InfoSys 2023 Congress
March 13, 2023 to March 17, 2023 - Barcelona, Spain

  • ICNS 2023, The Nineteenth International Conference on Networking and Services
  • ICAS 2023, The Nineteenth International Conference on Autonomic and Autonomous Systems
  • ENERGY 2023, The Thirteenth International Conference on Smart Grids, Green Communications and IT Energy-aware Technologies
  • WEB 2023, The Eleventh International Conference on Building and Exploring Web Based Environments
  • DBKDA 2023, The Fifteenth International Conference on Advances in Databases, Knowledge, and Data Applications
  • SIGNAL 2023, The Eighth International Conference on Advances in Signal, Image and Video Processing
  • BIOTECHNO 2023, The Fifteenth International Conference on Bioinformatics, Biocomputational Systems and Biotechnologies

InfoWare 2023 Congress
March 13, 2023 to March 17, 2023 - Barcelona, Spain

  • ICCGI 2023, The Eighteenth International Multi-Conference on Computing in the Global Information Technology
  • ICWMC 2023, The Nineteenth International Conference on Wireless and Mobile Communications
  • VEHICULAR 2023, The Twelfth International Conference on Advances in Vehicular Systems, Technologies and Applications
  • INTERNET 2023, The Fifteenth International Conference on Evolving Internet
  • COLLA 2023, The Thirteenth International Conference on Advanced Collaborative Networks, Systems and Applications
  • INTELLI 2023, The Twelfth International Conference on Intelligent Systems and Applications
  • VISUAL 2023, The Eighth International Conference on Applications and Systems of Visual Paradigms
  • HUSO 2023, The Ninth International Conference on Human and Social Analytics
  • BRAININFO 2023, The Eighth International Conference on Neuroscience and Cognitive Brain Information

NexComm 2023 Congress
April 24, 2023 to April 28, 2023 - Venice, Italy

  • ICDT 2023, The Eighteenth International Conference on Digital Telecommunications
  • SPACOMM 2023, The Fifteenth International Conference on Advances in Satellite and Space Communications
  • ICN 2023, The Twenty-Second International Conference on Networks
  • ICONS 2023, The Eighteenth International Conference on Systems
  • MMEDIA 2023, The Fifteenth International Conference on Advances in Multimedia
  • PESARO 2023, The Thirteenth International Conference on Performance, Safety and Robustness in Complex Systems and Applications
  • CTRQ 2023, The Sixteenth International Conference on Communication Theory, Reliability, and Quality of Service
  • ALLDATA 2023, The Ninth International Conference on Big Data, Small Data, Linked Data and Open Data
  • SOFTENG 2023, The Ninth International Conference on Advances and Trends in Software Engineering

DigitalWorld 2023 Congress
April 24, 2023 to April 28, 2023 - Venice, Italy

  • ICDS 2023, The Seventeenth International Conference on Digital Society
  • ACHI 2023, The Sixteenth International Conference on Advances in Computer-Human Interactions
  • GEOProcessing 2023, The Fifteenth International Conference on Advanced Geographic Information Systems, Applications, and Services
  • eTELEMED 2023, The Fifteenth International Conference on eHealth, Telemedicine, and Social Medicine
  • eLmL 2023, The Fifteenth International Conference on Mobile, Hybrid, and On-line Learning
  • eKNOW 2023, The Fifteenth International Conference on Information, Process, and Knowledge Management
  • ALLSENSORS 2023, The Eighth International Conference on Advances in Sensors, Actuators, Metering and Sensing
  • SMART ACCESSIBILITY 2023, The Eighth International Conference on Universal Accessibility in the Internet of Things and Smart Environments

DataSys 2023 Congress
June 26, 2023 to June 30, 2023 - Nice, Saint-Laurent-du-Var, France

  • AICT 2023, The Nineteenth Advanced International Conference on Telecommunications
  • ICIW 2023, The Eighteenth International Conference on Internet and Web Applications and Services
  • ICIMP 2023, The Eighteenth International Conference on Internet Monitoring and Protection
  • SMART 2023, The Twelfth International Conference on Smart Cities, Systems, Devices and Technologies
  • IMMM 2023, The Thirteenth International Conference on Advances in Information Mining and Management
  • INFOCOMP 2023, The Thirteenth International Conference on Advanced Communications and Computation
  • MOBILITY 2023, The Thirteenth International Conference on Mobile Services, Resources, and Users
  • SPWID 2023, The Ninth International Conference on Smart Portable, Wearable, Implantable and Disability-oriented Devices and Systems
  • ACCSE 2023, The Eighth International Conference on Advances in Computation, Communications and Services

ComputationWorld 2023 Congress
June 26, 2023 to June 30, 2023 - Nice, Saint-Laurent-du-Var, France

  • SERVICE COMPUTATION 2023, The Fifteenth International Conference on Advanced Service Computing
  • CLOUD COMPUTING 2023, The Fourteenth International Conference on Cloud Computing, GRIDs, and Virtualization
  • FUTURE COMPUTING 2023, The Fifteenth International Conference on Future Computational Technologies and Applications
  • COGNITIVE 2023, The Fifteenth International Conference on Advanced Cognitive Technologies and Applications
  • ADAPTIVE 2023, The Fifteenth International Conference on Adaptive and Self-Adaptive Systems and Applications
  • CONTENT 2023, The Fifteenth International Conference on Creative Content Technologies
  • PATTERNS 2023, The Fifteenth International Conference on Pervasive Patterns and Applications
  • COMPUTATION TOOLS 2023, The Fourteenth International Conference on Computational Logics, Algebras, Programming, Tools, and Benchmarking
  • BUSTECH 2023, The Thirteenth International Conference on Business Intelligence and Technology

NetWare 2023 Congress
September 25, 2023 to September 29, 2023 - Porto, Portugal

  • SENSORCOMM 2023, The Seventeenth International Conference on Sensor Technologies and Applications
  • SENSORDEVICES 2023, The Fourteenth International Conference on Sensor Device Technologies and Applications
  • SECURWARE 2023, The Seventeenth International Conference on Emerging Security Information, Systems and Technologies
  • AFIN 2023, The Fifteenth International Conference on Advances in Future Internet
  • CENICS 2023, The Sixteenth International Conference on Advances in Circuits, Electronics and Micro-electronics
  • ICQNM 2023, The Seventeenth International Conference on Quantum, Nano/Bio, and Micro Technologies
  • FASSI 2023, The Ninth International Conference on Fundamentals and Advances in Software Systems Integration
  • GREEN 2023, The Eighth International Conference on Green Communications, Computing and Technologies

NexTech 2023 Congress
September 25, 2023 to September 29, 2023 - Porto, Portugal

  • UBICOMM 2023, The Seventeenth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies
  • ADVCOMP 2023, The Seventeenth International Conference on Advanced Engineering Computing and Applications in Sciences
  • SEMAPRO 2023, The Seventeenth International Conference on Advances in Semantic Processing
  • AMBIENT 2023, The Thirteenth International Conference on Ambient Computing, Applications, Services and Technologies
  • EMERGING 2023, The Fifteenth International Conference on Emerging Networks and Systems Intelligence
  • DATA ANALYTICS 2023, The Twelfth International Conference on Data Analytics
  • GLOBAL HEALTH 2023, The Twelfth International Conference on Global Health Challenges
  • CYBER 2023, The Eighth International Conference on Cyber-Technologies and Cyber-Systems

TrendNews 2023 Congress
September 25, 2023 to September 29, 2023 - Porto, Portugal

  • CORETA 2023, Advances on Core Technologies and Applications
  • DIGITAL 2023, Advances on Societal Digital Transformation

SocSys 2023 Congress
November 13, 2023 to November 17, 2023 - Valencia, Spain

SoftNet 2023 Congress
November 13, 2023 to November 17, 2023 - Valencia, Spain

  • ICSEA 2023, The Eighteenth International Conference on Software Engineering Advances
  • ICSNC 2023, The Eighteenth International Conference on Systems and Networks Communications
  • CENTRIC 2023, The Sixteenth International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services
  • VALID 2023, The Fifteenth International Conference on Advances in System Testing and Validation Lifecycle
  • SIMUL 2023, The Fifteenth International Conference on Advances in System Simulation
  • SOTICS 2023, The Thirteenth International Conference on Social Media Technologies, Communication, and Informatics
  • INNOV 2023, The Twelfth International Conference on Communications, Computation, Networks and Technologies
  • HEALTHINFO 2023, The Eighth International Conference on Informatics and Assistive Technologies for Health-Care, Medical Support and Wellbeing

IARIA Congress 2023, The 2023 IARIA Annual Congress on Frontiers in Science, Technology, Services, and Applications
November 13, 2023 to November 17, 2023 - Valencia, Spain

 

 


ThinkMind // SECURWARE 2015, The Ninth International Conference on Emerging Security Information, Systems and Technologies

Type: conference

Download: SECURWARE 2015 cover page

Download: SECURWARE 2015 foreword page

Download: SECURWARE 2015 committee page

Download: SECURWARE 2015 table of contents

Download: SECURWARE 2015 full proceedings

Notes: IARIA Conference.

Editors:
Rainer Falk, Siemens AG - München, Germany
Carla Merkle Westphall, Federal University of Santa Catarina, Brazil
Hans-Joachim Hof, Munich University of Applied Sciences, Germany

Event editions: - there are 12 editions.

ISSN: 2162-2116

ISBN: 978-1-61208-427-5

Location: Venice, Italy

Dates: from August 23, 2015 to August 28, 2015

Articles: there are 31 articles

Risk Assessment Quantification in Hybrid Cloud Configuration
Shigeaki Tanimoto, Tsutomu Konosu, Motoi Iwashita, Hiroyuki Sato, and Atsushi Kanai
keywords: Risk Assessment; Hybrid Cloud Configuration; Risk Matrix; Risk Value Formula; Information Security Management System (ISMS)

Network Security Incident Detection Based on Network Topology Patterns
Juris Viksna, Karlis Freivalds, Mikus Grasmanis, Peteris Rucevskis, Baiba Kaskina, and Varis Teivans
keywords: Network security; Data visualization; Graph topology patterns

Traffic Management and Access Control in Space Experiment “Kontur-2”
Vladimir Muiukha, Vladimir Zaborovsky, Alexander Ilyashenko, and Alexander Silinenko
keywords: space experiment; access control; traffic management; virtual connection

Secure Scrum: Development of Secure Software with Scrum
Christoph Pohl and Hans-Joachim Hof
keywords: Secure Scrum; Security; Secure Software Development; Software Security; SDL

Enhanced Authenticated Encryption Scheme
Jamal Azzam
keywords: encryption ; decryption ; hash function ; secret key

New Directions in Applying Physical Unclonable Functions
Rainer Falk and Steffen Fries
keywords: physical unclonable function; key extraction; embedded security; licensing; configuration integrity

The Random Gate Principle
Sheagan John and Curtis Busby-Earle
keywords: algorithm; encryption; gate; symmetric

Comparison of the PM-DC-LM Mode with the Other Common Block Cipher Modes of Operation
Petr Zacek, Roman Jasek, and David Malanik
keywords: cryptography; block cipher; mode of operation; PM-DC-LM; polymorphism; deterministic chaos; logistic map

An Improved Threshold Proxy Signature Scheme
Akanksha Gupta, Prakash D. Vyavahare, and Manish Panchal
keywords: Proxy signature, Threshold signature, secret sharing, RSA

The Use of Acceptance Test-Driven Development in the Construction of Cryptographic Software
Alexandre Braga, Daniela Schwab, and André Vannucci
keywords: BDD; TDD; ATDD; User stories; Security; Test vectors; Cryptography; Assurance

Secret Sharing Schemes Threshold Determination
Armindo Guerra Jr. and Ricardo Felipe Custodio
keywords: Secret Sharing, threshold, information

Enterprise Security Metrics with the ADVISE Meta Model Formalism
Ken Keefe, Brett Feddersen, William Sanders, Carol Muehrcke, Donald Parks, Andrew Crapo, Alfredo Gabaldon, and Ravi Palla
keywords: Quantitative Security Analysis; State-based Security Model; Discrete Event Simulation; Adversary Behavior Model

Implementation Issues in the Construction of an Application Framework for Secure SMS Messages on Android Smartphones
Alexandre Braga, Romulo Zanco Neto, André Vannucci, and Ricardo Hiramatsu
keywords: SMS; Cryptography; Android; Security

A Review and Analysis on Heartbleed on Italian Websites, a Year Later
Vito Santarcangelo, Giuseppe Oddo, Domenico Di Carlo, Fabrizio Valenti, Imran Tariq, and Claudio Fornaro
keywords: Heartbleed; OpenSSL; Poodle; Freak; Vulnerability.

A Detection and Prevention Algorithm for Single and Cooperative Black hole Attacks in AODV MANETs
Seed Khalil and Noureldien Abdelrahman
keywords: MANET attacks; Black hole attack; Black hole attack detection; single Black hole attack; Cooperative black hole attack.

A Brief Survey of Nonces and Nonce Usage
Geir Køien
keywords: Number-used-once; Nonce; Randomness; Freshness; Timeliness; Uniqueness; Non-repeatability; Cryptographic protocol.

A Model for Conducting Security Assessment within an Organisation
Nor Fatimah Awang and Azizah Abd Manaf
keywords: Web application; vulnerability; security testing; security assessment; penetration testing

Cloud Card Compliance Checklist: An Efficient Tool for Securing Deployment Card Solutions on the Cloud
Hassan El Alloussi, Laila Fetjah, and Abdelhak Chaichaa
keywords: Cloud Computing; PCI-DSS; Card Industry; PCI-SSC; Cloud Computing Alliance (CSA); Cloud Controls Matrix (CCM)

Ceremony Analysis Meets Verifiable Voting: Individual Verifiability in Helios
Taciane Martimiano, Eduardo dos Santos, Maina Olembo, Jean Everson Martina, and Ricardo Alexandre Reinaldo de Moraes
keywords: Voting; Threat models; Security Ceremonies

Mobile Agent Security Using Reference Monitor-based Security Framework
Sandhya Armoogum, Nawaz Mohamudally, and Nimal Nissanke
keywords: Security; Mobile agents; Reference monitor, Trust

An IDS for Browser Hijacking
Diogo Monica and Carlos Ribeiro
keywords: IDS, Browser hijacking, Malicious attack detection, User empowerment

Monitoring of Malware Communication Channels
Radovan Holik and Roman Jašek
keywords: HTTP; DNS; C&C; malware detection

Organic Principles to Counter Malware in Automotive Environments
Robert Altschaffel, Sven Kuhlmann, Jana Dittmann, and Tobias Hoppe
keywords: automotive security; adaptive systems; malware

Apate - A Linux Kernel Module for High Interaction Honeypots
Christoph Pohl, Michael Meier, and Hans-Joachim Hof
keywords: Honeypot; Intrusion Detection; Linux Kernel; Rule Engine

Automatic Human Tracking using Localization of Neighbor Node Calculation
Tappei Yotsumoto, Kozo Tanigawa, Miki Tsuji, Kenichi Takahashi, Takao Kawamura, and Kazunori Sugahara
keywords: Human tracking; Mobile agent; Pan/Tilt/Zoom; Neighbor relation; Localization.

Implementation of a Generic ICT Risk Model using Graph Databases
Stefan Schiebeck, Martin Latzenhofer, Brigitte Palensky, Stefan Schauer, Gerald Quirchmayr, Thomas Benesch, Johannes Göllner, Christian Meurers, and Ingo Mayr
keywords: risk management; APT; ICT security; graph databases; interconnected risk model

Reduction of Neighbor Node Calculations for Automatic Human Tracking System
Miki Tsuji, Tappei Yotsumoto, Kenichi Takahashi, Kozo Tanigawa, Takao Kawamura, and Kazunori Sugahara
keywords: Human tracking; Mobile agent; Pan / Tilt / Zoon; Neighbor relation; Localization

Overview on Security Approaches in Intelligent Transportation Systems
Christoph Ponikwar and Hans-Joachim Hof
keywords: security, security issues, security architectures, VANET, MANET, ITS.

A Novel Financial Instrument to Incentivize Investments in Information Security Controls and Mitigate Residual Risk
Pankaj Pandey and Steven De Haes
keywords: Information Security; Security Economics; Risk Management; Financial Instrument.

You Are Who You Know - Leveraging Webs-of-trust for Authentication in Identity Federations
Bob Hulsebosch, Arnout Van Velzen, Maarten Wegdam, Martijn Oostdijk, Remco Poortinga-van Wijnen, and Joost Van Dijk
keywords: authentication; web-of-trust; level of assurance; attestation service; identity proofing

Different Aproaches to Security Incidents and Proposal of Severity Assessment of Security Incident
Lukas Kralik, Roman Senkerik, and Petr Stipek
keywords: cyber security; security; incident; assessment of severity; ISMS; information security; incident management

SERVICES CONTACT
2010 - 2022 © ThinkMind. All rights reserved.
Read Terms of Service and Privacy Policy.