Search dblp for Publications

export results for "toc:db/conf/sersc-isa/isa2010c.bht:"

 download as .bib file

@inproceedings{DBLP:conf/sersc-isa/Ahmad10,
  author       = {Mushtaq Ahmad},
  editor       = {Samir Kumar Bandyopadhyay and
                  Wael Adi and
                  Tai{-}Hoon Kim and
                  Yang Xiao},
  title        = {Security Risks of Cloud Computing and Its Emergence as 5th Utility
                  Service},
  booktitle    = {Information Security and Assurance - 4th International Conference,
                  {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {76},
  pages        = {209--219},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13365-7\_20},
  doi          = {10.1007/978-3-642-13365-7\_20},
  timestamp    = {Tue, 20 Aug 2024 07:54:44 +0200},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/Ahmad10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sersc-isa/AlhabeebALS10,
  author       = {Mohammed A. Alhabeeb and
                  Abdullah Mohammed Almuhaideb and
                  Phu Dung Le and
                  Bala Srinivasan},
  editor       = {Samir Kumar Bandyopadhyay and
                  Wael Adi and
                  Tai{-}Hoon Kim and
                  Yang Xiao},
  title        = {A New Holistic Security Approach for Government Critical Systems:
                  Flooding Prevention},
  booktitle    = {Information Security and Assurance - 4th International Conference,
                  {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {76},
  pages        = {249--264},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13365-7\_25},
  doi          = {10.1007/978-3-642-13365-7\_25},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/AlhabeebALS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sersc-isa/AliK10,
  author       = {Aftab Ali and
                  Farrukh Aslam Khan},
  editor       = {Samir Kumar Bandyopadhyay and
                  Wael Adi and
                  Tai{-}Hoon Kim and
                  Yang Xiao},
  title        = {An Improved EKG-Based Key Agreement Scheme for Body Area Networks},
  booktitle    = {Information Security and Assurance - 4th International Conference,
                  {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {76},
  pages        = {298--308},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13365-7\_29},
  doi          = {10.1007/978-3-642-13365-7\_29},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/AliK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sersc-isa/AmiruzzamanAC10,
  author       = {Md. Amiruzzaman and
                  Mohammad Abdullah{-}Al{-}Wadud and
                  Yoojin Chung},
  editor       = {Samir Kumar Bandyopadhyay and
                  Wael Adi and
                  Tai{-}Hoon Kim and
                  Yang Xiao},
  title        = {An Analysis of Syndrome Coding},
  booktitle    = {Information Security and Assurance - 4th International Conference,
                  {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {76},
  pages        = {37--50},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13365-7\_5},
  doi          = {10.1007/978-3-642-13365-7\_5},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/AmiruzzamanAC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sersc-isa/BalitanasK10,
  author       = {Maricel O. Balitanas and
                  Tai{-}Hoon Kim},
  editor       = {Samir Kumar Bandyopadhyay and
                  Wael Adi and
                  Tai{-}Hoon Kim and
                  Yang Xiao},
  title        = {{IPV6} Mobile Network Protocol Weaknesses and a Cryptosystem Approach},
  booktitle    = {Information Security and Assurance - 4th International Conference,
                  {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {76},
  pages        = {116--127},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13365-7\_12},
  doi          = {10.1007/978-3-642-13365-7\_12},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/BalitanasK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sersc-isa/BhattacharyyaCYLK10,
  author       = {Debnath Bhattacharyya and
                  Arijit Chakraborty and
                  Feruza Sattarova Yusufovna and
                  Young{-}Hun Lee and
                  Tai{-}Hoon Kim},
  editor       = {Samir Kumar Bandyopadhyay and
                  Wael Adi and
                  Tai{-}Hoon Kim and
                  Yang Xiao},
  title        = {Lane Design for Speed Optimization},
  booktitle    = {Information Security and Assurance - 4th International Conference,
                  {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {76},
  pages        = {97--107},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13365-7\_10},
  doi          = {10.1007/978-3-642-13365-7\_10},
  timestamp    = {Thu, 09 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/BhattacharyyaCYLK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sersc-isa/BhattacharyyaSRPAK10,
  author       = {Debnath Bhattacharyya and
                  A. Shrotri and
                  S. C. Rethrekar and
                  M. H. Patil and
                  Farkhod A. Alisherov and
                  Tai{-}Hoon Kim},
  editor       = {Samir Kumar Bandyopadhyay and
                  Wael Adi and
                  Tai{-}Hoon Kim and
                  Yang Xiao},
  title        = {Biometric Authentication Using Infrared Imaging of Hand Vein Patterns},
  booktitle    = {Information Security and Assurance - 4th International Conference,
                  {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {76},
  pages        = {108--115},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13365-7\_11},
  doi          = {10.1007/978-3-642-13365-7\_11},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/BhattacharyyaSRPAK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sersc-isa/ChaurasiaVT10,
  author       = {Brijesh Kumar Chaurasia and
                  Shekhar Verma and
                  G. S. Tomar},
  editor       = {Samir Kumar Bandyopadhyay and
                  Wael Adi and
                  Tai{-}Hoon Kim and
                  Yang Xiao},
  title        = {Infrastructure Aided Privacy Preserving-Authentication in VANETs},
  booktitle    = {Information Security and Assurance - 4th International Conference,
                  {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {76},
  pages        = {179--189},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13365-7\_17},
  doi          = {10.1007/978-3-642-13365-7\_17},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/ChaurasiaVT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sersc-isa/ChenHS10,
  author       = {Tien{-}Ho Chen and
                  Han{-}Cheng Hsiang and
                  Wei{-}Kuan Shih},
  editor       = {Samir Kumar Bandyopadhyay and
                  Wael Adi and
                  Tai{-}Hoon Kim and
                  Yang Xiao},
  title        = {Security Improvement on a Remote User Authentication Scheme Using
                  Smart Cards},
  booktitle    = {Information Security and Assurance - 4th International Conference,
                  {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {76},
  pages        = {9--16},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13365-7\_2},
  doi          = {10.1007/978-3-642-13365-7\_2},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/ChenHS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sersc-isa/GilaniZK10,
  author       = {Syed Sherjeel Ahmad Gilani and
                  Muhammad Zubair and
                  Zeeshan Shafi Khan},
  editor       = {Samir Kumar Bandyopadhyay and
                  Wael Adi and
                  Tai{-}Hoon Kim and
                  Yang Xiao},
  title        = {Receiver Based Traffic Control Mechanism to Protect Low Capacity Network
                  in Infrastructure Based Wireless Mesh Network},
  booktitle    = {Information Security and Assurance - 4th International Conference,
                  {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {76},
  pages        = {225--232},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13365-7\_22},
  doi          = {10.1007/978-3-642-13365-7\_22},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/GilaniZK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sersc-isa/GiriBSJ10,
  author       = {Debasis Giri and
                  Prithayan Barua and
                  P. D. Srivastava and
                  Biswapati Jana},
  editor       = {Samir Kumar Bandyopadhyay and
                  Wael Adi and
                  Tai{-}Hoon Kim and
                  Yang Xiao},
  title        = {A Cryptosystem for Encryption and Decryption of Long Confidential
                  Messages},
  booktitle    = {Information Security and Assurance - 4th International Conference,
                  {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {76},
  pages        = {86--96},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13365-7\_9},
  doi          = {10.1007/978-3-642-13365-7\_9},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/GiriBSJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sersc-isa/GuptaKST10a,
  author       = {Phalguni Gupta and
                  Dakshina Ranjan Kisku and
                  Jamuna Kanta Sing and
                  Massimo Tistarelli},
  editor       = {Samir Kumar Bandyopadhyay and
                  Wael Adi and
                  Tai{-}Hoon Kim and
                  Yang Xiao},
  title        = {Maximized Posteriori Attributes Selection from Facial Salient Landmarks
                  for Face Recognition},
  booktitle    = {Information Security and Assurance - 4th International Conference,
                  {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {76},
  pages        = {1--8},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13365-7\_1},
  doi          = {10.1007/978-3-642-13365-7\_1},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/GuptaKST10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sersc-isa/HuangJGFZ10,
  author       = {Xin Huang and
                  Yang Jiang and
                  Xiong Gao and
                  Rong Fu and
                  Tingting Zhang},
  editor       = {Samir Kumar Bandyopadhyay and
                  Wael Adi and
                  Tai{-}Hoon Kim and
                  Yang Xiao},
  title        = {Sensor Aided Authentication},
  booktitle    = {Information Security and Assurance - 4th International Conference,
                  {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {76},
  pages        = {265--277},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13365-7\_26},
  doi          = {10.1007/978-3-642-13365-7\_26},
  timestamp    = {Tue, 15 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/HuangJGFZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sersc-isa/IqbalKW10,
  author       = {Mian Muhammad Waseem Iqbal and
                  Firdous Kausar and
                  Muhammad Arif Wahla},
  editor       = {Samir Kumar Bandyopadhyay and
                  Wael Adi and
                  Tai{-}Hoon Kim and
                  Yang Xiao},
  title        = {Attacks on Bluetooth Security Architecture and Its Countermeasures},
  booktitle    = {Information Security and Assurance - 4th International Conference,
                  {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {76},
  pages        = {190--197},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13365-7\_18},
  doi          = {10.1007/978-3-642-13365-7\_18},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/IqbalKW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sersc-isa/IsazaCLCL10,
  author       = {Gustavo A. Isaza and
                  Andr{\'{e}}s G. Castillo and
                  Marcelo L{\'{o}}pez and
                  Luis Fernando Castillo and
                  Manuel L{\'{o}}pez},
  editor       = {Samir Kumar Bandyopadhyay and
                  Wael Adi and
                  Tai{-}Hoon Kim and
                  Yang Xiao},
  title        = {Intrusion Correlation Using Ontologies and Multi-agent Systems},
  booktitle    = {Information Security and Assurance - 4th International Conference,
                  {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {76},
  pages        = {51--63},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13365-7\_6},
  doi          = {10.1007/978-3-642-13365-7\_6},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/IsazaCLCL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sersc-isa/KhanKM10,
  author       = {Muhammad Asif Khan and
                  Firdous Kausar and
                  Ashraf Masood},
  editor       = {Samir Kumar Bandyopadhyay and
                  Wael Adi and
                  Tai{-}Hoon Kim and
                  Yang Xiao},
  title        = {Modified Anonymous Authentication Scheme with Enhanced Security for
                  Wireless Communication},
  booktitle    = {Information Security and Assurance - 4th International Conference,
                  {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {76},
  pages        = {198--208},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13365-7\_19},
  doi          = {10.1007/978-3-642-13365-7\_19},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/KhanKM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sersc-isa/Kim10a,
  author       = {Tai{-}Hoon Kim},
  editor       = {Samir Kumar Bandyopadhyay and
                  Wael Adi and
                  Tai{-}Hoon Kim and
                  Yang Xiao},
  title        = {Pattern Recognition Using Artificial Neural Network: {A} Review},
  booktitle    = {Information Security and Assurance - 4th International Conference,
                  {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {76},
  pages        = {138--148},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13365-7\_14},
  doi          = {10.1007/978-3-642-13365-7\_14},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/Kim10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sersc-isa/LeeCK10,
  author       = {Hae Young Lee and
                  Tae Ho Cho and
                  Hyung{-}Jong Kim},
  editor       = {Samir Kumar Bandyopadhyay and
                  Wael Adi and
                  Tai{-}Hoon Kim and
                  Yang Xiao},
  title        = {Fuzzy-Based Detection of Injected False Data in Wireless Sensor Networks},
  booktitle    = {Information Security and Assurance - 4th International Conference,
                  {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {76},
  pages        = {128--137},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13365-7\_13},
  doi          = {10.1007/978-3-642-13365-7\_13},
  timestamp    = {Thu, 26 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/LeeCK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sersc-isa/LeePP10,
  author       = {Kijeong Lee and
                  Byungjoo Park and
                  Gil{-}Cheol Park},
  editor       = {Samir Kumar Bandyopadhyay and
                  Wael Adi and
                  Tai{-}Hoon Kim and
                  Yang Xiao},
  title        = {Tag {ID} Subdivision Scheme for Efficient Authentication and Security-Enhancement
                  of {RFID} System in {USN}},
  booktitle    = {Information Security and Assurance - 4th International Conference,
                  {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {76},
  pages        = {64--71},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13365-7\_7},
  doi          = {10.1007/978-3-642-13365-7\_7},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/LeePP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sersc-isa/MohamadHD10,
  author       = {Kamaruddin Malik Mohamad and
                  Tutut Herawan and
                  Mustafa Mat Deris},
  editor       = {Samir Kumar Bandyopadhyay and
                  Wael Adi and
                  Tai{-}Hoon Kim and
                  Yang Xiao},
  title        = {Dual-Byte-Marker Algorithm for Detecting {JFIF} Header},
  booktitle    = {Information Security and Assurance - 4th International Conference,
                  {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {76},
  pages        = {17--26},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13365-7\_3},
  doi          = {10.1007/978-3-642-13365-7\_3},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/MohamadHD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sersc-isa/MohamadHD10a,
  author       = {Kamaruddin Malik Mohamad and
                  Tutut Herawan and
                  Mustafa Mat Deris},
  editor       = {Samir Kumar Bandyopadhyay and
                  Wael Adi and
                  Tai{-}Hoon Kim and
                  Yang Xiao},
  title        = {Hiding Data in {JPEG} Using in-DQT Technique},
  booktitle    = {Information Security and Assurance - 4th International Conference,
                  {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {76},
  pages        = {27--36},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13365-7\_4},
  doi          = {10.1007/978-3-642-13365-7\_4},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/MohamadHD10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sersc-isa/Mrabet10,
  author       = {Nadia El Mrabet},
  editor       = {Samir Kumar Bandyopadhyay and
                  Wael Adi and
                  Tai{-}Hoon Kim and
                  Yang Xiao},
  title        = {Fault Attacks against the Miller's Algorithm in Edwards Coordinates},
  booktitle    = {Information Security and Assurance - 4th International Conference,
                  {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {76},
  pages        = {72--85},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13365-7\_8},
  doi          = {10.1007/978-3-642-13365-7\_8},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/Mrabet10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sersc-isa/NaumanA10,
  author       = {Mohammad Nauman and
                  Tamleek Ali},
  editor       = {Samir Kumar Bandyopadhyay and
                  Wael Adi and
                  Tai{-}Hoon Kim and
                  Yang Xiao},
  title        = {{TOKEN:} Trustable Keystroke-Based Authentication for Web-Based Applications
                  on Smartphones},
  booktitle    = {Information Security and Assurance - 4th International Conference,
                  {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {76},
  pages        = {286--297},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13365-7\_28},
  doi          = {10.1007/978-3-642-13365-7\_28},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/NaumanA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sersc-isa/RahimKM10,
  author       = {Aneel Rahim and
                  Zeeshan Shafi Khan and
                  Fahad Bin Muhaya},
  editor       = {Samir Kumar Bandyopadhyay and
                  Wael Adi and
                  Tai{-}Hoon Kim and
                  Yang Xiao},
  title        = {Performance Evaluation of Video Streaming in Vehicular Adhoc Network},
  booktitle    = {Information Security and Assurance - 4th International Conference,
                  {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {76},
  pages        = {220--224},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13365-7\_21},
  doi          = {10.1007/978-3-642-13365-7\_21},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/RahimKM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sersc-isa/ShafiRMAS10,
  author       = {Rehan Shafi and
                  Aneel Rahim and
                  Fahad Bin Muhaya and
                  Shehzad Ashraf and
                  Muhammad Sher},
  editor       = {Samir Kumar Bandyopadhyay and
                  Wael Adi and
                  Tai{-}Hoon Kim and
                  Yang Xiao},
  title        = {Secure Mechanism for Handling Targeted Attacks in Infrastructure Based
                  Wireless Mesh Networks},
  booktitle    = {Information Security and Assurance - 4th International Conference,
                  {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {76},
  pages        = {233--240},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13365-7\_23},
  doi          = {10.1007/978-3-642-13365-7\_23},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/ShafiRMAS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sersc-isa/ShiraziAII10,
  author       = {Syed Noor{-}ul{-}Hassan Shirazi and
                  Muhammad Asim and
                  Muhammad Irfan and
                  Nassar Ikram},
  editor       = {Samir Kumar Bandyopadhyay and
                  Wael Adi and
                  Tai{-}Hoon Kim and
                  Yang Xiao},
  title        = {{MPLS} Unleashed: Remedy Using {IPSEC} over {MPLS} {VPN}},
  booktitle    = {Information Security and Assurance - 4th International Conference,
                  {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {76},
  pages        = {241--248},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13365-7\_24},
  doi          = {10.1007/978-3-642-13365-7\_24},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/ShiraziAII10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sersc-isa/VeijalainenSK10,
  author       = {Jari Veijalainen and
                  Alexander Semenov and
                  Jorma Kypp{\"{o}}},
  editor       = {Samir Kumar Bandyopadhyay and
                  Wael Adi and
                  Tai{-}Hoon Kim and
                  Yang Xiao},
  title        = {Tracing Potential School Shooters in the Digital Sphere},
  booktitle    = {Information Security and Assurance - 4th International Conference,
                  {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {76},
  pages        = {163--178},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13365-7\_16},
  doi          = {10.1007/978-3-642-13365-7\_16},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/VeijalainenSK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sersc-isa/WuSSH10,
  author       = {Raymond Wu and
                  Keisuke Seki and
                  Ryusuke Sakamoto and
                  Masayuki Hisada},
  editor       = {Samir Kumar Bandyopadhyay and
                  Wael Adi and
                  Tai{-}Hoon Kim and
                  Yang Xiao},
  title        = {Knowledge-Base Semantic Gap Analysis for the Vulnerability Detection},
  booktitle    = {Information Security and Assurance - 4th International Conference,
                  {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {76},
  pages        = {278--285},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13365-7\_27},
  doi          = {10.1007/978-3-642-13365-7\_27},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/WuSSH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sersc-isa/XiaoX10,
  author       = {Zhifeng Xiao and
                  Yang Xiao},
  editor       = {Samir Kumar Bandyopadhyay and
                  Wael Adi and
                  Tai{-}Hoon Kim and
                  Yang Xiao},
  title        = {PeerReview Analysis and Re-evaluation for Accountability in Distributed
                  Systems or Networks},
  booktitle    = {Information Security and Assurance - 4th International Conference,
                  {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {76},
  pages        = {149--162},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13365-7\_15},
  doi          = {10.1007/978-3-642-13365-7\_15},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/XiaoX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sersc-isa/YoukL10,
  author       = {Sang{-}Jo Youk and
                  Bong Keun Lee},
  editor       = {Samir Kumar Bandyopadhyay and
                  Wael Adi and
                  Tai{-}Hoon Kim and
                  Yang Xiao},
  title        = {Multi-agent Reinforcement Learning Model for Effective Action Selection},
  booktitle    = {Information Security and Assurance - 4th International Conference,
                  {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {76},
  pages        = {309--317},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13365-7\_30},
  doi          = {10.1007/978-3-642-13365-7\_30},
  timestamp    = {Wed, 06 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/YoukL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sersc-isa/2010c,
  editor       = {Samir Kumar Bandyopadhyay and
                  Wael Adi and
                  Tai{-}Hoon Kim and
                  Yang Xiao},
  title        = {Information Security and Assurance - 4th International Conference,
                  {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {76},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13365-7},
  doi          = {10.1007/978-3-642-13365-7},
  isbn         = {978-3-642-13364-0},
  timestamp    = {Tue, 20 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/2010c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}