• Understanding Information Technology Security Standards Diffusion - An Institutional Perspective
  • Malfinder: Accelerated Malware Classification System through Filtering on Manycore System
  • Expansions of CHAP - Modificationless on Its Structures of Packet and Data Exchange
  • Performance-optimized Indexes for Inequality Searches on Encrypted Data in Practice
  • Quality Assessment of Fingerprints with Minutiae Delaunay Triangulation
  • Fingerprint Quality Assessment Combining Blind Image Quality, Texture and Minutiae Features
  • A Structural and Content-based Approach for a Precise and Robust Detection of Malicious PDF Files
  • Implementation and Analysis of Dutch-style Sealed-bid Auctions - Computational vs Unconditional Security
  • On Detection of Bitcoin Mining Redirection Attacks
  • EvaBio Platform for the Evaluation Biometric System - Application to the Optimization of the Enrollment Process for Fingerprints Devices
  • The Smartphone as a Gait Recognition Device - Impact of Selected Parameters on Gait Recognition
  • Adaptive Buffer Resizing for Efficient Anonymization of Streaming Data with Minimal Information Loss
  • Vulnerability Analysis using Network Timestamps in Full Virtualization Virtual Machine
  • Balancing is the Key - Performing Finger Vein Template Protection using Fuzzy Commitment
  • A Scratch-based Graphical Policy Editor for XACML
  • Multi-sensor Authentication to Improve Smartphone Security
  • A Novel Model of Security Policies and Requirements
  • The Palm Vein Graph - Feature Extraction and Matching
  • A Novel Anonymous Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks
  • Malware Classification Method Based on Sequence of Traffic Flow
  • Research Ethics and Public Trust, Preconditions for Continued Growth of Internet Mediated Research - Public Confidence in Internet Mediate Research
  • Analyzing Quality Criteria in Role-based Identity and Access Management
  • Model-driven Privacy Assessment in the Smart Grid
  • Assessing Information Security Risks of AMI - What Makes it so Difficult?
  • Evaluation of the Anonymous I2P Network's Design Choices Against Performance and Security
  • Private Web Search with Constant Round Efficiency
  • Bilinear Pairing-based Hybrid Mixnet with Anonymity Revocation
  • On the Power Consumption of Cryptographic Processors in Civil Microdrones
  • Clustering Spam Emails into Campaigns
  • HIDE: Hybrid Symmetric Key Algorithm for Integrity Check, Dynamic Key Generation and Encryption
  • Privacy and Security Concern of Online Social Networks from User Perspective
  • A Policy-based Communications Architecture for Vehicles
  • Modelling of Enterprise Insider Threats
  • ICS/SCADA Security - Analysis of a Beckhoff CX5020 PLC
  • hHB: A Harder HB+ Protocol
  • WeXpose: Towards on-Line Dynamic Analysis of Web Attack Payloads using Just-In-Time Binary Modification
  • Anonymity and Fair-Exchange in e-Commerce Protocol for Physical Products Delivery
  • A Framework for Incident Response in Industrial Control Systems
  • Controlled Proxy Re-signing - Conditional Proxy Re-Signatures
  • A Public-Key Cryptography Tool for Personal Use - A Real-world Implementation of ECC for Secure File Exchange
  • Parallel Approaches for Efficient Scalar Multiplication over Elliptic Curve
  • Policy Anomaly Detection for Distributed IPv6 Firewalls
  • A Flexible Architecture for Industrial Control System Honeypots
  • Secure Physical Access Control with Strong Cryptographic Protection
  • MEDA: A Machine Emulation Detection Algorithm
  • Mobile Malware Detection using Op-code Frequency Histograms
  • Monitoring Software Vulnerabilities through Social Networks Analysis
  • Gateway Threshold Password-based Authenticated Key Exchange Secure against Undetectable On-line Dictionary Attack
  • Private Eyes: Secure Remote Biometric Authentication
  • Practical IBE Secure under CBDH - Encrypting Without Pairing
  • Revealing Encrypted WebRTC Traffic via Machine Learning Tools
  • Evaluating the Comprehensive Complexity of Authorization-based Access Control Policies using Quantitative Metrics
  • Formal Analysis of E-Cash Protocols
  • DPA Resistance Enhancement through a Self-healing PLL based Power Mask
  • Design and Performance Aspects of Information Security Prediction Markets for Risk Management
  • MoCrySIL – Carry Your Cryptographic Keys in Your Pocket
  • Algorithmic Information Theory for Obfuscation Security
  • Modeling Authorization Policies for Web Services in Presence of Transitive Dependencies
  • Battling Against DDoS in SIP - Is Machine Learning-based Detection an Effective Weapon?
  • Solving the Grid Defender’s Dilemma: Tamper Protection for Distributed Cyber-Physical Systems
  • Semantic Secure Public Key Encryption with Filtered Equality Test - PKE-FET
  • A Uniform Modeling Pattern for Operating Systems Access Control Policies with an Application to SELinux
  • Cloud Resources Placement based on Functional and Non-functional Requirements
  • Distributed Intrusion Detection System based on Anticipation and Prediction Approach
  • Towards Secure Gigabit Passive Optical Networks - Signal Propagation based Key Establishment
  • Automated Exploit Detection using Path Profiling - The Disposition Should Matter, Not the Position
  • Experimental Extraction of Shared Secret Key from Fluctuations of Multipath Channel at Moving a Mobile Transceiver in an Urban Environment
  • Light Blind: Why Encrypt If You Can Share?
  • Scargos: Towards Automatic Vulnerability Distribution
  • A Formally Verified Access Control Mechanism for Information Centric Networks
  • A Note on Schoenmakers Algorithm for Multi Exponentiation
  • Preserving Privacy in Collaborative Business Process Composition
  • Performance Evaluation of Meteor Key Distribution
  • A Key-private Cryptosystem from the Quadratic Residuosity
  • An OWL-based XACML Policy Framework
  • New Results for Partial Key Exposure on RSA with Exponent Blinding
  • On the Instability of Sensor Orientation in Gait Verification on Mobile Phone
  • Adaptive SVDD-based Learning for False Alarm Reduction in Intrusion Detection
  • Counter based Detection and Mitigation of Signalling Attacks
  • Examining the Performance for Forensic Detection of Rare Videos Under Time Constraints
  • Phish-IDetector: Message-Id Based Automatic Phishing Detection
  • Towards Compliant Reference Architectures by Finding Analogies and Overlaps in Compliance Regulations
  • Design and Implementation of an Espionage Network for Cache-based Side Channel Attacks on AES
  • Practical and Secure Integrated PKE+PEKS with Keyword Privacy
  • A Risk Awareness Approach for Monitoring the Compliance of RBAC-based Policies
  • Attack Surface and Vulnerability Assessment of Automotive Electronic Control Units
  • Inferring Geo-spatial Neutral Similarity from Earthquake Data using Mixture and State Clustering Models
  • Modeling and 2D/3D-visualization of Geomagnetic Field and Its Variations Parameters
  • Local Deforestation Patterns in Mexico - An Approach using Geographiccally Weighted Regression
  • Conditional Probability and Integrated Pest Management - Using a Nonlinear Kriging Technique to Predict Infectious Levels of Verticillium dahliae in Michigan Potato Fields
  • Trafforithm - A Traffic-aware Shortest Path Algorithm in Real Road Networks with Traffic Influence Factors
  • Querying Open Street Map with XQuery
  • A Digital Library System for Semantic Spatial Information Extraction from Images
  • A Geospatial Tangible User Interface to Support Stakeholder Participation in Urban Planning
  • Managing and 3D Visualization of Real-time Big Geo-referenced Data from Las Palmas Port through a Flexible Open Source Computer Architecture
  • Plane-Sweep Algorithms for the K Group Nearest-Neighbor Query
  • 3D Reconstruction and Visualization of Alternatives for Restoration of Historic Buildings - A New Approach
  • Twist, Shift, or Stack? - Usability Analysis of Geospatial Interactions on a Tangible Tabletop
  • DIFPL - Distributed Drone Flight Path Builder System
  • A Semantic Geodatabase for Environment Analysis - Extraction, Management and Sharing of Earth and Water Information in GIS
  • Integration of a Food Distribution Routing Optimization Software with an Enterprise Resource Planner
  • Architectural Heritage Semantic Data Managing and Sharing in GIS
  • 3D Seismic Waveform Classification Study based on High-level Semantic Feature
  • Towards Sentiment-driven Maps Showing Touristic Attractiveness
  • A Proposal for Design and Implementation of an Hybrid Navigation System Based on Open Data, Augmented Reality and Big Data - Applications for the Smart Cities
  • A Linked Open Data Approach for Visualizing Flood Information - A Case Study of the Rio Doce Basin in Brazil
  • Procedural City Model using Multi-source Parameter Estimation
  • Determining Geometric Primitives for a 3D GIS - Easy as 1D, 2D, 3D?
  • The Urbangene Project - Experience from a Crowdsourced Mapping Campaign
  • Towards a Collective Spatial Analysis - Proposal of a New Paradigm for Supporting the Spatial Decision-making from a Geoprospective Approach
  • Coastal Risk Forecast System
  • Data Collection and Management for Stratigraphic Analysis of Upstanding Structures
  • Integrating GIS and Numeric Weather Prediction Model with Wheat Simulation Model for Optimal Wheat Production Locations in Arid Regions