ComputationWorld 2018
February 18 - 22, 2018 - Barcelona, Spain

  • SERVICE COMPUTATION 2018, The Tenth International Conference on Advanced Service Computing
  • CLOUD COMPUTING 2018, The Ninth International Conference on Cloud Computing, GRIDs, and Virtualization
  • FUTURE COMPUTING 2018, The Tenth International Conference on Future Computational Technologies and Applications
  • COGNITIVE 2018, The Tenth International Conference on Advanced Cognitive Technologies and Applications
  • ADAPTIVE 2018, The Tenth International Conference on Adaptive and Self-Adaptive Systems and Applications
  • CONTENT 2018, The Tenth International Conference on Creative Content Technologies
  • PATTERNS 2018, The Tenth International Conference on Pervasive Patterns and Applications
  • COMPUTATION TOOLS 2018, The Ninth International Conference on Computational Logics, Algebras, Programming, Tools, and Benchmarking
  • BUSTECH 2018, The Eighth International Conference on Business Intelligence and Technology

DigitalWorld 2018
March 25 - 29, 2018 - Rome, Italy

  • ICDS 2018, The Twelfth International Conference on Digital Society and eGovernments
  • ACHI 2018, The Eleventh International Conference on Advances in Computer-Human Interactions
  • GEOProcessing 2018, The Tenth International Conference on Advanced Geographic Information Systems, Applications, and Services
  • eTELEMED 2018, The Tenth International Conference on eHealth, Telemedicine, and Social Medicine
  • eLmL 2018, The Tenth International Conference on Mobile, Hybrid, and On-line Learning
  • eKNOW 2018, The Tenth International Conference on Information, Process, and Knowledge Management
  • ALLSENSORS 2018, The Third International Conference on Advances in Sensors, Actuators, Metering and Sensing
  • SMART ACCESSIBILITY 2018, The Third International Conference on Universal Accessibility in the Internet of Things and Smart Environments

NexComm 2018
April 22 - 26, 2018 - Athens, Greece

  • ICDT 2018, The Thirteenth International Conference on Digital Telecommunications
  • SPACOMM 2018, The Tenth International Conference on Advances in Satellite and Space Communications
  • ICN 2018, The Seventeenth International Conference on Networks
    • SOFTNETWORKING 2018, The International Symposium on Advances in Software Defined Networking and Network Functions Virtualization
  • ICONS 2018, The Thirteenth International Conference on Systems
  • MMEDIA 2018, The Tenth International Conference on Advances in Multimedia
  • PESARO 2018, The Eighth International Conference on Performance, Safety and Robustness in Complex Systems and Applications
  • CTRQ 2018, The Eleventh International Conference on Communication Theory, Reliability, and Quality of Service
  • COCORA 2018, The Eighth International Conference on Advances in Cognitive Radio
  • ALLDATA 2018, The Fourth International Conference on Big Data, Small Data, Linked Data and Open Data
    • KESA 2018, The International Workshop on Knowledge Extraction and Semantic Annotation
  • SOFTENG 2018, The Fourth International Conference on Advances and Trends in Software Engineering

InfoSys 2018
May 20 - 24, 2018 - Nice, France

  • ICNS 2018, The Fourteenth International Conference on Networking and Services
  • ICAS 2018, The Fourteenth International Conference on Autonomic and Autonomous Systems
  • ENERGY 2018, The Eighth International Conference on Smart Grids, Green Communications and IT Energy-aware Technologies
  • WEB 2018, The Sixth International Conference on Building and Exploring Web Based Environments
  • DBKDA 2018, The Tenth International Conference on Advances in Databases, Knowledge, and Data Applications
    • GraphSM 2018, The Fifth International Workshop on Large-scale Graph Analysis, Management and Applications
  • SIGNAL 2018, The Third International Conference on Advances in Signal, Image and Video Processing

BioSciencesWorld 2018
May 20 - 24, 2018 - Nice, France

  • BIOTECHNO 2018, The Tenth International Conference on Bioinformatics, Biocomputational Systems and Biotechnologies
  • BIONATURE 2018, The Ninth International Conference on Bioenvironment, Biodiversity and Renewable Energies

DataSys 2018
July 22 - 26, 2018- Barcelona, Spain

  • AICT 2018, The Fourteenth Advanced International Conference on Telecommunications
  • ICIW 2018, The Thirteenth International Conference on Internet and Web Applications and Services
  • ICIMP 2018, The Thirteenth International Conference on Internet Monitoring and Protection
  • SMART 2018, The Seventh International Conference on Smart Cities, Systems, Devices and Technologies
  • IMMM 2018, The Eighth International Conference on Advances in Information Mining and Management
  • INFOCOMP 2018, The Eighth International Conference on Advanced Communications and Computation
    • MODOPT 2018, The International Symposium on Modeling and Optimization
  • MOBILITY 2018, The Eighth International Conference on Mobile Services, Resources, and Users
  • SPWID 2018, The Fourth International Conference on Smart Portable, Wearable, Implantable and Disability-oriented Devices and Systems
  • ACCSE 2018, The Third International Conference on Advances in Computation, Communications and Services

(to be completed)

 


ThinkMind // SECURWARE 2013, The Seventh International Conference on Emerging Security Information, Systems and Technologies

Type: conference

Download: SECURWARE 2013 cover page

Download: SECURWARE 2013 foreword page

Download: SECURWARE 2013 committee page

Download: SECURWARE 2013 table of contents

Download: SECURWARE 2013 full proceedings

Notes: IARIA Conference.

Editors:
Hans-Joachim Hof, Munich University of Applied Sciences, Germany
Carla Westphall, Federal University of Santa Catarina, Brazil

Event editions: - there are 7 editions.

ISSN: 2162-2116

ISBN: 978-1-61208-298-1

Location: Barcelona, Spain

Dates: from August 25, 2013 to August 31, 2013

Articles: there are 25 articles

Identifying Suitable Attributes for Security and Dependability Metrication
Erland Jonsson and Laleh Pirzadeh
keywords: security and dependability metrics; security and dependability modelling; protective metrics; behavioural metrics

Risk-based Dynamic Access Control for a Highly Scalable Cloud Federation
Daniel Ricardo dos Santos, Carla Merkle Westphall, and Carlos Becker Westphall
keywords: cloud computing; access control; risk; cloud federation

Towards a Policy-Framework for the Deployment and Management of Cloud Services
Tim Waizenegger, Matthias Wieland, Tobias Binz, Uwe Breitenbuecher, and Frank Leymann
keywords: Cloud Computing; Security; Policy-Framework; TOSCA; Cloud Service; Cloud Management

Implementation of Trust Metrics in X.509 Public Key Infrastructure
Lucas Martins and Ricardo Custódio
keywords: PKI; Trust; Certificate; Metrics; Calculation; X.509; ASN.1; Hierarchy.

Secure and Fast PIN-entry Method for 3D Display
Mun-Kyu Lee and Hyeonjin Nam
keywords: personal identification number, authentication, smart device, 3D display

Privacy-Preserving SVM Classification using Non-metric MDS
Khaled Alotaibi and Beatriz de la Iglesia
keywords: Privacy; Classification; Data Perturbation; SVM

Security and Confidentiality Solutions for Public Cloud Database Services
Luca Ferretti, Fabio Pierazzi, Michele Colajanni, and Mirco Marchetti
keywords: Cloud, Database, Confidentiality, Adaptivity, Encryption

Active Shield with Electrically Configurable Interconnections
Umut Guvenc
keywords: active shield; secure IC; cryptography; physical attack countermeasure

BSPL: A Language to Specify and Compose Fine-grained Information Flow Policies
Valérie Viet Triem Tong and Ludovic Mé
keywords: Information flow policies, specification language, composition of information flow policies

Firewalls Usability: An Experiment Investigating the Usability of Personal Firewalls
Bander ALFayyadh, Mohammed AlZomai, and Audun Jøsang
keywords: Usability; Security; Firewalls

User Authentication Method with Mobile Phone as Secure Token
Ryu Watanabe and Yutaka Miyake
keywords: authentication SIM identity management

The All-Seeing Eye: A Massive-Multi-Sensor Zero-Configuration Intrusion Detection System for Web Applications
Christoph Pohl and Hans-Joachim Hof
keywords: intrusion detection, sensor, brute force, timing

Incremental Certification of Cloud Services
Maria Krotsiani, George Spanoudakis, and Khaled Mahbub
keywords: cloud services; security certification; continuous monitoring

Detecting Social-Network Bots Based on Multiscale Behavioral Analysis
Francisco Brito, Ivo Petiz, Paulo Salvador, António Nogueira, and Eduardo Rocha
keywords: Facebook user behavior, Human social-networking behavior, social-network bots, bot detection, Facebook interactions model

Policy-Aware Provisioning of Cloud Applications
Uwe Breitenbücher, Tobias Binz, Oliver Kopp, Frank Leymann, and Matthias Wieland
keywords: Cloud Applications; Provisioning; Security; Policies

Fighting Spam by Breaking the Economy of Advertising by Unsolicited Emails
Alexander Schmidtke and Hans-Joachim Hof
keywords: spam; unsolicited email; peer-to-peer; security

Smurf Security Defense Mechanism with Split-protocol
Harold Ramcharan and Bharat Rawal
keywords: Split Protocol; Protocol splitting; DoS; Tribal Flood Network; Bare Machine Computing

Distinguishing Legitimate and Fake/Crude Antivirus Software
Masaki Kasuya and Kenji Kono
keywords: Antivirus Software; Fake Antivirus Software; Behavior Analysis; Malware

Behavior Risk: the Indefinite Aspect at the Stuxnet Attack?
Wolfgang Boehmer
keywords: Event risks; behavioral risks; trust/investor game; IT security concept; industrial control system

CAVEAT: Facilitating Interactive and Secure Client-Side Validators for Ruby on Rails applications
Timothy Hinrichs, Michael Cueno, Daniel Ruiz, Venkat Venkatakrishnan, and Lenore Zuck
keywords: Web applications, Data validation, Frameworks

Need Only One Bit: Light-weight Packet Marking for Detecting Compromised Nodes in WSNs
Yuichi Sei and Akihiko Ohsuga
keywords: Wireless sensor networks; Security; Compromised node detection.

Secure Distributed System inspired by Ant Colonies for Road Traffic Management in Emergency Situations
Alberto Peinado, Andres Ortiz, and Jorge Munilla
keywords: security;emergency;reputation lists;ant colonies; road traffic;RFID;VANET;robotic vehicles

Efficient Image Encryption and Authentication Scheme Based on Chaotic Sequences
Mousa Farajallah, Zeinab Fawaz, Safwan El Assad, and Olivier Deforges
keywords: Chaos-based cryptosystem; Image encryption/authentication algorithm; Chaoti cgenerator; security analysis.

Propagation of Truncated Differentials in GOST
Nicolas Courtois and Theodosis Mourouzis
keywords: differential cryptanalysis, block ciphers, GOST, Sboxes, diffusion, optimization problems, truncated differentials, aggregated differentials

PP-2 Block Cipher
Krzysztof Bucholc, Krzysztof Chmiel, Anna Grocholewska-Czurylo, and Janusz Stoklosa
keywords: block ciphers; S-boxes; differential cryptanalysis; diffusion

SERVICES CONTACT
2010 - 2017 © ThinkMind. All rights reserved.
Read Terms of Service and Privacy Policy.