QR decomposition-based cryptography: Via image generation (QR-CRYPT) (English)
- New search for: Qayum, Abdul
- New search for: Kumar, Prakash
- New search for: Qayum, Abdul
- New search for: Kumar, Prakash
In:
2012 International Conference for Internet Technology and Secured Transactions
;
179-184
;
2012
- Conference paper / Electronic Resource
-
Title:QR decomposition-based cryptography: Via image generation (QR-CRYPT)
-
Contributors:Qayum, Abdul ( author ) / Kumar, Prakash ( author )
-
Published in:
-
Publisher:
- New search for: IEEE
-
Publication date:2012-12-01
-
Size:921711 byte
-
ISBN:
-
Type of media:Conference paper
-
Type of material:Electronic Resource
-
Language:English
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
[Front cover]| 2012
- 2
-
International Conference for Internet Technology and Secured Transactions (ICITST-2012) [Copyright notice]| 2012
- 3
-
Welcome messageSavage, Nick / El Assad, Safwan / Shoniregun, Charles A. et al. | 2012
- 4
-
Contents page| 2012
- 15
-
Committees| 2012
- 19
-
Keynote speakers| 2012
- 20
-
Keynote speaker 1 [Open Learning and the 3D Web: Applications and Challenges]| 2012
- 21
-
Keynote speaker 2 [Cybercrime and mobile devices]| 2012
- 22
-
Keynote speaker 3 [Entropy Maximisation, Queueing and Performance Related Security Trade-offs]| 2012
- 23
-
Keynote speaker 4: RFID security and cryptography 2012 (RISC'12) workshop [Smart cards, Secure Elements and NFC Security - The Status Quo]| 2012
- 24
-
Invited speaker: RFID security and cryptography 2012 (RISC'12) workshop [Chaos Based Information Hiding and Security]| 2012
- 25
-
Workshops| 2012
- 26
-
Workshop 1 (part I): International workshop on information security, theory and practice (ISTP-2012)| 2012
- 27
-
Assessing the security of subsampling process using modified EKF and nonlinear least squares methodsCot, Lea D. / Lozi, Rene et al. | 2012
- 32
-
Dynamic routing in covert channel overlays based on control protocolsBacks, Peter / Wendzel, Steffen / Keller, Jorg et al. | 2012
- 40
-
How to guarantee secured transactions with QoS and real-time constraintsChetto, Maryline / Noura, Hassan / El Assad, Safwan / Farajallah, Mousa et al. | 2012
- 45
-
Workshop 1 (part II): International workshop on information security, theory and practice (ISTP-2012)| 2012
- 46
-
Improved blind DCT watermarking by using chaotic sequencesTataru, R. L. / El Assad, S. / Deforges, O. et al. | 2012
- 51
-
Validating the existence of watermarks on digital images using a mobile phoneDelgado-Guillen, Lorenzo Antonio / Garcia-Hernandez, Jose Juan / Torres-Huitzil, Cesar et al. | 2012
- 56
-
Chaotic generator synthesis: Dynamical and statistical analysisTaralova, Ina / Lozi, Rene / El Assad, Safwan et al. | 2012
- 60
-
A new method to improve cryptographic properties of chaotic discrete dynamical systemsCristina, Dascalescu Ana / Eugen, Boriga Radu et al. | 2012
- 66
-
Workshop 2 (part I): The 4th international workshop on RFID security and cryptography 2012 (RISC'12)| 2012
- 67
-
Chaos Based Information Hiding and SecurityEl Assad, Safwan et al. | 2012
- 73
-
Workshop 2 (part II): The 4th international workshop on RFID security and cryptography 2012 (RISC'12)| 2012
- 74
-
Detecting counterfeit-money using RFID-enabled mobile devicesEldefrawy, Mohamed Hamdy / Khan, Muhammad Khurram et al. | 2012
- 80
-
Vulnerability analysis of two ultra-lightweight RFID authentication protocols: RAPP and gossamerTaqieddin, Eyad / Sarangapani, Jagannathan et al. | 2012
- 87
-
A new lightweight hybrid cryptographic algorithm for the internet of thingsShemaili, Mouza Bani / Yeun, Chan Yeob / Mubarak, Khalid / Zemerly, Mohamed Jamal et al. | 2012
- 93
-
Workshop 3: The 3rd international workshop on ubiquitous computing security issues (UCSI'12)| 2012
- 94
-
DeployinG Computer-Based Learning under suboptimal conditionsMselle, Leonard J. / Kondo, Tabu S. et al. | 2012
- 99
-
Examining ubiquitous security-capital issues in implementing a Campus-System-as-a-Service(CSaaS) model in the cloud computing age: Case study sub-Saharan regionMbale, Jameson / Mufeti, Kauna / Hamutenya, Victor et al. | 2012
- 105
-
Investigation of cultural aspects within information systems security researchConnolly, Lena / Lang, Michael et al. | 2012
- 112
-
Enhancing privacy in social applications with the notion of group contextFranz, Elke / Springer, Thomas / Harder, Norbert et al. | 2012
- 119
-
Sessions| 2012
- 120
-
Session 1: Internet applications and technology| 2012
- 121
-
User-intent custom adaptive search service based on ontology and similar-word retrieval algorithm compositionKim, Sukyoung / Ahn, Kihong et al. | 2012
- 127
-
A web tool for monitoring HTTP asynchronous method invocationsJaimez-Gonzalez, Carlos R. / Luna-Ramirez, Wulfrano A. / Lucas, Simon M. et al. | 2012
- 133
-
A shared secret security broker implementation in a commercial contextGao, Tom Yuan / Kearney, David et al. | 2012
- 139
-
The survey of cache management in the shared storage environmentXu, Junfeng / Sun, Bo / Si, Chengxiang et al. | 2012
- 143
-
Session 2: Ubi/cloud computing| 2012
- 144
-
Evaluation and brokering of service level agreements for negotiation of cloud infrastructuresAmato, Alba / Di Martino, Beniamino / Venticinque, Salvatore et al. | 2012
- 150
-
Secure cross-cloud single sign-on (SSO) using eIDsZwattendorfer, Bernd / Tauber, Arne et al. | 2012
- 156
-
Risk based SLA management in clouds: A legal perspectiveKirkham, Tom / Djemame, Karim / Kiran, Mariam / Jiang, Ming / Armstrong, Django / Kousiouris, George / Vafiadis, George / Evangelinou, Athanasia et al. | 2012
- 161
-
MedCloud: Healthcare cloud computing systemSobhy, Dalia / El-Sonbaty, Yasser / Abou Elnasr, Mohamad et al. | 2012
- 167
-
Session 3: Information security| 2012
- 168
-
A scheme for the generation of strong cryptographic key pairs based on ICMetricsTahir, Ruhma / Hu, Huosheng / Gu, Dongbing / McDonald-Maier, Klaus / Howells, Gareth et al. | 2012
- 175
-
Implementation of Convolutional codes on FPGAGhauri, Sajjad Ahmed / Humayun, Hasan / ul Haq, Muhammad Ehsan / Sohail, Farhan et al. | 2012
- 179
-
QR decomposition-based cryptography: Via image generation (QR-CRYPT)Qayum, Abdul / Kumar, Prakash et al. | 2012
- 185
-
Trusted Location Based ServicesTeufl, Peter / Zefferer, Thomas / Kreuzhuber, Sandra / Lesjak, Christian M. et al. | 2012
- 193
-
Session 4: Cloud security| 2012
- 194
-
Reliability aware scheduling in cloud computingMalik, Sheheryar / Huet, Fabrice / Caromel, Denis et al. | 2012
- 202
-
Usage control in cloud systemsLazouski, Aliaksandr / Mancini, Gaetano / Martinelli, Fabio / Mori, Paolo et al. | 2012
- 208
-
Cloud security: Can the cloud be secured?Karnad, Kiran / Nagenthram, Saravanan et al. | 2012
- 211
-
Detecting anomalies in IaaS environments through virtual machine host system call analysisAlarifi, Suaad S. / Wolthusen, Stephen D. et al. | 2012
- 219
-
Session 5: Internet applications and technology| 2012
- 220
-
Usability of profile based student authentication and traffic light system in online examinationsUllah, Abrar / Xiao, Hannan / Lilley, Mariana / Barker, Trevor et al. | 2012
- 226
-
How effective is social media advertising? A study of Facebook Social AdvertisementsCarmichael, Dawn / Cleave, David et al. | 2012
- 230
-
Application of semantic search in Idea Management SystemsPoveda, Geovanny / Westerski, Adam / Iglesias, Carlos A. et al. | 2012
- 237
-
Emergency care in situations of natural disaster: A Multi-Agent approachIzida, Aline / da Rocha Tedrus, Thiago / das Gracas Bruno Marietto, Maria / Steinberger-Elias, Margarethe / Botelho, Wagner Tanaka / dos Santos Franca, Robson et al. | 2012
- 243
-
Session 6: Information security| 2012
- 244
-
Modelsim simulation for real-time stereo matching using DP algorithmHa, JeongMok / Jeong, Hong et al. | 2012
- 249
-
MANET secure key exchange using spraying diffie-hellman algorithmStulman, Ariel / Lahav, Jonathan / Shmueli, Avraham et al. | 2012
- 253
-
Smart authentication for real-time business process monitoringAlMahmoud, Abdelrahman / Colombo, Maurizio / Yeun, Chan Yeob / Al-Muhairi, Hassan et al. | 2012
- 259
-
On the security and usability of dual credential authentication in UK online bankingJust, Mike / Aspinall, David et al. | 2012
- 265
-
Forensics data acquisition methods for mobile phonesAlghafli, Khawla Abdulla / Jones, Andrew / Martin, Thomas Anthony et al. | 2012
- 270
-
Session 7: Multimedia and web services| 2012
- 271
-
Traditional musical Virtual Reality on M-learningChaisanit, Settachai / Hongthong, Napatwadee Sangboonnum / Suksakulchai, Surachai / Pinpat, Chuchart et al. | 2012
- 275
-
High volume web service resource consumptionOlmsted, Aspen / Farkas, Csilla et al. | 2012
- 281
-
Access control for a Smart Grid SOAJung, Markus / Hofer, Thomas / Dobelt, Susen / Kienesberger, Georg / Judex, Florian / Kastner, Wolfgang et al. | 2012
- 288
-
Ontology based image retrievalManzoor, Umar / Ejaz, Naveed / Akhtar, Nadeem / Umar, Muhammad / Khan, M. Shoaib / Umar, Hafsa et al. | 2012
- 294
-
Security of audio secret sharing scheme encrypting audio secretsYoshida, Kotaro / Watanabe, Yodai et al. | 2012
- 296
-
Session 8: Internet applications and technology| 2012
- 297
-
The mobileak project: Forensics methodology for mobile application privacy assessmentStirparo, Pasquale / Kounelis, Ioannis et al. | 2012
- 304
-
Determinants of student performance in advanced programming courseChen, Y.Y. / Mohd Taib, Shakirah / Che Nordin, Che Sarah et al. | 2012
- 308
-
Ensuring software safety in safety critical domainsBahig, Ghada Moussa / El-Kadi, Amr et al. | 2012
- 313
-
Data integration of electronic health records using artificial neural networksGul, Omniyah / Al-Qutayri, Mahmoud / Vu, Quang Hieu / Yeun, Chan Yeob et al. | 2012
- 318
-
Two novel server-side attacks against log file in Shared Web Hosting serversMirheidari, Seyed Ali / Arshad, Sajjad / Khoshkdahan, Saeidreza / Jalili, Rasool et al. | 2012
- 324
-
Session 9: Information security| 2012
- 325
-
Re-engineering of web reverse proxy with shibboleth authenticationHaron, Galoh Rashidah / Maniam, Dharmadharshni / Sadasivam, Vijayakumari / Loon, Wong Hon et al. | 2012
- 331
-
Proposal of a cryptography method using gray scale digital imagesGadelha, M. Y. R. / Costa Filho, C. F. F. / Costa, M. G. F. et al. | 2012
- 336
-
Evaluation of practical trust based access control for XML databasesFarooqi, Norah / North, Siobhan et al. | 2012
- 341
-
Issues in inter-organisational encryption systems: The problem with FedLinkMiiller, Greg et al. | 2012
- 347
-
Session 10: Internet applications and technology| 2012
- 348
-
Assessing the security of Node.js platformOjamaa, Andres / Duuna, Karl et al. | 2012
- 356
-
Quantifying the impact on distrust of e-commerce trust factors: A non-parametric studyAndrade, Ana A. / Lopes, Vitor V. / Novais, Augusto Q. et al. | 2012
- 362
-
Uncertainty with STOS: Intelligent solution for uncertain navigation problemsHalaoui, Hatem Fawzi et al. | 2012
- 368
-
Learning from oversight by telecommunications regulatory agenciesRixon, Daphne / Furey, Mary et al. | 2012
- 375
-
Session 11: Cloud security| 2012
- 376
-
A trust based model for federated identity architecture to mitigate identity theftGhazizadeh, Eghbal / Zamani, Mazdak / Ab Manan, Jamalul-lail / Khaleghparast, Reza / Taherian, Ali et al. | 2012
- 382
-
A light weight centralized file monitoring approach for securing files in Cloud environmentGupta, Sanchika / Sardana, Anjali / Kumar, Padam et al. | 2012
- 388
-
Evaluating security and privacy in cloud computing services: A Stakeholder's perspectiveAbuhussein, Abdullah / Bedi, Harkeerat / Shiva, Sajjan et al. | 2012
- 396
-
Improvement of multi-user searchable encrypted data schemeTran Thao Phuong, / Omote, Kazumasa / Nguyen Gia Luyen, / Nguyen Dinh Thuc, et al. | 2012
- 402
-
Session 12: Information security| 2012
- 403
-
Correlated node behavior in wireless ad hoc networks: An epidemic modelAzni, A.H / Ahmad, Rabiah / Mohamad Noh, Zul Azri et al. | 2012
- 411
-
Forensics filesystem with cluster-level identifiers for efficient data recoveryAlhussein, Mohammed / Srinivasan, Avinash / Wijesekera, Duminda et al. | 2012
- 416
-
A round level approach to fault detection in PP-2 symmetric block cipherIdzikowska, Ewa et al. | 2012
- 420
-
Feedback manipulation flooding attack: Feasibility evaluation and impact quantification on Stream Control Transmission ProtocolKumar, V Anil / Das, Debabrata et al. | 2012
- 426
-
Session 13: Information security| 2012
- 427
-
ERASE- entropy-based sanitization of sensitive data for privacy preservationMedsger, Jeffrey / Srinivasan, Avinash et al. | 2012
- 433
-
Bootstrapping body sensor networks using human controlled LED-camera channelsHuang, Xin / Guo, Shangyuan / Chen, Bangdao / Roscoe, A. W. et al. | 2012
- 439
-
Secure mobile social networks using USIM in a closed environmentNawaz, Omer / Gehrmann, Christian / Fiedler, Markus et al. | 2012
- 447
-
Content Extraction Signatures RevisitedHsi-Chung Lin, et al. | 2012
- 452
-
Session 14: Infonomics and e-technology| 2012
- 453
-
Towards a UTAUT-based model for studying the integrating physical and virtual Identity Access Management Systems in e-government domainAlotaibi, Sara Jeza / Wald, Mike et al. | 2012
- 459
-
NitroScript: A PHP template engine for customizing of e-commerce applicationsWalsh, Jerry / Roche, Donogh / Foping, Franclin et al. | 2012
- 465
-
A cloud computing solution for sharing healthcare informationHu, Yan / Fangjie Lu, / Khan, Israr / Bai, Guohua et al. | 2012
- 471
-
Using Bayes Network for Prediction of Type-2 diabetesYang Guo, / Guohua Bai, / Yan Hu, et al. | 2012
- 476
-
Session 15: Information security| 2012
- 477
-
A survey of threats and security measures for data transmission over GSM/UMTS networksFischer, D. / Markscheffel, B. / Frosch, S. / Buettner, D. et al. | 2012
- 483
-
Vulnerability elimination by force of new mobile OS Comparative research of security techniques on BlackBerry OS (incl. PlayBook)Chemerkin, Yury et al. | 2012
- 488
-
Black hat training of white hat resources: The future of security is gamingFlood, Jason / Denihan, Mark / Keane, Anthony / Mtenzi, Fredrick et al. | 2012
- 492
-
An assessment of features related to phishing websites using an automated techniqueMohammad, Rami M. / Thabtah, Fadi / McCluskey, Lee et al. | 2012
- 498
-
Session 16: Internet applications and technology| 2012
- 499
-
A Multi-Agent System for information management and augmented reality in asymmetric warsde Castro, Sidney / das Gracas Bruno Marietto, Maria / dos Santos Franca, Robson / Botelho, Wagner Tanaka et al. | 2012
- 505
-
Securing Elliptic Curve based El-Gamal against Pollard Rho attack using Elliptic Curve based Diffie-Hellman Key ExchangeZani, Tafta / Barmawi, Ari Moesriami / Abdurohman, Maman et al. | 2012
- 513
-
Community OTOP Web Portal for Eastern Region of ThailandPhangphol, Uthairatt / Chaisanit, Settachai / Puangsuwan, Tau-tong / Khongpit, Veena / Kunpluem, Parichat et al. | 2012
- 515
-
Multi function control system using GSM modem based SM5100B ModuleMghawish, Afif / AbdelQader, Akram A. / Al-Jezawi, Mahmoud A. / AbuMahfouz, Mohammad et al. | 2012
- 519
-
Session 17: Information security| 2012
- 521
-
2D Gun's type classification using edge detection algorithm and SUSAN low level image processingKhongpit, Veena / phangphol, Uthairatt / Kasemsan, Kulthon / Srisa-an, Chonawat et al. | 2012
- 524
-
Hackers and Hollywood 2: Considering televisual Cyberthreats in Security Risk AnalysisGordon, Damian et al. | 2012
- 528
-
Hidden Markov Model based anomaly intrusion detectionJain, Ruchi / Abouzakhar, Nasser S. et al. | 2012
- 534
-
Systematic analysis and evaluation of web privacy policies and implementationsMiller, Brad / Buck, Kaitlyn / Tygar, J.D. et al. | 2012
- 541
-
Error correction and detection system based on Hopfield networksIonescu, L. / Anton, C. / Tutanescu, I. / Mazare, A. / Serban, G. et al. | 2012
- 545
-
Session 18: Internet applications and technology| 2012
- 546
-
The edutainment of virtual music instrument for Thai xylophone (Ranad-ek)Meeanan, Laddawan / Trangansri, Apichai / Hongthai, Pornpipat / Chaisanit, Settachai / Nimnual, Ratchadawan et al. | 2012
- 548
-
Fault-tolerant middleware based on multistream pipeline for private storage servicesGonzalez, J. L. / Sosa-Sosa, Victor / Bergua, Borja / Sanchez, Luis Miguel / Carretero, Jesus et al. | 2012
- 556
-
e-Ticketing system for football events in MalaysiaAbdul Hamid, N. / Al A'zhim, M.F. / Yap, M. L. et al. | 2012
- 562
-
Towards benchmarking intrusion detection systems for virtualized cloud environmentsMilenkoski, Aleksandar / Kounev, Samuel et al. | 2012
- 564
-
Multi-probes fusion framework for matching simultaneous latent impressionsYusof, Rozita Mohd / Sulaiman, Norrozila et al. | 2012
- 568
-
Session 19: Infonomics and e-technology| 2012
- 569
-
Are contemporary trade unions utilizing the opportunities for revival presented by internet technology? A comparison of Croatian, UK and USA practiceVidovic, Maja / Kolic, Josip et al. | 2012
- 575
-
Security management mechanism for composite applications based on hash chainsLimin Fan, et al. | 2012
- 578
-
E-Government in developing countries: Framework of challenges and opportunitiesAhmad Mousa Odat, et al. | 2012
- 583
-
Investigation of factors affecting growth of e-banking services in Saudi ArabiaAl Somali, Zawlikhah / Ghinea, Gheorghita et al. | 2012
- 589
-
SecGOD Google Docs: Now i feel safer!Michalas, Antonis / Bakopoulos, Menelaos et al. | 2012
- 596
-
Session 20: Information security| 2012
- 597
-
User interactive Internet of things privacy preserved access controlHuang, Xin / Rong Fu, / Chen, Bangdao / Zhang, Tingting / Roscoe, A. W. et al. | 2012
- 603
-
Text fingerprint key generationMohamed Sameh Hassanein, / Ghinea, Gheorghita et al. | 2012
- 610
-
Analysis of access control protocols using labelled tableauxJi Ma, et al. | 2012
- 616
-
A dynamic fuzzy commitment scheme using ARRSES forecastingChoto, Somsak / Premasathian, Nol et al. | 2012
- 620
-
Session 21: Internet applications and technology| 2012
- 621
-
A Bayesian Belief Network analysis of the Internet governance conflictNegron, Martin A. et al. | 2012
- 628
-
Comparing distinct approaches for panic behavior computer simulations: A theoretical analysisMarietto, Maria das Gracas Bruno / Franca, Robson dos Santos / Steinberger-Elias, Margarethe / Botelho, Wagner Tanaka / Noronha, Emerson Aguiar / da Silva, Vera Lucia et al. | 2012
- 634
-
Analysis & modeling multi-breeded Mean-Minded ant colony optimization of agent based Road Vehicle Routing ManagementSur, Chiranjib / Sharma, Sanjeev / Shukla, Anupam et al. | 2012
- 642
-
The process of building knowledge and communication of social systems emulated by multiagent systems capable of cause and emerging learningMarietto, Maria Das Gracas Bruno / Steinberger-Elias, Margarethe Born / De Farias Alves, Marllon Felipe Muniz / Teles, Rita Vucinic et al. | 2012
- 648
-
Session 22: Cloud security| 2012
- 649
-
On cloud storage and the cloud of clouds approachSlamanig, Daniel / Hanser, Christian et al. | 2012
- 656
-
Autonomous agent-based inspection for inter-VM traffic in a Cloud environmentBenzidane, Karim / Khoudali, Saad / Sekkaki, Abderrahim et al. | 2012
- 662
-
The design of adaptive intrusion tolerant system(ITS) based on historical dataYongki Kim, / Jungmin Lim, / Seokjoo Doo, / Hyunsoo Yoon, et al. | 2012
- 668
-
Smart-frame: A flexible, scalable, and secure information management framework for smart gridsJoonsang Baek, / Quang Hieu Vu, / Jones, Andrew / Al Mulla, Sameera / Chan Yeob Yeun, et al. | 2012
- 674
-
Session 23: Ubi/cloud computing| 2012
- 675
-
Economic efficiency control on data centre resources in heterogeneous cost scenariosHeckmann, Benjamin / Zinn, Marcus / Moore, Ronald C. / Wentzel, Christoph / Phippen, Andrew D. et al. | 2012
- 680
-
RACS: A framework for Resource Aware Cloud computingMalik, Sheheryar / Huet, Fabrice / Caromel, Denis et al. | 2012
- 688
-
Decision points for adoption cloud computing in small, medium enterprises (SMEs)Rath, Ashwini / Kumar, Sanjay / Mohapatra, Sanjay / Thakurta, Rahul et al. | 2012
- 692
-
Context-aware Personal Learning EnvironmentAlharbi, Mafawez T. / Platt, Amelia / Al-Bayatti, Ali H. et al. | 2012
- 698
-
Session 24: Internet applications and technology| 2012
- 699
-
Query paraphrasing using genetic approach for intelligent information retrievalYkhlef, Mourad / ALDayel, Abeer et al. | 2012
- 704
-
Evolution pattern for Service Evolution in CloudsZhe Wang, / Liu, Xiaodong / Chalmers, Kevin / Cheng Guojian, et al. | 2012
- 710
-
Implementation methodology of Rely/Guarantee plug-in for ProtégéSaid Rabah Azzam, / Shikun Zhou, et al. | 2012
- 715
-
Forensic memory evidence of windows applicationOlajide, Funminiyi / Savage, Nick / Akmayeva, Galyna / Trafford, Richard et al. | 2012
- 719
-
Session 25: Information security| 2012
- 720
-
Challenges of managing secure elements within the NFC ecosystemPourghomi, Pardis / Ghinea, Gheorghita et al. | 2012
- 726
-
Securing Internet Information Services (IIS) configuration filesKhalid, Saneeha / Abbas, Haider / Pasha, Maruf / Raza, Asad et al. | 2012
- 730
-
Off-line NFC Tag AuthenticationSaeed, Muhammad Qasim / Walter, Colin D. et al. | 2012
- 736
-
Towards coupling user and device locations using biometrical authentication on smartphonesTrojahn, Matthias / Marcus, Philipp et al. | 2012
- 742
-
Session 26: Multimedia and web services| 2012
- 743
-
Honeydoop - a system for on-demand virtual high interaction honeypotsKulkarni, Saurabh / Mutalik, Madhumitra / Kulkarni, Prathamesh / Gupta, Tarun et al. | 2012
- 748
-
Semantic hedgehog for log analysisWiley, Jeffrey J. / Coyle, Frank P. et al. | 2012
- 753
-
Exploiting UML and acceleo for developing Semantic Web ServicesMtsweni, Jabu et al. | 2012
- 759
-
Assessment of ontology alignment methodologySaid Rabah Azzam, / Shikun Zhou, et al. | 2012
- 765
-
Session 27: Information security| 2012
- 766
-
Mobile banking contexts and prospects in Egypt: A frameworkElbadrawy, Rehaballah / Aziz, Rasha Abdel et al. | 2012
- 772
-
Managing NFC payment applications through cloud computingPourghomi, Pardis / Ghinea, Gheorghita et al. | 2012
- 778
-
Innovative solution for a telemedicine applicationArun, SN / Lam, WC / Tan, KK et al. | 2012
- 784
-
Authorization model of SSO for a distributed environment based on the attributesGaozheng Zhang, / Mengdong Chen, / Mou Shen, et al. | 2012
- 790
-
Session 28: Mobile systems| 2012
- 791
-
Making of DAISY Talking book on mobile phone: A concept and architectureSusakulchai, Surachai / Kaewprapan, Wacheerapan / Chaisanit, Settachai et al. | 2012
- 793
-
M-learning for Eco-Packaging using KMNimnual, Ratchadawan / Chaisanit, Settachai et al. | 2012
- 795
-
An experimental study of three different rule ranking formulas in associative classificationAbdelhamid, Neda / Ayesh, Aladdin / Thabtah, Fadi et al. | 2012
- 801
-
A novel architecture for secure communications in mobile systemsUpadhyay, Alok / Sahoo, Jajati Keshari / Bajpai, Vibhor et al. | 2012
- 806
-
Posters [breaker page]| 2012
- 807
-
Implementation of tools for brute forcing touch inputted passwordsBotelho, Bruno Alves Pereira / Nakamura, Emilio Tissato / Uto, Nelson et al. | 2012
- 809
-
Perturbation for privacy-preserving participatory sensing on mobileAoki, Shunsuke / Iwai, Masayuki / Sezaki, Kaoru et al. | 2012
- 810
-
Innovative extracting and integrating the potential and subjectively formed context-informationNakayama, Hiroki / Kaminaga, Hiroaki / Miyadera, Youzou / Nakamura, Shoichi et al. | 2012
- 812
-
Visual support system for semi-automatic generation of spadework of academic paper from presentation slidesMorita, Yusuke / Anzai, Hiroyuki / Kaminaga, Hiroaki / Miyadera, Youzou / Nakamura, Shoichi et al. | 2012
- 814
-
Visualization of Web exploration streams and user's genuine intentionsMatsumoto, Takuya / Yamazaki, Tatuya / Kaminaga, Hiroaki / Miyadera, Youzou / Nakamura, Shoichi et al. | 2012
- 816
-
A system for management of research resources focusing on grasping the polish processesAnzai, Hiroyuki / Kaminaga, Hiroaki / Morimoto, Yasuhiko / Yokoyama, Setsuo / Miyadera, Youzou / Nakamura, Shoichi et al. | 2012