The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "FGIT-SecTech"( http://dblp.L3S.de/Venues/FGIT-SecTech )

URL (DBLP): http://dblp.uni-trier.de/db/conf/fgit

Publication years (Num. hits)
2009 (38) 2011 (25)
Publication types (Num. hits)
inproceedings(61) proceedings(2)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 63 publication records. Showing 63 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Lamiaa M. El Bakrawy, Neveen I. Ghali, Aboul Ella Hassanien, Tai-Hoon Kim A Fast and Secure One-Way Hash Function. Search on Bibsonomy FGIT-SecTech The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yindong Chen A Family Constructions of Odd-Variable Boolean Function with Optimum Algebraic Immunity. Search on Bibsonomy FGIT-SecTech The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Dominik Malcik, Martin Drahanský Microscopic Analysis of Chips. Search on Bibsonomy FGIT-SecTech The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ju-Sung Kang, Dowon Hong On Fast Private Scalar Product Protocols. Search on Bibsonomy FGIT-SecTech The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Bo Zhang 0020 An ID-Based Broadcast Signcryption Scheme Secure in the Standard Model. Search on Bibsonomy FGIT-SecTech The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Danilo Valeros Bernardo, Doan B. Hoang Formalization and Information-Theoretic Soundness in the Development of Security Architecture for Next Generation Network Protocol - UDT. Search on Bibsonomy FGIT-SecTech The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yuan Tian 0003, Biao Song, Eui-nam Huh A Parameterized Privacy-Aware Pub-sub System in Smart Work. Search on Bibsonomy FGIT-SecTech The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Heba F. Eid, Mostafa A. Salama, Aboul Ella Hassanien, Tai-Hoon Kim Bi-Layer Behavioral-Based Feature Selection Approach for Network Intrusion Classification. Search on Bibsonomy FGIT-SecTech The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Theodosios Tsiakis, Aristeidis Chatzipoulidis, Theodoros Kargidis, Athanasios Belidis Information Technology Security Governance Approach Comparison in E-banking. Search on Bibsonomy FGIT-SecTech The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Tai-Hoon Kim, Hojjat Adeli, Wai-Chi Fang, L. Javier García-Villalba, Kirk P. Arnett, Muhammad Khurram Khan (eds.) Security Technology - International Conference, SecTech 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings Search on Bibsonomy FGIT-SecTech The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Rahul Saha, G. Geetha 0001, Gang-soo Lee CLAPTCHA- A Novel Captcha. Search on Bibsonomy FGIT-SecTech The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Vrizlynn L. L. Thing, Wee-Yong Lim, Junming Zeng, Darell J. J. Tan, Yu Chen Design of a Modular Framework for Noisy Logo Classification in Fraud Detection. Search on Bibsonomy FGIT-SecTech The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yu Chen, Vrizlynn L. L. Thing A Noise-Tolerant Enhanced Classification Method for Logo Detection and Brand Classification. Search on Bibsonomy FGIT-SecTech The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1David Rebollo-Monedero, Javier Parra-Arnau, Jordi Forné An Information-Theoretic Privacy Criterion for Query Forgery in Information Retrieval. Search on Bibsonomy FGIT-SecTech The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Hae-Jung Kim, Eun-Jun Yoon Cryptanalysis of an Enhanced Simple Three-Party Key Exchange Protocol. Search on Bibsonomy FGIT-SecTech The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Sunguk Lee, Taeheon Kang, Rosslin John Robles, Sung-gyu Kim, Byungjoo Park A Study on Domain Name System as Lookup Manager for Wireless/Mobile Systems in IPv6 Networks. Search on Bibsonomy FGIT-SecTech The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Gulshan Kumar, Mritunjay Kumar Rai, Gang-soo Lee An Approach to Provide Security in Wireless Sensor Network Using Block Mode of Cipher. Search on Bibsonomy FGIT-SecTech The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yi-Ming Chen 0008, Cheng-En Chuang, Hsu-Che Liu, Cheng-Yi Ni, Chun-Tang Wang Using Agent in Virtual Machine for Interactive Security Training. Search on Bibsonomy FGIT-SecTech The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ruo Ando, Kuniyasu Suzaki A Lightweight Access Log Filter of Windows OS Using Simple Debug Register Manipulation. Search on Bibsonomy FGIT-SecTech The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Pranab Kumar Dhar, Mohammad Ibrahim Khan, Sunil Dhar, Jong-Myon Kim Robust Audio Watermarking Scheme Based on Short Time Fourier Transformation and Singular Value Decomposition. Search on Bibsonomy FGIT-SecTech The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Vivy Suhendra A Survey on Access Control Deployment. Search on Bibsonomy FGIT-SecTech The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Guo-Hui Zhou An Effective Distance-Computing Method for Network Anomaly Detection. Search on Bibsonomy FGIT-SecTech The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Panayotis E. Nastou, Yannis C. Stamatiou A Distributed, Parametric Platform for Constructing Secure SBoxes in Block Cipher Designs. Search on Bibsonomy FGIT-SecTech The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Shinsaku Kiyomoto, Kazuhide Fukushima, Yutaka Miyake Data Anonymity in Multi-Party Service Model. Search on Bibsonomy FGIT-SecTech The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Abdelouahed Gherbi, Robert Charpentier Diversity-Based Approaches to Software Systems Security. Search on Bibsonomy FGIT-SecTech The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Sheikh Ziauddin A Two-Factor Mutual Authentication Scheme Using Biometrics and Smart Card. Search on Bibsonomy FGIT-SecTech The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1M. S. V. S. Bhadri Raju, B. Vishnu Vardhan, G. A. Naidu, L. Pratap Reddy, A. Vinaya Babu Analysis of Text Complexity in a Crypto System - A Case Study on Telugu. Search on Bibsonomy FGIT-SecTech The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Aneel Rahim, Fahad bin Muyaha Impact of Malicious Node on Broadcast Schemes. Search on Bibsonomy FGIT-SecTech The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Mohammad Rakibul Islam, Jinsang Kim MIMO Wiretap Channel: A Scalar Approach. Search on Bibsonomy FGIT-SecTech The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Mohammad Tabatabai Irani, Edgar R. Weippl Automation of Post-exploitation - (Focused on MS-Windows Targets). Search on Bibsonomy FGIT-SecTech The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jae-goo Jeong, Seung-yong Hur, Gang-Soo Lee A Development of Finite State Machine Create Tool for Cryptography Module Validation. Search on Bibsonomy FGIT-SecTech The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Seyed Hossein Ahmadinejad, Saeed Jalili Correlating Alerts into Compressed Graphs Using an Attribute-Based Method and Time Windows. Search on Bibsonomy FGIT-SecTech The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Martin Drahanský, Filip Orság, Petr Hanácek Accelerometer Based Digital Video Stabilization for Security Surveillance Systems. Search on Bibsonomy FGIT-SecTech The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Brian King A Simple Encryption Scheme for Binary Elliptic Curves. Search on Bibsonomy FGIT-SecTech The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jieren Cheng, Jianping Yin, Yun Liu, Zhiping Cai, Chengkun Wu Detecting Distributed Denial of Service Attack Based on Multi-feature Fusion. Search on Bibsonomy FGIT-SecTech The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jaeseung Hong, Jongwung Kim, Jeonghun Cho The Trend of the Security Research for the Insider Cyber Threat. Search on Bibsonomy FGIT-SecTech The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Qiang Yan 0001, Yingjiu Li, Tieyan Li, Robert H. Deng Insights into Malware Detection and Prevention on Mobile Phones. Search on Bibsonomy FGIT-SecTech The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Pairat Thorncharoensri, Qiong Huang 0001, Willy Susilo, Man Ho Au, Yi Mu 0001, Duncan S. Wong Escrowed Deniable Identification Schemes. Search on Bibsonomy FGIT-SecTech The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ji-Jian Chin, Swee-Huay Heng, Bok-Min Goi Hierarchical Identity-Based Identification Schemes. Search on Bibsonomy FGIT-SecTech The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Debnath Bhattacharyya, Poulami Das 0001, Samir Kumar Bandyopadhyay, Tai-Hoon Kim Analysis of Handwritten Signature Image. Search on Bibsonomy FGIT-SecTech The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Yuan Tian 0003, Biao Song, Eui-nam Huh A Privacy-Aware System Using Threat-Based Evaluation and Feedback Method in Untrusted Ubiquitous Environments. Search on Bibsonomy FGIT-SecTech The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Rosslin John Robles, Min-Kyu Choi Symmetric-Key Encryption for Wireless Internet SCADA. Search on Bibsonomy FGIT-SecTech The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Hoon Ko, Jongmyung Choi, Carlos Ramos 0001 A Study on Secure Contents Using in Urban Computing. Search on Bibsonomy FGIT-SecTech The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Filip Orság Speaker Dependent Frequency Cepstrum Coefficients. Search on Bibsonomy FGIT-SecTech The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Seokung Yoon, Hyuncheol Jung, Kyung-Seok Lee A Study on the Interworking for SIP-Based Secure VoIP Communication with Security Protocols in the Heterogeneous Network. Search on Bibsonomy FGIT-SecTech The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Linda Ariani Gunawan, Peter Herrmann, Frank Alexander Kraemer Towards the Integration of Security Aspects into System Development Using Collaboration-Oriented Models. Search on Bibsonomy FGIT-SecTech The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Marek R. Ogiela, Urszula Ogiela Shadow Generation Protocol in Linguistic Threshold Schemes. Search on Bibsonomy FGIT-SecTech The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Peter Pecho, Jan Nagy, Petr Hanácek, Martin Drahanský Secure Collection Tree Protocol for Tamper-Resistant Wireless Sensors. Search on Bibsonomy FGIT-SecTech The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Debnath Bhattacharyya, Poulami Das 0001, Samir Kumar Bandyopadhyay, Tai-Hoon Kim Grayscale Image Classification Using Supervised Chromosome Clustering. Search on Bibsonomy FGIT-SecTech The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Dominik Slezak, Tai-Hoon Kim, Wai-Chi Fang, Kirk P. Arnett (eds.) Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings Search on Bibsonomy FGIT-SecTech The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Gaoshou Zhai, Hanhui Niu, Na Yang, Minli Tian, Chengyu Liu, Hengsheng Yang Security Testing for Operating System and Its System Calls. Search on Bibsonomy FGIT-SecTech The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Abdulaziz S. Almazyad, Yasir Ahmad A New Approach in T-FA Authentication with OTP Using Mobile Phone. Search on Bibsonomy FGIT-SecTech The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Haimin Jin, Duncan S. Wong, Yinlong Xu Efficient Group Signature with Forward Secure Revocation. Search on Bibsonomy FGIT-SecTech The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jieren Cheng, Boyun Zhang, Jianping Yin, Yun Liu, Zhiping Cai DDoS Attack Detection Using Three-State Partition Based on Flow Interaction. Search on Bibsonomy FGIT-SecTech The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing Feature Level Fusion of Biometrics Cues: Human Identification with Doddington's Caricature. Search on Bibsonomy FGIT-SecTech The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Hsiang-Cheh Huang, Feng-Cheng Chang, Wai-Chi Fang Applications of Reversible Data Hiding Techniques with the Quick Response Codes. Search on Bibsonomy FGIT-SecTech The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1David A. Carvalho, Manuela Pereira, Mário M. Freire Towards the Detection of Encrypted BitTorrent Traffic through Deep Packet Inspection. Search on Bibsonomy FGIT-SecTech The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing Fusion of Multiple Matchers Using SVM for Offline Signature Identification. Search on Bibsonomy FGIT-SecTech The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Bo-heung Chung, Min-ho Han, Ki-young Kim The Design of Signature Selection for Protecting Illegal Outflow of Sensitive Information in Mobile Device. Search on Bibsonomy FGIT-SecTech The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Chengkun Wu, Jianping Yin, Zhiping Cai, En Zhu, Jieren Cheng An Efficient Pre-filtering Mechanism for Parallel Intrusion Detection Based on Many-Core GPU. Search on Bibsonomy FGIT-SecTech The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Yonglong Wei, Xiaojuan Zheng, Jinglei Ren, Xudong Zheng, Chen Sun, Zhenhao Li Verification of Security-Relevant Behavior Model and Security Policy for Model-Carrying Code. Search on Bibsonomy FGIT-SecTech The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Tie-Ming Liu, Liehui Jiang, Hongqi He, Ji-zhong Li, Xian Yu Researching on Cryptographic Algorithm Recognition Based on Static Characteristic-Code. Search on Bibsonomy FGIT-SecTech The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1DongHo Kang, BoHeung Jung, KiYoung Kim Hardware Based Data Inspection for USB Data Leakage Prevention. Search on Bibsonomy FGIT-SecTech The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #63 of 63 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license