default search action
9th SIN 2016: Newark, NJ, USA
- Proceedings of the 9th International Conference on Security of Information and Networks, Newark, NJ, USA, July 20-22, 2016. ACM 2016, ISBN 978-1-4503-4764-8
Access Control and Intrusion Detection
- Deepak Subramanian, Guillaume Hiet, Christophe Bidan:
Preventive information flow control through a mechanism of split addresses. 1-8 - Kiran B. Raja, Ramachandra Raghavendra, Christoph Busch:
Color Adaptive Quantized Patterns for Presentation Attack Detection in Ocular Biometric Systems. 9-15 - Ussama Yakub, Vijayalakshmi Atluri, Jaideep Vaidya:
Efficient Evaluation of Authorizations for Video Data. 16-23 - Ramachandra Raghavendra, Kiran B. Raja, Christoph Busch:
Impact of Drug Abuse on Face Recognition Systems: A Preliminary Study. 24-27 - Salem Benferhat, Mouslim Tolba, Karim Tabia, Abdelkader Belkhir:
Integrating non elementary actions in access control models. 28-31 - Robert Bronte, Hossain Shahriar, Hisham M. Haddad:
A Signature-Based Intrusion Detection System for Web Applications based on Genetic Algorithm. 32-39
Cloud Security
- Hao Jiang, Ahmed Bouabdallah, Amin Aflatoonian, Jean-Marie Bonnin, Karine Guillouard:
A Secure Multi-Tenant Framework for SDN. 40-44 - Yong-pyo Hong, Youngjun Kim:
A Study on Unified Security Mechanism and Platform for Centralized Business Contents. 45-48 - Sardar Hussain, Richard O. Sinnott, Ron Poet:
Security-enabled Enactment of Decentralized Workflows. 49-56 - Manel Medhioub, Mohamed Hamdi, Tai-Hoon Kim:
A New Authentication Scheme for Cloud-based Storage Applications. 57-60
Computational Intelligence Techniques in Security
- Safwan Alam, Khalil El-Khatib:
Phishing Susceptibility Detection through Social Media Analytics. 61-64 - Andrey Yu. Chernov, Artem S. Konoplev, Dmitry P. Zegzhda:
Applying Virtualization Technology for the Construction of Trusted Executable Environment. 65-66 - Vladimir Eliseev, Anastasiya Gurina:
Algorithms for network server anomaly behavior detection without traffic content inspection. 67-71 - Alexey A. Tselykh, Margarita Knyazeva, Elena Popkova, Antonina Durfee, Alexander N. Tselykh:
An Attributed Graph Mining Approach to Detect Transfer Pricing Fraud. 72-75
Computer Network Defense
- Giovanni Bottazzi, Giuseppe F. Italiano, Giuseppe Giulio Rutigliano:
Frequency Domain Analysis of Large-Scale Proxy Logs for Botnet Traffic Detection. 76-80 - Peter D. Zegzhda, Dmitry P. Zegzhda, Maxim O. Kalinin, Alexander I. Pechenkin, Alexander Minin, Daria S. Lavrova:
Safe Integration of SIEM Systems with Internet of Things: Data Aggregation, Integrity Control, and Bioinspired Safe Routing. 81-87 - Myria Bouhaddi, Kamel Adi, Mohammed Said Radjef:
Evolutionary Game-Based Defense Mechanism in the MANETs. 88-95
Cryptographic Techniques and Key Management
- Sonam Chauhan, Ajay Sharma:
Fuzzy Commitment Scheme based on Reed Solomon Codes. 96-99 - Ludmila K. Babenko, Ekaterina Maro, Maxim Anikeev:
Modeling of Algebraic Analysis of GOST+ Cipher in SageMath. 100-103 - Evgeniya Ishchukova, Ludmila K. Babenko, Maxim Anikeev:
Fast Implementation and Cryptanalysis of GOST R 34.12-2015 Block Ciphers. 104-111 - Alexander G. Chefranov, Amir Narimani:
Participant Authenticating, Error Detecting, and 100% Multiple Errors Repairing Chang-Chen-Wang's Secret Sharing Method Enhancement. 112-115
Network Security and Protocols
- Alexandr S. Basan, Elena Basan, Oleg B. Makarevich:
Development of the Hierarchal Trust management System for Mobile Cluster-based Wireless Sensor Network. 116-122 - Jagjot Kaur, Dale Lindskog:
An Algorithm to Facilitate Intrusion Response in Mobile Ad Hoc Networks. 124-128 - Manel Elleuchi, Omar Cheikhrouhou, Abdulfattah Mohammad Obeid, Mohamed Abid:
An Efficient Secure scheme for Wireless Sensor Networks. 129-132 - Mohammadreza Soltan Aghaei, Elham Zamani:
The Improved Protocols Based on AODV in terms of Quality and Security in MANET Network. 133-135
Security Protocols, Models, Trust and Privacy
- Martin Stokkenes, Ramachandra Raghavendra, Christoph Busch:
Biometric Authentication Protocols on Smartphones: An Overview. 136-140 - Mouna Jouini, Latifa Ben Arfa Rabai:
A Scalable Threats Classification Model in Information Systems. 141-144 - Goutham Reddy Alavalapati, Eun-Jun Yoon, Ashok Kumar Das, Kee-Young Yoo:
An Enhanced Anonymous Two-factor Mutual Authentication with Key-agreement Scheme for Session Initiation Protocol. 145-149 - Kun He, Christophe Bidan, Gaëtan Le Guelvouit:
Experimentation of Privacy Protection for JPEG Contents on Image-Sharing Platforms. 150-157 - Roger Jardí-Cedó, Macià Mut Puigserver, Jordi Castellà-Roca, Magdalena Payeras-Capellà, Alexandre Viejo:
Privacy-preserving Electronic Road Pricing System for Multifare Low Emission Zones. 158-165 - Xavier J. A. Bellekens, Greig Paul, Christos Tachtatzis, James Irvine, Robert C. Atkinson:
Strategies for Protecting Intellectual Property when Using CUDA Applications on Graphics Processing Units. 166-173 - Hye-Young Kim:
A Study of a Smart IT Convergence Framework in IoT. 174-175 - Vladimir I. Vorobiev, Elena L. Evnevich, Roza R. Fatkieva, Ludmila N. Fedorchenko, Dmitriy K. Levonevskiy:
Criteria and Indices of Computer Network Protection. 176-177
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.