Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Lamiaa M. El Bakrawy, Neveen I. Ghali, Aboul Ella Hassanien, Tai-Hoon Kim |
A Fast and Secure One-Way Hash Function. |
FGIT-SecTech |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yindong Chen |
A Family Constructions of Odd-Variable Boolean Function with Optimum Algebraic Immunity. |
FGIT-SecTech |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Dominik Malcik, Martin Drahanský |
Microscopic Analysis of Chips. |
FGIT-SecTech |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ju-Sung Kang, Dowon Hong |
On Fast Private Scalar Product Protocols. |
FGIT-SecTech |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Bo Zhang 0020 |
An ID-Based Broadcast Signcryption Scheme Secure in the Standard Model. |
FGIT-SecTech |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Danilo Valeros Bernardo, Doan B. Hoang |
Formalization and Information-Theoretic Soundness in the Development of Security Architecture for Next Generation Network Protocol - UDT. |
FGIT-SecTech |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yuan Tian 0003, Biao Song, Eui-nam Huh |
A Parameterized Privacy-Aware Pub-sub System in Smart Work. |
FGIT-SecTech |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Heba F. Eid, Mostafa A. Salama, Aboul Ella Hassanien, Tai-Hoon Kim |
Bi-Layer Behavioral-Based Feature Selection Approach for Network Intrusion Classification. |
FGIT-SecTech |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Theodosios Tsiakis, Aristeidis Chatzipoulidis, Theodoros Kargidis, Athanasios Belidis |
Information Technology Security Governance Approach Comparison in E-banking. |
FGIT-SecTech |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Tai-Hoon Kim, Hojjat Adeli, Wai-Chi Fang, L. Javier García-Villalba, Kirk P. Arnett, Muhammad Khurram Khan (eds.) |
Security Technology - International Conference, SecTech 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings |
FGIT-SecTech |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Rahul Saha, G. Geetha 0001, Gang-soo Lee |
CLAPTCHA- A Novel Captcha. |
FGIT-SecTech |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Vrizlynn L. L. Thing, Wee-Yong Lim, Junming Zeng, Darell J. J. Tan, Yu Chen |
Design of a Modular Framework for Noisy Logo Classification in Fraud Detection. |
FGIT-SecTech |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yu Chen, Vrizlynn L. L. Thing |
A Noise-Tolerant Enhanced Classification Method for Logo Detection and Brand Classification. |
FGIT-SecTech |
2011 |
DBLP DOI BibTeX RDF |
|
1 | David Rebollo-Monedero, Javier Parra-Arnau, Jordi Forné |
An Information-Theoretic Privacy Criterion for Query Forgery in Information Retrieval. |
FGIT-SecTech |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Hae-Jung Kim, Eun-Jun Yoon |
Cryptanalysis of an Enhanced Simple Three-Party Key Exchange Protocol. |
FGIT-SecTech |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sunguk Lee, Taeheon Kang, Rosslin John Robles, Sung-gyu Kim, Byungjoo Park |
A Study on Domain Name System as Lookup Manager for Wireless/Mobile Systems in IPv6 Networks. |
FGIT-SecTech |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Gulshan Kumar, Mritunjay Kumar Rai, Gang-soo Lee |
An Approach to Provide Security in Wireless Sensor Network Using Block Mode of Cipher. |
FGIT-SecTech |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yi-Ming Chen 0008, Cheng-En Chuang, Hsu-Che Liu, Cheng-Yi Ni, Chun-Tang Wang |
Using Agent in Virtual Machine for Interactive Security Training. |
FGIT-SecTech |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ruo Ando, Kuniyasu Suzaki |
A Lightweight Access Log Filter of Windows OS Using Simple Debug Register Manipulation. |
FGIT-SecTech |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Pranab Kumar Dhar, Mohammad Ibrahim Khan, Sunil Dhar, Jong-Myon Kim |
Robust Audio Watermarking Scheme Based on Short Time Fourier Transformation and Singular Value Decomposition. |
FGIT-SecTech |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Vivy Suhendra |
A Survey on Access Control Deployment. |
FGIT-SecTech |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Guo-Hui Zhou |
An Effective Distance-Computing Method for Network Anomaly Detection. |
FGIT-SecTech |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Panayotis E. Nastou, Yannis C. Stamatiou |
A Distributed, Parametric Platform for Constructing Secure SBoxes in Block Cipher Designs. |
FGIT-SecTech |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Shinsaku Kiyomoto, Kazuhide Fukushima, Yutaka Miyake |
Data Anonymity in Multi-Party Service Model. |
FGIT-SecTech |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Abdelouahed Gherbi, Robert Charpentier |
Diversity-Based Approaches to Software Systems Security. |
FGIT-SecTech |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sheikh Ziauddin |
A Two-Factor Mutual Authentication Scheme Using Biometrics and Smart Card. |
FGIT-SecTech |
2009 |
DBLP DOI BibTeX RDF |
|
1 | M. S. V. S. Bhadri Raju, B. Vishnu Vardhan, G. A. Naidu, L. Pratap Reddy, A. Vinaya Babu |
Analysis of Text Complexity in a Crypto System - A Case Study on Telugu. |
FGIT-SecTech |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Aneel Rahim, Fahad bin Muyaha |
Impact of Malicious Node on Broadcast Schemes. |
FGIT-SecTech |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Rakibul Islam, Jinsang Kim |
MIMO Wiretap Channel: A Scalar Approach. |
FGIT-SecTech |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Tabatabai Irani, Edgar R. Weippl |
Automation of Post-exploitation - (Focused on MS-Windows Targets). |
FGIT-SecTech |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Jae-goo Jeong, Seung-yong Hur, Gang-Soo Lee |
A Development of Finite State Machine Create Tool for Cryptography Module Validation. |
FGIT-SecTech |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Seyed Hossein Ahmadinejad, Saeed Jalili |
Correlating Alerts into Compressed Graphs Using an Attribute-Based Method and Time Windows. |
FGIT-SecTech |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Martin Drahanský, Filip Orság, Petr Hanácek |
Accelerometer Based Digital Video Stabilization for Security Surveillance Systems. |
FGIT-SecTech |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Brian King |
A Simple Encryption Scheme for Binary Elliptic Curves. |
FGIT-SecTech |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Jieren Cheng, Jianping Yin, Yun Liu, Zhiping Cai, Chengkun Wu |
Detecting Distributed Denial of Service Attack Based on Multi-feature Fusion. |
FGIT-SecTech |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Jaeseung Hong, Jongwung Kim, Jeonghun Cho |
The Trend of the Security Research for the Insider Cyber Threat. |
FGIT-SecTech |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Qiang Yan 0001, Yingjiu Li, Tieyan Li, Robert H. Deng |
Insights into Malware Detection and Prevention on Mobile Phones. |
FGIT-SecTech |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Pairat Thorncharoensri, Qiong Huang 0001, Willy Susilo, Man Ho Au, Yi Mu 0001, Duncan S. Wong |
Escrowed Deniable Identification Schemes. |
FGIT-SecTech |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Ji-Jian Chin, Swee-Huay Heng, Bok-Min Goi |
Hierarchical Identity-Based Identification Schemes. |
FGIT-SecTech |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Debnath Bhattacharyya, Poulami Das 0001, Samir Kumar Bandyopadhyay, Tai-Hoon Kim |
Analysis of Handwritten Signature Image. |
FGIT-SecTech |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Yuan Tian 0003, Biao Song, Eui-nam Huh |
A Privacy-Aware System Using Threat-Based Evaluation and Feedback Method in Untrusted Ubiquitous Environments. |
FGIT-SecTech |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Rosslin John Robles, Min-Kyu Choi |
Symmetric-Key Encryption for Wireless Internet SCADA. |
FGIT-SecTech |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Hoon Ko, Jongmyung Choi, Carlos Ramos 0001 |
A Study on Secure Contents Using in Urban Computing. |
FGIT-SecTech |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Filip Orság |
Speaker Dependent Frequency Cepstrum Coefficients. |
FGIT-SecTech |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Seokung Yoon, Hyuncheol Jung, Kyung-Seok Lee |
A Study on the Interworking for SIP-Based Secure VoIP Communication with Security Protocols in the Heterogeneous Network. |
FGIT-SecTech |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Linda Ariani Gunawan, Peter Herrmann, Frank Alexander Kraemer |
Towards the Integration of Security Aspects into System Development Using Collaboration-Oriented Models. |
FGIT-SecTech |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Marek R. Ogiela, Urszula Ogiela |
Shadow Generation Protocol in Linguistic Threshold Schemes. |
FGIT-SecTech |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Peter Pecho, Jan Nagy, Petr Hanácek, Martin Drahanský |
Secure Collection Tree Protocol for Tamper-Resistant Wireless Sensors. |
FGIT-SecTech |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Debnath Bhattacharyya, Poulami Das 0001, Samir Kumar Bandyopadhyay, Tai-Hoon Kim |
Grayscale Image Classification Using Supervised Chromosome Clustering. |
FGIT-SecTech |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Dominik Slezak, Tai-Hoon Kim, Wai-Chi Fang, Kirk P. Arnett (eds.) |
Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings |
FGIT-SecTech |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Gaoshou Zhai, Hanhui Niu, Na Yang, Minli Tian, Chengyu Liu, Hengsheng Yang |
Security Testing for Operating System and Its System Calls. |
FGIT-SecTech |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Abdulaziz S. Almazyad, Yasir Ahmad |
A New Approach in T-FA Authentication with OTP Using Mobile Phone. |
FGIT-SecTech |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Haimin Jin, Duncan S. Wong, Yinlong Xu |
Efficient Group Signature with Forward Secure Revocation. |
FGIT-SecTech |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Jieren Cheng, Boyun Zhang, Jianping Yin, Yun Liu, Zhiping Cai |
DDoS Attack Detection Using Three-State Partition Based on Flow Interaction. |
FGIT-SecTech |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing |
Feature Level Fusion of Biometrics Cues: Human Identification with Doddington's Caricature. |
FGIT-SecTech |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Hsiang-Cheh Huang, Feng-Cheng Chang, Wai-Chi Fang |
Applications of Reversible Data Hiding Techniques with the Quick Response Codes. |
FGIT-SecTech |
2009 |
DBLP DOI BibTeX RDF |
|
1 | David A. Carvalho, Manuela Pereira, Mário M. Freire |
Towards the Detection of Encrypted BitTorrent Traffic through Deep Packet Inspection. |
FGIT-SecTech |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing |
Fusion of Multiple Matchers Using SVM for Offline Signature Identification. |
FGIT-SecTech |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Bo-heung Chung, Min-ho Han, Ki-young Kim |
The Design of Signature Selection for Protecting Illegal Outflow of Sensitive Information in Mobile Device. |
FGIT-SecTech |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Chengkun Wu, Jianping Yin, Zhiping Cai, En Zhu, Jieren Cheng |
An Efficient Pre-filtering Mechanism for Parallel Intrusion Detection Based on Many-Core GPU. |
FGIT-SecTech |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Yonglong Wei, Xiaojuan Zheng, Jinglei Ren, Xudong Zheng, Chen Sun, Zhenhao Li |
Verification of Security-Relevant Behavior Model and Security Policy for Model-Carrying Code. |
FGIT-SecTech |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Tie-Ming Liu, Liehui Jiang, Hongqi He, Ji-zhong Li, Xian Yu |
Researching on Cryptographic Algorithm Recognition Based on Static Characteristic-Code. |
FGIT-SecTech |
2009 |
DBLP DOI BibTeX RDF |
|
1 | DongHo Kang, BoHeung Jung, KiYoung Kim |
Hardware Based Data Inspection for USB Data Leakage Prevention. |
FGIT-SecTech |
2009 |
DBLP DOI BibTeX RDF |
|