Understanding Information Technology Security Standards Diffusion - An Institutional Perspective
Malfinder: Accelerated Malware Classification System through Filtering on Manycore System
Expansions of CHAP - Modificationless on Its Structures of Packet and Data Exchange
Performance-optimized Indexes for Inequality Searches on Encrypted Data in Practice
Quality Assessment of Fingerprints with Minutiae Delaunay Triangulation
Fingerprint Quality Assessment Combining Blind Image Quality, Texture and Minutiae Features
A Structural and Content-based Approach for a Precise and Robust Detection of Malicious PDF Files
Implementation and Analysis of Dutch-style Sealed-bid Auctions - Computational vs Unconditional Security
On Detection of Bitcoin Mining Redirection Attacks
EvaBio Platform for the Evaluation Biometric System - Application to the Optimization of the Enrollment Process for Fingerprints Devices
The Smartphone as a Gait Recognition Device - Impact of Selected Parameters on Gait Recognition
Adaptive Buffer Resizing for Efficient Anonymization of Streaming Data with Minimal Information Loss
Vulnerability Analysis using Network Timestamps in Full Virtualization Virtual Machine
Balancing is the Key - Performing Finger Vein Template Protection using Fuzzy Commitment
A Scratch-based Graphical Policy Editor for XACML
Multi-sensor Authentication to Improve Smartphone Security
A Novel Model of Security Policies and Requirements
The Palm Vein Graph - Feature Extraction and Matching
A Novel Anonymous Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks
Malware Classification Method Based on Sequence of Traffic Flow
Research Ethics and Public Trust, Preconditions for Continued Growth of Internet Mediated Research - Public Confidence in Internet Mediate Research
Analyzing Quality Criteria in Role-based Identity and Access Management
Model-driven Privacy Assessment in the Smart Grid
Assessing Information Security Risks of AMI - What Makes it so Difficult?
Evaluation of the Anonymous I2P Network's Design Choices Against Performance and Security
Private Web Search with Constant Round Efficiency
Bilinear Pairing-based Hybrid Mixnet with Anonymity Revocation
On the Power Consumption of Cryptographic Processors in Civil Microdrones
Clustering Spam Emails into Campaigns
HIDE: Hybrid Symmetric Key Algorithm for Integrity Check, Dynamic Key Generation and Encryption
Privacy and Security Concern of Online Social Networks from User Perspective
A Policy-based Communications Architecture for Vehicles
Modelling of Enterprise Insider Threats
ICS/SCADA Security - Analysis of a Beckhoff CX5020 PLC
hHB: A Harder HB+ Protocol
WeXpose: Towards on-Line Dynamic Analysis of Web Attack Payloads using Just-In-Time Binary Modification
Anonymity and Fair-Exchange in e-Commerce Protocol for Physical Products Delivery
A Framework for Incident Response in Industrial Control Systems
Controlled Proxy Re-signing - Conditional Proxy Re-Signatures
A Public-Key Cryptography Tool for Personal Use - A Real-world Implementation of ECC for Secure File Exchange
Parallel Approaches for Efficient Scalar Multiplication over Elliptic Curve
Policy Anomaly Detection for Distributed IPv6 Firewalls
A Flexible Architecture for Industrial Control System Honeypots
Secure Physical Access Control with Strong Cryptographic Protection
MEDA: A Machine Emulation Detection Algorithm
Mobile Malware Detection using Op-code Frequency Histograms
Monitoring Software Vulnerabilities through Social Networks Analysis
Gateway Threshold Password-based Authenticated Key Exchange Secure against Undetectable On-line Dictionary Attack
Private Eyes: Secure Remote Biometric Authentication
Practical IBE Secure under CBDH - Encrypting Without Pairing
Revealing Encrypted WebRTC Traffic via Machine Learning Tools
Evaluating the Comprehensive Complexity of Authorization-based Access Control Policies using Quantitative Metrics
Formal Analysis of E-Cash Protocols
DPA Resistance Enhancement through a Self-healing PLL based Power Mask
Design and Performance Aspects of Information Security Prediction Markets for Risk Management
MoCrySIL – Carry Your Cryptographic Keys in Your Pocket
Algorithmic Information Theory for Obfuscation Security
Modeling Authorization Policies for Web Services in Presence of Transitive Dependencies
Battling Against DDoS in SIP - Is Machine Learning-based Detection an Effective Weapon?
Solving the Grid Defender’s Dilemma: Tamper Protection for Distributed Cyber-Physical Systems
Semantic Secure Public Key Encryption with Filtered Equality Test - PKE-FET
A Uniform Modeling Pattern for Operating Systems Access Control Policies with an Application to SELinux
Cloud Resources Placement based on Functional and Non-functional Requirements
Distributed Intrusion Detection System based on Anticipation and Prediction Approach
Towards Secure Gigabit Passive Optical Networks - Signal Propagation based Key Establishment
Automated Exploit Detection using Path Profiling - The Disposition Should Matter, Not the Position
Experimental Extraction of Shared Secret Key from Fluctuations of Multipath Channel at Moving a Mobile Transceiver in an Urban Environment
Light Blind: Why Encrypt If You Can Share?
Scargos: Towards Automatic Vulnerability Distribution
A Formally Verified Access Control Mechanism for Information Centric Networks
A Note on Schoenmakers Algorithm for Multi Exponentiation
Preserving Privacy in Collaborative Business Process Composition
Performance Evaluation of Meteor Key Distribution
A Key-private Cryptosystem from the Quadratic Residuosity
An OWL-based XACML Policy Framework
New Results for Partial Key Exposure on RSA with Exponent Blinding
On the Instability of Sensor Orientation in Gait Verification on Mobile Phone
Adaptive SVDD-based Learning for False Alarm Reduction in Intrusion Detection
Counter based Detection and Mitigation of Signalling Attacks
Examining the Performance for Forensic Detection of Rare Videos Under Time Constraints
Phish-IDetector: Message-Id Based Automatic Phishing Detection
Towards Compliant Reference Architectures by Finding Analogies and Overlaps in Compliance Regulations
Design and Implementation of an Espionage Network for Cache-based Side Channel Attacks on AES
Practical and Secure Integrated PKE+PEKS with Keyword Privacy
A Risk Awareness Approach for Monitoring the Compliance of RBAC-based Policies
Attack Surface and Vulnerability Assessment of Automotive Electronic Control Units
Inferring Geo-spatial Neutral Similarity from Earthquake Data using Mixture and State Clustering Models
Modeling and 2D/3D-visualization of Geomagnetic Field and Its Variations Parameters
Local Deforestation Patterns in Mexico - An Approach using Geographiccally Weighted Regression
Conditional Probability and Integrated Pest Management - Using a Nonlinear Kriging Technique to Predict Infectious Levels of Verticillium dahliae in Michigan Potato Fields
Trafforithm - A Traffic-aware Shortest Path Algorithm in Real Road Networks with Traffic Influence Factors
Querying Open Street Map with XQuery
A Digital Library System for Semantic Spatial Information Extraction from Images
A Geospatial Tangible User Interface to Support Stakeholder Participation in Urban Planning
Managing and 3D Visualization of Real-time Big Geo-referenced Data from Las Palmas Port through a Flexible Open Source Computer Architecture
Plane-Sweep Algorithms for the K Group Nearest-Neighbor Query
3D Reconstruction and Visualization of Alternatives for Restoration of Historic Buildings - A New Approach
Twist, Shift, or Stack? - Usability Analysis of Geospatial Interactions on a Tangible Tabletop
DIFPL - Distributed Drone Flight Path Builder System
A Semantic Geodatabase for Environment Analysis - Extraction, Management and Sharing of Earth and Water Information in GIS
Integration of a Food Distribution Routing Optimization Software with an Enterprise Resource Planner
Architectural Heritage Semantic Data Managing and Sharing in GIS
3D Seismic Waveform Classification Study based on High-level Semantic Feature
Towards Sentiment-driven Maps Showing Touristic Attractiveness
A Proposal for Design and Implementation of an Hybrid Navigation System Based on Open Data, Augmented Reality and Big Data - Applications for the Smart Cities
A Linked Open Data Approach for Visualizing Flood Information - A Case Study of the Rio Doce Basin in Brazil
Procedural City Model using Multi-source Parameter Estimation
Determining Geometric Primitives for a 3D GIS - Easy as 1D, 2D, 3D?
The Urbangene Project - Experience from a Crowdsourced Mapping Campaign
Towards a Collective Spatial Analysis - Proposal of a New Paradigm for Supporting the Spatial Decision-making from a Geoprospective Approach
Coastal Risk Forecast System
Data Collection and Management for Stratigraphic Analysis of Upstanding Structures
Integrating GIS and Numeric Weather Prediction Model with Wheat Simulation Model for Optimal Wheat Production Locations in Arid Regions