Your browser does not support JavaScript!

2013 International Conference on Information and Network Security (ICINS 2013)

Buy conference proceeding
(plus tax if applicable)
  • Location: Beijing, China
  • Conference date: 22-24 Nov. 2013
  • ISBN: 978-1-84919-729-8
  • Conference number: CP643
  • The following topics are dealt with: information security; network security; cryptography; cloud computing; intrusion detection; MANET; telecommunication security; and encryption.

1 - 20 of 32 items found

  • Capability analysis and improvement of JFKi anti-DoS
  • Dynamically validate network security based on adaptive control theory
  • Analysis of Technique and Management Requirements in Cloud Computing Process
  • A complex network analysis model for cyberspace survivability
  • Study on Framework of Distributed Key Management for MANETS
  • A Dynamic Artificial Immune-based Intrusion Detection Method using Rough And Fuzzy Set
  • A Lattice-Based Multi-Receiver Signcryption Scheme for Point to Multi-Point Communication
  • A secure and high efficient computerized adaptive testing scheme for computer courses based on identity
  • An Approach for Cross-Domain Access Control Policy Generation from Reputation Evaluation to Trust Management
  • An Efficient and Robust Certificateless Short Signature Scheme
  • Remote mutual password authentication for online payment with the elliptic curve cryptography based key agreement
  • Information security events aggregation with multi party privacy preserving
  • A Method of Feature Selection for Continuous Features Base on Similarity Degrees of Interval Numbers
  • A Variant of BB84 Protocol Based on Quantum Phase
  • Analysis the Montgomery Ladder Algorithm for Elliptic Curves over Ternary Fields
  • Strengthening Dynamic Cell Spreading (DCS) Image Steganography
  • Multi-level web content filter model based on MapReduce
  • An Efficient Massive Evidence Storage and Retrieval Scheme in Encrypted Database
  • FL-LPVG: An approach for anomaly detection based on flow-level limited penetrable visibility graph
  • Achieving Robust Biometric based Access Control Mechanism for Cloud Computing
1 2 | Next >
Items per page 20 | 50 | 100
This is a required field
Please enter a valid email address