


default search action
9th SIN 2016: Newark, NJ, USA
- Proceedings of the 9th International Conference on Security of Information and Networks, Newark, NJ, USA, July 20-22, 2016. ACM 2016, ISBN 978-1-4503-4764-8

Access Control and Intrusion Detection
- Deepak Subramanian, Guillaume Hiet, Christophe Bidan:

Preventive information flow control through a mechanism of split addresses. 1-8 - Kiran B. Raja, Ramachandra Raghavendra

, Christoph Busch
:
Color Adaptive Quantized Patterns for Presentation Attack Detection in Ocular Biometric Systems. 9-15 - Ussama Yakub

, Vijayalakshmi Atluri
, Jaideep Vaidya:
Efficient Evaluation of Authorizations for Video Data. 16-23 - Ramachandra Raghavendra

, Kiran B. Raja, Christoph Busch
:
Impact of Drug Abuse on Face Recognition Systems: A Preliminary Study. 24-27 - Salem Benferhat

, Mouslim Tolba, Karim Tabia, Abdelkader Belkhir
:
Integrating non elementary actions in access control models. 28-31 - Robert Bronte, Hossain Shahriar

, Hisham M. Haddad:
A Signature-Based Intrusion Detection System for Web Applications based on Genetic Algorithm. 32-39
Cloud Security
- Hao Jiang, Ahmed Bouabdallah, Amin Aflatoonian, Jean-Marie Bonnin, Karine Guillouard:

A Secure Multi-Tenant Framework for SDN. 40-44 - Yong-pyo Hong, Youngjun Kim:

A Study on Unified Security Mechanism and Platform for Centralized Business Contents. 45-48 - Sardar Hussain, Richard O. Sinnott

, Ron Poet:
Security-enabled Enactment of Decentralized Workflows. 49-56 - Manel Medhioub, Mohamed Hamdi, Tai-Hoon Kim:

A New Authentication Scheme for Cloud-based Storage Applications. 57-60
Computational Intelligence Techniques in Security
- Safwan Alam, Khalil El-Khatib:

Phishing Susceptibility Detection through Social Media Analytics. 61-64 - Andrey Yu. Chernov, Artem S. Konoplev, Dmitry P. Zegzhda:

Applying Virtualization Technology for the Construction of Trusted Executable Environment. 65-66 - Vladimir Eliseev

, Anastasiya Gurina
:
Algorithms for network server anomaly behavior detection without traffic content inspection. 67-71 - Alexey A. Tselykh, Margarita Knyazeva, Elena Popkova, Antonina Durfee, Alexander N. Tselykh:

An Attributed Graph Mining Approach to Detect Transfer Pricing Fraud. 72-75
Computer Network Defense
- Giovanni Bottazzi, Giuseppe F. Italiano

, Giuseppe Giulio Rutigliano
:
Frequency Domain Analysis of Large-Scale Proxy Logs for Botnet Traffic Detection. 76-80 - Peter D. Zegzhda

, Dmitry P. Zegzhda, Maxim O. Kalinin
, Alexander I. Pechenkin, Alexander Minin, Daria S. Lavrova:
Safe Integration of SIEM Systems with Internet of Things: Data Aggregation, Integrity Control, and Bioinspired Safe Routing. 81-87 - Myria Bouhaddi

, Kamel Adi
, Mohammed Said Radjef
:
Evolutionary Game-Based Defense Mechanism in the MANETs. 88-95
Cryptographic Techniques and Key Management
- Sonam Chauhan, Ajay Sharma

:
Fuzzy Commitment Scheme based on Reed Solomon Codes. 96-99 - Ludmila K. Babenko

, Ekaterina Maro
, Maxim Anikeev
:
Modeling of Algebraic Analysis of GOST+ Cipher in SageMath. 100-103 - Evgeniya Ishchukova, Ludmila K. Babenko

, Maxim Anikeev
:
Fast Implementation and Cryptanalysis of GOST R 34.12-2015 Block Ciphers. 104-111 - Alexander G. Chefranov

, Amir Narimani:
Participant Authenticating, Error Detecting, and 100% Multiple Errors Repairing Chang-Chen-Wang's Secret Sharing Method Enhancement. 112-115
Network Security and Protocols
- Alexandr S. Basan

, Elena Basan
, Oleg B. Makarevich
:
Development of the Hierarchal Trust management System for Mobile Cluster-based Wireless Sensor Network. 116-122 - Jagjot Kaur, Dale Lindskog:

An Algorithm to Facilitate Intrusion Response in Mobile Ad Hoc Networks. 124-128 - Manel Elleuchi, Omar Cheikhrouhou

, Abdulfattah Mohammad Obeid, Mohamed Abid:
An Efficient Secure scheme for Wireless Sensor Networks. 129-132 - Mohammadreza Soltan Aghaei, Elham Zamani:

The Improved Protocols Based on AODV in terms of Quality and Security in MANET Network. 133-135
Security Protocols, Models, Trust and Privacy
- Martin Stokkenes, Ramachandra Raghavendra, Christoph Busch

:
Biometric Authentication Protocols on Smartphones: An Overview. 136-140 - Mouna Jouini, Latifa Ben Arfa Rabai

:
A Scalable Threats Classification Model in Information Systems. 141-144 - Goutham Reddy Alavalapati

, Eun-Jun Yoon, Ashok Kumar Das, Kee-Young Yoo:
An Enhanced Anonymous Two-factor Mutual Authentication with Key-agreement Scheme for Session Initiation Protocol. 145-149 - Kun He, Christophe Bidan, Gaëtan Le Guelvouit:

Experimentation of Privacy Protection for JPEG Contents on Image-Sharing Platforms. 150-157 - Roger Jardí-Cedó, Macià Mut Puigserver, Jordi Castellà-Roca

, Magdalena Payeras-Capellà
, Alexandre Viejo
:
Privacy-preserving Electronic Road Pricing System for Multifare Low Emission Zones. 158-165 - Xavier J. A. Bellekens

, Greig Paul, Christos Tachtatzis
, James Irvine
, Robert C. Atkinson
:
Strategies for Protecting Intellectual Property when Using CUDA Applications on Graphics Processing Units. 166-173 - Hye-Young Kim:

A Study of a Smart IT Convergence Framework in IoT. 174-175 - Vladimir I. Vorobiev, Elena L. Evnevich, Roza R. Fatkieva, Ludmila N. Fedorchenko

, Dmitriy K. Levonevskiy:
Criteria and Indices of Computer Network Protection. 176-177

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














