default search action
ISA 2011: Brno, Czech Republic
- Tai-Hoon Kim, Hojjat Adeli, Rosslin John Robles, Maricel O. Balitanas:
Information Security and Assurance - International Conference, ISA 2011, Brno, Czech Republic, August 15-17, 2011. Proceedings. Communications in Computer and Information Science 200, Springer 2011, ISBN 978-3-642-23140-7 - Bilal Khan, Khaled Alghathbar, Muhammad Khurram Khan:
Information Security Awareness Campaign: An Alternate Approach. 1-10 - Wei Wang:
Equivalent Key Recovery Attack on H 2-MAC Instantiated with MD5. 11-20 - Pierre-Louis Cayrel, Sidi Mohamed El Yousfi Alaoui, Gerhard Hoffmann, Mohammed Meziani, Robert Niebuhr:
Recent Progress in Code-Based Cryptography. 21-32 - Pierre-Louis Cayrel, Gerhard Hoffmann, Michael Schneider:
GPU Implementation of the Keccak Hash Function Family. 33-42 - Ines Bouzouita, Michel Liquiere, Samir Elloumi, Ali Jaoua:
A Comparative Study of a New Associative Classification Approach for Mining Rare and Frequent Classification Rules. 43-52 - Guoyan Zhang, Qiuliang Xu:
Secret Key Awareness Security Public Key Encryption Scheme. 53-61 - Mohamed Saied Emam Mohamed, Stanislav Bulygin, Johannes Buchmann:
Using SAT Solving to Improve Differential Fault Analysis of Trivium. 62-71 - Lukás Durfina, Jakub Kroustek, Petr Zemek, Dusan Kolár, Tomás Hruska, Karel Masarík, Alexander Meduna:
Design of a Retargetable Decompiler for a Static Platform-Independent Malware Analysis. 72-86 - Soltan Alharbi, Jens H. Weber-Jahnke, Issa Traoré:
The Proactive and Reactive Digital Forensics Investigation Process: A Systematic Literature Review. 87-100 - Fabio Manganiello, Mirco Marchetti, Michele Colajanni:
Multistep Attack Detection and Alert Correlation in Intrusion Detection Systems. 101-110 - Mohammed Meziani, Pierre-Louis Cayrel, Sidi Mohamed El Yousfi Alaoui:
2SC: An Efficient Code-Based Stream Cipher. 111-122 - Mohamed Saied Emam Mohamed, Jintai Ding, Johannes Buchmann:
Towards Algebraic Cryptanalysis of HFE Challenge 2. 123-131 - Mohammed Meziani, Özgür Dagdelen, Pierre-Louis Cayrel, Sidi Mohamed El Yousfi Alaoui:
S-FSB: An Improved Variant of the FSB Hash Family. 132-145 - Sidi Mohamed El Yousfi Alaoui, Pierre-Louis Cayrel, Mohammed Meziani:
Improved Identity-Based Identification and Signature Schemes Using Quasi-Dyadic Goppa Codes. 146-155 - Noureldien Abdelrhman Noureldien, Mahmud Awadelkariem, DeiaEldien M. Ahmed:
A Detrministic Factorization and Primality Testing Algorithm for Integers of the Form Z Mod 6 = -1. 156-165 - Jayaprakash Kar:
Non-interactive Deniable Authentication Protocol Using Generalized ECDSA Signature Scheme. 166-176 - Gerasimos C. Meletiou, Yannis C. Stamatiou, Apostolos Tsiakalos:
Lower Bounds for Interpolating Polynomials for Square Roots of the Elliptic Curve Discrete Logarithm. 177-187 - Jari Veijalainen, Veikko Hara:
Towards Next Generation System Architecture for Emergency Services. 188-202 - Rosslin John Robles, Gilcheol Park:
Securing Communication between SCADA Master Station and Mobile Remote Components. 203-210 - Maricel O. Balitanas, Seung-Hwan Jeon, Tai-Hoon Kim:
Retrofit to CAIN of IP-Based Supervisory Control and Data Acquisition System. 211-218 - Rosslin John Robles, Tai-Hoon Kim:
Application Program Interface as Back-Up Data Source for SCADA Systems. 219-226 - (Withdrawn) Supervisory Control and Data Acquisition System CAIN Issues. 227-235
- Young B. Choi, Tae Hwan Oh, Rajath Chouta:
RFID Implementation and Security Issues. 236-249 - Gyuyeong Kim, Hyuntae Kim, Jangsik Park, Yunsik Yu:
Vehicle Tracking Based on Kalman Filter in Tunnel. 250-256 - Chai-Jong Song, Seok-Pil Lee, Hochong Park:
The Contents Based Music Retrieval Method Using Audio Feature Analysis against Polyphonic Music. 257-263 - Hyuntae Kim, Daehyun Ryu, Jangsik Park:
A Noise Robust Echo Canceller with Post-processing Using Liner Predictor and Wiener filter. 264-274 - Jangsik Park, Hyuntae Kim, Yunsik Yu:
Implementation Fire Detection Algorithm Using Fixed Point Digital Signal Processor. 275-281 - Seung-Hyun Lee, Kyung-Soo Jang, Kee-Hyun Choi, Choon-Sung Nam, Dong Ryeol Shin:
An Efficient Private Registry Management System Using DHT Based on FIPA Agent Platform. 282-291 - You-Jin Song, Jae Sang Cha, Jang Mook Kang:
A Study for Method of Construct Encryption Scheme for Supporting Range Query Based on Bucket ID Transformation about Sensor Applications. 292-305 - Ji-Yeon Hwang, Seung-Jung Shin, DaeHyun Ryu:
Improvement of Message Processing Method for SOA Based Digital Set-Top Box System. 306-312 - You-Jin Song, Jae Sang Cha, Jang Mook Kang, Wan Sik kim:
A Data Management Method to Secure Data in Cloud Computing Environment. 313-317 - Dongjae Song, Soongyu Kwon, Chun-Guan Kim, Jong Tae Kim:
VLSI Architecture of Adaptive Viterbi Decoder for Wireless Communication. 318-325 - Jang Mook Kang, You-Jin Song, Jae Sang Cha, Seon-Hee Lee:
A Study for Security Scheme and the Right to Be Forgotten Based on Social Network Service for Smart-Phone Environment. 326-332 - Jun-Pil Boo, Do-Hyeun Kim:
Development of Integrated Adapter Based on Multi-sensor Networks for Tracking and Surveillance. 333-338 - Byoungman An, Youngseop Kim, Oh-Jin Kwon:
High Speed and Low-Complexity Mode Decision for Advanced Video Coding. 339-348 - Ji Hoon Yang, Seung-Jung Shin, Dong Kyun Lim, Jeong Jin Kang:
Robust Congestion Control Design for Input Time Delayed AQM System. 349-358 - Dong-Sung Ryu, Kwanghwi Kim, Hwan-Gue Cho:
An Intelligent Clustering Method for Highly Similar Digital Photos Using Pyramid Matching with Human Perceptual 25 Color Histogram. 359-366 - Yong-Kyun Cho, Young-Bum Park:
Requirements Analysis and Critical Requirement Derivation Method Using Macrostruktur. 367-377 - Jang Mook Kang, Jae Sang Cha, You-Jin Song, Goo-Man Park, Eun-Young Ko, Myong-Chul Shin, Jeong Jin Kang, YouSik Hong:
A Scheme for Role-Based 3D CCTV Using CS-RBAC (Context-Sensitivity Role-Based Access Control). 378-383 - Jangsik Park, Hyuntae Kim, Gyuyeong Kim, Yunsik Yu:
Vessel Tracking Using Adaboost Algorithm and AIS Information. 384-388 - Xing Xiong, Byung-Jae Choi:
Relative Self-Localization Base on Fish-Eye Lenses and SIFT Algorithm for Indoor Mobile Robot. 389-394 - Wonjun Jang, Sikwan Cho, Hyung-Woo Lee:
User-Oriented Pseudo Biometric Image Based One-Time Password Mechanism on Smart Phone. 395-404
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.