Search Results - "2012 9th International ISC Conference on Information Security and Cryptology"
-
1
KerNeeS: A protocol for mutual authentication between NFC phones and POS terminals for secure payment transactions
Published in 2012 9th International ISC Conference on Information Security and Cryptology (01-09-2012)“…The aim of this paper is to propose a solution for a potential vulnerability in mobile proximity payment. The mobile proximity payment is the evolution of the…”
Get full text
Conference Proceeding -
2
Dynamic malware detection using registers values set analysis
Published in 2012 9th International ISC Conference on Information Security and Cryptology (01-09-2012)“…The number of Malicious files increase every day because of existing open source malware and obfuscation techniques. It means that traditional signature-based…”
Get full text
Conference Proceeding -
3
Real-time attack scenario detection via intrusion detection alert correlation
Published in 2012 9th International ISC Conference on Information Security and Cryptology (01-09-2012)“…Alert correlation systems attempt to discover the relations among alerts produced by one or more intrusion detection systems to determine the attack scenarios…”
Get full text
Conference Proceeding -
4
Mutual implementation of predefined and random challenges over RFID distance bounding protocol
Published in 2012 9th International ISC Conference on Information Security and Cryptology (01-09-2012)“…Distance bounding protocols are launched based upon the round trip time measurements of the carried out messages to defend RFID systems against the relay…”
Get full text
Conference Proceeding -
5
Authentication based on signature verification using position, velocity, acceleration and Jerk signals
Published in 2012 9th International ISC Conference on Information Security and Cryptology (01-09-2012)“…Signature verification techniques utilize many different characteristics of an individual. The selection of signature features is critical in determining the…”
Get full text
Conference Proceeding -
6
An ID-based key agreement protocol based on ECC among users of separate networks
Published in 2012 9th International ISC Conference on Information Security and Cryptology (01-09-2012)“…This paper proposes an identity based key agreement protocol based on elliptic curve cryptography (ECC) between users of different networks with independent…”
Get full text
Conference Proceeding -
7
On the security of an ECC based RFID authentication protocol
Published in 2012 9th International ISC Conference on Information Security and Cryptology (01-09-2012)“…Following the fact that there are some efficient implementations of ECC-based RFID authentication protocols on RFID tags, a new family of RFID authentication…”
Get full text
Conference Proceeding -
8
A new image steganography based on denoising methods in wavelet domain
Published in 2012 9th International ISC Conference on Information Security and Cryptology (01-09-2012)“…This paper introduces a novel wavelet-based method to perform image steganography utilizing image denoising algorithms by wavelet thresholding. Steganographic…”
Get full text
Conference Proceeding -
9
Modeling Sybil attacker behavior in VANETs
Published in 2012 9th International ISC Conference on Information Security and Cryptology (01-09-2012)“…Vehicular Ad-Hoc Networks (VANET) is mainly designed to provide human safety, traffic management, and infotainment services. The decision how to react on…”
Get full text
Conference Proceeding -
10
A trust and reputation-based access control model for virtual organizations
Published in 2012 9th International ISC Conference on Information Security and Cryptology (01-09-2012)“…Virtual organization (VO) is aimed to provide inter-organizational collaborations. Constructing a VO necessitates provision of security and access control…”
Get full text
Conference Proceeding -
11
A modified dual watermarking scheme for digital images with tamper localization/detection and recovery capabilities
Published in 2012 9th International ISC Conference on Information Security and Cryptology (01-09-2012)“…The privacy and integrity protection of digital documents specially the case of biomedical images is a vital subject in the current world of telecommunication…”
Get full text
Conference Proceeding -
12
Using user similarity to infer trust values in social networks regardless of direct ratings
Published in 2012 9th International ISC Conference on Information Security and Cryptology (01-09-2012)“…Social networks recently get more attention on the Internet. Although they were introduced to facilitate relationships, now users may utilize them to get…”
Get full text
Conference Proceeding -
13
An improvement of image secret sharing and hiding with authentication
Published in 2012 9th International ISC Conference on Information Security and Cryptology (01-09-2012)“…In recent years, researchers has proposed (t, n)-threshold image secret sharing and hiding schemes with authentication. The secret image is shared and hided…”
Get full text
Conference Proceeding -
14
Policy specification and enforcement in online social networks using MKNF
Published in 2012 9th International ISC Conference on Information Security and Cryptology (01-09-2012)“…Emerging tools that ease sharing information in online social networks (OSNs) can cause various privacy issues for users. Access control is the main security…”
Get full text
Conference Proceeding -
15
An efficient end to end key establishment protocol for wireless sensor networks
Published in 2012 9th International ISC Conference on Information Security and Cryptology (01-09-2012)“…Sensor networks are suitable candidates for military and scientific applications such as border security and environmental monitoring. They are usually…”
Get full text
Conference Proceeding -
16
An image watermarking algorithm based on chaotic maps and wavelet transform
Published in 2012 9th International ISC Conference on Information Security and Cryptology (01-09-2012)“…Chaotic maps and their applications in watermarking algorithms aimed at achieving secure communications have attracted a growing interest recently. This is…”
Get full text
Conference Proceeding -
17
Non-monotonocity in OrBAC through default and exception policy rules
Published in 2012 9th International ISC Conference on Information Security and Cryptology (01-09-2012)“…Context-awareness is an essential requirement of modern access control models. Organization-Based Access Control (OrBAC) model is a powerful context-aware…”
Get full text
Conference Proceeding -
18
A dynamic, zero-message broadcast encryption scheme based on secure multiparty computation
Published in 2012 9th International ISC Conference on Information Security and Cryptology (01-09-2012)“…In this paper we present a new broadcast encryption scheme based on threshold secret-sharing and secure multiparty computation which has three main features:…”
Get full text
Conference Proceeding -
19
FOO e-voting protocol: Inductive analysis of the eligibility property
Published in 2012 9th International ISC Conference on Information Security and Cryptology (01-09-2012)“…There are two main approaches in verifying security protocols: model checking and theorem proving. Inductive Method is one of the notable works based on pure…”
Get full text
Conference Proceeding -
20
Structural TLR algorithm for anomaly detection based on Danger Theory
Published in 2012 9th International ISC Conference on Information Security and Cryptology (01-09-2012)“…Artificial Immune Systems have long been used in the field of computer security and especially in Intrusion Detection systems. The first generation of AISs…”
Get full text
Conference Proceeding