​
Login / Signup
STA
2011
2011
2011
Keyphrases
Publications
2011
Krzysztof Barczynski
,
Przemyslaw Blaskiewicz
,
Marek Klonowski
,
Miroslaw Kutylowski
Self-keying Identification Mechanism for Small Devices.
STA
(2011)
Younghee Kim
,
Kyung Soo Cho
,
Jae Yeol Yoon
,
Iee Joon Kim
,
Ungmo Kim
Using Bloom Filters for Mining Top-k Frequent Itemsets in Data Streams.
STA
(2011)
Seung Kwan Kim
,
Younghee Kim
,
Ungmo Kim
Maximal Cliques Generating Algorithm for Spatial Co-location Pattern Mining.
STA
(2011)
Bidi Ying
,
Dimitrios Makrakis
,
Hussein T. Mouftah
,
Wenjun Lu
Dynamic Combinatorial Key Pre-distribution Scheme for Heterogeneous Sensor Networks.
STA
(2011)
Namheun Son
,
Keun-Gi Lee
,
Sangjun Jeon
,
Hyunji Chung
,
Sangjin Lee
,
Changhoon Lee
The Method of Database Server Detection and Investigation in the Enterprise Environment.
STA
(2011)
Lingli Deng
,
Qing Yu
,
Jin Peng
Adaptive Optimal Global Resource Scheduling for a Cloud-Based Virtualized Resource Pool.
STA
(2011)
Benjamin Aziz
,
Shirley Y. Crompton
,
Michael D. Wilson
A Metadata Model for Data Centric Security.
STA
(2011)
Jaeik Cho
,
Kyuwon Choi
,
Taeshik Shon
,
Jongsub Moon
A Network Data Abstraction Method for Data Set Verification.
STA
(2011)
M. Zubair Rafique
,
Muhammad Khurram Khan
,
Khaled Alghathbar
,
Muddassar Farooq
Embedding High Capacity Covert Channels in Short Message Service (SMS).
STA
(2011)
Yuanyuan Zhang
,
Junzhong Gu
Using Counter Cache Coherence to Improve Memory Encryptions Performance in Multiprocessor Systems.
STA
(2011)
Anton Borg
,
Martin Boldt
,
Bengt Carlsson
Simulating Malicious Users in a Software Reputation System.
STA
(2011)
Jongsung Kim
,
Jong Hyuk Park
,
Young-Gon Kim
Weak Keys of the Block Cipher SEED-192 for Related-Key Differential Attacks.
STA
(2011)
Wooseok Ryu
,
Joonho Kwon
,
Bonghee Hong
An RSN Tool : A Test Dataset Generator for Evaluating RFID Middleware.
STA
(2011)
Benjamin Aziz
,
Alvaro Arenas
,
Michael D. Wilson
SecPAL4DSA: A Policy Language for Specifying Data Sharing Agreements.
STA
(2011)
Jeongwoo Park
,
Kwangjae Lee
,
Wooseok Ryu
,
Joonho Kwon
,
Bonghee Hong
An Efficient Processing Scheme for Continuous Queries Involving RFID and Sensor Data Streams.
STA
(2011)
Muhammad Abulaish
,
Syed Irfan Nabi
,
Khaled Alghathbar
,
Azeddine Chikh
SIMOnt: A Security Information Management Ontology Framework.
STA
(2011)
Giorgos Karopoulos
,
Fabio Martinelli
IMS Session Management Based on Usage Control.
STA
(2011)
Siegfried Podesser
,
Ronald Toegl
A Software Architecture for Introducing Trust in Java-Based Clouds.
STA
(2011)
Cheonshik Kim
,
Dongkyoo Shin
,
Dongil Shin
,
Xinpeng Zhang
Improved Steganographic Embedding Exploiting Modification Direction in Multimedia Communications.
STA
(2011)
Gwangsoo Lee
,
Wooseok Ryu
,
Bonghee Hong
,
Joonho Kwon
Smart Warehouse Modeling Using Re-recording Methodology with Sensor Tag.
STA
(2011)
Lu Leng
,
Jiashu Zhang
,
Gao Chen
,
Muhammad Khurram Khan
,
Ping Bai
Two Dimensional PalmPhasor Enhanced by Multi-orientation Score Level Fusion.
STA
(2011)
Chunli Lv
,
Xiaoqi Jia
,
Jingqiang Lin
,
Jiwu Jing
,
Lijun Tian
,
Mingli Sun
Efficient Secret Sharing Schemes.
STA
(2011)
Julien Bringer
,
Hervé Chabanne
Embedding Edit Distance to Allow Private Keyword Search in Cloud Computing.
STA
(2011)
Azeddine Chikh
,
Muhammad Abulaish
,
Syed Irfan Nabi
,
Khaled Alghathbar
An Ontology Based Information Security Requirements Engineering Framework.
STA
(2011)
M. Zubair Rafique
,
Muhammad Khurram Khan
,
Khaled Alghathbar
,
Muddassar Farooq
A Framework for Detecting Malformed SMS Attack.
STA
(2011)
Ahmad A. Al-Daraiseh
,
Mohammed A. Moharrum
Exclusion Based VANETs (EBV).
STA
(2011)
volume 186, 2011
Secure and Trust Computing, Data Management and Applications - 8th FTRA International Conference, STA 2011, Loutraki, Greece, June 28-30, 2011. Proceedings
STA
186 (2011)