


default search action
STA 2011: Loutraki, Greece
- James J. Park, Javier López, Sang-Soo Yeo, Taeshik Shon, David Taniar:
Secure and Trust Computing, Data Management and Applications - 8th FTRA International Conference, STA 2011, Loutraki, Greece, June 28-30, 2011. Proceedings. Communications in Computer and Information Science 186, Springer 2011, ISBN 978-3-642-22338-9
STA2011 - Security Track
- M. Zubair Rafique, Muhammad Khurram Khan
, Khaled Alghathbar, Muddassar Farooq:
Embedding High Capacity Covert Channels in Short Message Service (SMS). 1-10 - M. Zubair Rafique, Muhammad Khurram Khan
, Khaled Alghathbar, Muddassar Farooq:
A Framework for Detecting Malformed SMS Attack. 11-20 - Benjamin Aziz
, Shirley Y. Crompton, Michael D. Wilson
:
A Metadata Model for Data Centric Security. 21-28 - Benjamin Aziz, Alvaro Arenas, Michael D. Wilson
:
SecPAL4DSA: A Policy Language for Specifying Data Sharing Agreements. 29-36 - Krzysztof Barczynski, Przemyslaw Blaskiewicz, Marek Klonowski, Miroslaw Kutylowski:
Self-keying Identification Mechanism for Small Devices. 37-44 - Siegfried Podesser, Ronald Toegl:
A Software Architecture for Introducing Trust in Java-Based Clouds. 45-53 - Jaeik Cho, Kyuwon Choi, Taeshik Shon, Jongsub Moon:
A Network Data Abstraction Method for Data Set Verification. 54-62 - Giorgos Karopoulos, Fabio Martinelli:
IMS Session Management Based on Usage Control. 71-78 - Yuanyuan Zhang, Junzhong Gu:
Using Counter Cache Coherence to Improve Memory Encryptions Performance in Multiprocessor Systems. 79-87 - Bidi Ying, Dimitrios Makrakis, Hussein T. Mouftah, Wenjun Lu:
Dynamic Combinatorial Key Pre-distribution Scheme for Heterogeneous Sensor Networks. 88-95 - Ahmad A. Al-Daraiseh
, Mohammed A. Moharrum:
Exclusion Based VANETs (EBV). 96-104 - Julien Bringer, Hervé Chabanne:
Embedding Edit Distance to Allow Private Keyword Search in Cloud Computing. 105-113 - Chunli Lv, Xiaoqi Jia, Jingqiang Lin, Jiwu Jing, Lijun Tian, Mingli Sun:
Efficient Secret Sharing Schemes. 114-121 - Lu Leng, Jiashu Zhang, Gao Chen
, Muhammad Khurram Khan
, Ping Bai:
Two Dimensional PalmPhasor Enhanced by Multi-orientation Score Level Fusion. 122-129 - Cheonshik Kim
, Dongkyoo Shin, Dongil Shin, Xinpeng Zhang:
Improved Steganographic Embedding Exploiting Modification Direction in Multimedia Communications. 130-138 - Azeddine Chikh, Muhammad Abulaish
, Syed Irfan Nabi
, Khaled Alghathbar:
An Ontology Based Information Security Requirements Engineering Framework. 139-146 - Anton Borg
, Martin Boldt
, Bengt Carlsson:
Simulating Malicious Users in a Software Reputation System. 147-156 - Jongsung Kim, Jong Hyuk Park, Young-Gon Kim:
Weak Keys of the Block Cipher SEED-192 for Related-Key Differential Attacks. 157-163 - Namheun Son, Keun-Gi Lee, Sangjun Jeon, Hyunji Chung, Sangjin Lee, Changhoon Lee:
The Method of Database Server Detection and Investigation in the Enterprise Environment. 164-171
STA2011 - Data Management Track
- Jeongwoo Park, Kwangjae Lee, Wooseok Ryu, Joonho Kwon, Bonghee Hong:
An Efficient Processing Scheme for Continuous Queries Involving RFID and Sensor Data Streams. 187-192 - Gwangsoo Lee, Wooseok Ryu, Bonghee Hong, Joonho Kwon:
Smart Warehouse Modeling Using Re-recording Methodology with Sensor Tag. 193-200 - Muhammad Abulaish
, Syed Irfan Nabi
, Khaled Alghathbar, Azeddine Chikh:
SIMOnt: A Security Information Management Ontology Framework. 201-208 - Younghee Kim, Kyung Soo Cho, Jae Yeol Yoon, Iee Joon Kim, Ungmo Kim:
Using Bloom Filters for Mining Top-k Frequent Itemsets in Data Streams. 209-216 - Wooseok Ryu, Joonho Kwon, Bonghee Hong:
An RSN Tool : A Test Dataset Generator for Evaluating RFID Middleware. 217-224 - Lingli Deng, Qing Yu, Jin Peng:
Adaptive Optimal Global Resource Scheduling for a Cloud-Based Virtualized Resource Pool. 231-240 - Seung Kwan Kim, Younghee Kim, Ungmo Kim:
Maximal Cliques Generating Algorithm for Spatial Co-location Pattern Mining. 241-250

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.