Tygar, J.D. et al. | 2012
- 541
-
Error correction and detection system based on Hopfield networksIonescu, L. / Anton, C. / Tutanescu, I. / Mazare, A. / Serban, G. et al. | 2012
- 545
-
Session 18: Internet applications and technology| 2012
- 546
-
The edutainment of virtual music instrument for Thai xylophone (Ranad-ek)Meeanan, Laddawan / Trangansri, Apichai / Hongthai, Pornpipat / Chaisanit, Settachai / Nimnual, Ratchadawan et al. | 2012
- 548
-
Fault-tolerant middleware based on multistream pipeline for private storage servicesGonzalez, J. L. / Sosa-Sosa, Victor / Bergua, Borja / Sanchez, Luis Miguel / Carretero, Jesus et al. | 2012
- 556
-
e-Ticketing system for football events in MalaysiaAbdul Hamid, N. / Al A'zhim, M.F. / Yap, M. L. et al. | 2012
- 562
-
Towards benchmarking intrusion detection systems for virtualized cloud environmentsMilenkoski, Aleksandar / Kounev, Samuel et al. | 2012
- 564
-
Multi-probes fusion framework for matching simultaneous latent impressionsYusof, Rozita Mohd / Sulaiman, Norrozila et al. | 2012
- 568
-
Session 19: Infonomics and e-technology| 2012
- 569
-
Are contemporary trade unions utilizing the opportunities for revival presented by internet technology? A comparison of Croatian, UK and USA practiceVidovic, Maja / Kolic, Josip et al. | 2012
- 575
-
Security management mechanism for composite applications based on hash chainsLimin Fan, et al. | 2012
- 578
-
E-Government in developing countries: Framework of challenges and opportunitiesAhmad Mousa Odat, et al. | 2012
- 583
-
Investigation of factors affecting growth of e-banking services in Saudi ArabiaAl Somali, Zawlikhah / Ghinea, Gheorghita et al. | 2012
- 589
-
SecGOD Google Docs: Now i feel safer!Michalas, Antonis / Bakopoulos, Menelaos et al. | 2012
- 596
-
Session 20: Information security| 2012
- 597
-
User interactive Internet of things privacy preserved access controlHuang, Xin / Rong Fu, / Chen, Bangdao / Zhang, Tingting / Roscoe, A. W. et al. | 2012
- 603
-
Text fingerprint key generationMohamed Sameh Hassanein, / Ghinea, Gheorghita et al. | 2012
- 610
-
Analysis of access control protocols using labelled tableauxJi Ma, et al. | 2012
- 616
-
A dynamic fuzzy commitment scheme using ARRSES forecastingChoto, Somsak / Premasathian, Nol et al. | 2012
- 620
-
Session 21: Internet applications and technology| 2012
- 621
-
A Bayesian Belief Network analysis of the Internet governance conflictNegron, Martin A. et al. | 2012
- 628
-
Comparing distinct approaches for panic behavior computer simulations: A theoretical analysisMarietto, Maria das Gracas Bruno / Franca, Robson dos Santos / Steinberger-Elias, Margarethe / Botelho, Wagner Tanaka / Noronha, Emerson Aguiar / da Silva, Vera Lucia et al. | 2012
- 634
-
Analysis & modeling multi-breeded Mean-Minded ant colony optimization of agent based Road Vehicle Routing ManagementSur, Chiranjib / Sharma, Sanjeev / Shukla, Anupam et al. | 2012
- 642
-
The process of building knowledge and communication of social systems emulated by multiagent systems capable of cause and emerging learningMarietto, Maria Das Gracas Bruno / Steinberger-Elias, Margarethe Born / De Farias Alves, Marllon Felipe Muniz / Teles, Rita Vucinic et al. | 2012
- 648
-
Session 22: Cloud security| 2012
- 649
-
On cloud storage and the cloud of clouds approachSlamanig, Daniel / Hanser, Christian et al. | 2012
- 656
-
Autonomous agent-based inspection for inter-VM traffic in a Cloud environmentBenzidane, Karim / Khoudali, Saad / Sekkaki, Abderrahim et al. | 2012
- 662
-
The design of adaptive intrusion tolerant system(ITS) based on historical dataYongki Kim, / Jungmin Lim, / Seokjoo Doo, / Hyunsoo Yoon, et al. | 2012
- 668
-
Smart-frame: A flexible, scalable, and secure information management framework for smart gridsJoonsang Baek, / Quang Hieu Vu, / Jones, Andrew / Al Mulla, Sameera / Chan Yeob Yeun, et al. | 2012
- 674
-
Session 23: Ubi/cloud computing| 2012
- 675
-
Economic efficiency control on data centre resources in heterogeneous cost scenariosHeckmann, Benjamin / Zinn, Marcus / Moore, Ronald C. / Wentzel, Christoph / Phippen, Andrew D. et al. | 2012
- 680
-
RACS: A framework for Resource Aware Cloud computingMalik, Sheheryar / Huet, Fabrice / Caromel, Denis et al. | 2012
- 688
-
Decision points for adoption cloud computing in small, medium enterprises (SMEs)Rath, Ashwini / Kumar, Sanjay / Mohapatra, Sanjay / Thakurta, Rahul et al. | 2012
- 692
-
Context-aware Personal Learning EnvironmentAlharbi, Mafawez T. / Platt, Amelia / Al-Bayatti, Ali H. et al. | 2012
- 698
-
Session 24: Internet applications and technology| 2012
- 699
-
Query paraphrasing using genetic approach for intelligent information retrievalYkhlef, Mourad / ALDayel, Abeer et al. | 2012
- 704
-
Evolution pattern for Service Evolution in CloudsZhe Wang, / Liu, Xiaodong / Chalmers, Kevin / Cheng Guojian, et al. | 2012
- 710
-
Implementation methodology of Rely/Guarantee plug-in for ProtégéSaid Rabah Azzam, / Shikun Zhou, et al. | 2012
- 715
-
Forensic memory evidence of windows applicationOlajide, Funminiyi / Savage, Nick / Akmayeva, Galyna / Trafford, Richard et al. | 2012
- 719
-
Session 25: Information security| 2012
- 720
-
Challenges of managing secure elements within the NFC ecosystemPourghomi, Pardis / Ghinea, Gheorghita et al. | 2012
- 726
-
Securing Internet Information Services (IIS) configuration filesKhalid, Saneeha / Abbas, Haider / Pasha, Maruf / Raza, Asad et al. | 2012
- 730
-
Off-line NFC Tag AuthenticationSaeed, Muhammad Qasim / Walter, Colin D. et al. | 2012
- 736
-
Towards coupling user and device locations using biometrical authentication on smartphonesTrojahn, Matthias / Marcus, Philipp et al. | 2012
- 742
-
Session 26: Multimedia and web services| 2012
- 743
-
Honeydoop - a system for on-demand virtual high interaction honeypotsKulkarni, Saurabh / Mutalik, Madhumitra / Kulkarni, Prathamesh / Gupta, Tarun et al. | 2012
- 748
-
Semantic hedgehog for log analysisWiley, Jeffrey J. / Coyle, Frank P. et al. | 2012
- 753
-
Exploiting UML and acceleo for developing Semantic Web ServicesMtsweni, Jabu et al. | 2012
- 759
-
Assessment of ontology alignment methodologySaid Rabah Azzam, / Shikun Zhou, et al. | 2012
- 765
-
Session 27: Information security| 2012
- 766
-
Mobile banking contexts and prospects in Egypt: A frameworkElbadrawy, Rehaballah / Aziz, Rasha Abdel et al. | 2012
- 772
-
Managing NFC payment applications through cloud computingPourghomi, Pardis / Ghinea, Gheorghita et al. | 2012
- 778
-
Innovative solution for a telemedicine applicationArun, SN / Lam, WC / Tan, KK et al. | 2012
- 784
-
Authorization model of SSO for a distributed environment based on the attributesGaozheng Zhang, / Mengdong Chen, / Mou Shen, et al. | 2012
- 790
-
Session 28: Mobile systems| 2012
- 791
-
Making of DAISY Talking book on mobile phone: A concept and architectureSusakulchai, Surachai / Kaewprapan, Wacheerapan / Chaisanit, Settachai et al. | 2012
- 793
-
M-learning for Eco-Packaging using KMNimnual, Ratchadawan / Chaisanit, Settachai et al. | 2012
- 795
-
An experimental study of three different rule ranking formulas in associative classificationAbdelhamid, Neda / Ayesh, Aladdin / Thabtah, Fadi et al. | 2012
- 801
-
A novel architecture for secure communications in mobile systemsUpadhyay, Alok / Sahoo, Jajati Keshari / Bajpai, Vibhor et al. | 2012
- 806
-
Posters [breaker page]| 2012
- 807
-
Implementation of tools for brute forcing touch inputted passwordsBotelho, Bruno Alves Pereira / Nakamura, Emilio Tissato / Uto, Nelson et al. | 2012
- 809
-
Perturbation for privacy-preserving participatory sensing on mobileAoki, Shunsuke / Iwai, Masayuki / Sezaki, Kaoru et al. | 2012
- 810
-
Innovative extracting and integrating the potential and subjectively formed context-informationNakayama, Hiroki / Kaminaga, Hiroaki / Miyadera, Youzou / Nakamura, Shoichi et al. | 2012
- 812
-
Visual support system for semi-automatic generation of spadework of academic paper from presentation slidesMorita, Yusuke / Anzai, Hiroyuki / Kaminaga, Hiroaki / Miyadera, Youzou / Nakamura, Shoichi et al. | 2012
- 814
-
Visualization of Web exploration streams and user's genuine intentionsMatsumoto, Takuya / Yamazaki, Tatuya / Kaminaga, Hiroaki / Miyadera, Youzou / Nakamura, Shoichi et al. | 2012
- 816
-
A system for management of research resources focusing on grasping the polish processesAnzai, Hiroyuki / Kaminaga, Hiroaki / Morimoto, Yasuhiko / Yokoyama, Setsuo / Miyadera, Youzou / Nakamura, Shoichi et al. | 2012