By Topic

2012 International Conference for Internet Technology and Secured Transactions

10-12 Dec. 2012

Filter Results

Displaying Results 1 - 25 of 186
  • [Front cover]

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (15 KB)
    Freely Available from IEEE
  • International Conference for Internet Technology and Secured Transactions (ICITST-2012) [Copyright notice]

    Publication Year: 2012, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (31 KB)
    Freely Available from IEEE
  • Welcome message

    Publication Year: 2012, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (37 KB)
    Freely Available from IEEE
  • Contents page

    Publication Year: 2012, Page(s):4 - 14
    Request permission for commercial reuse | PDF file iconPDF (167 KB)
    Freely Available from IEEE
  • Committees

    Publication Year: 2012, Page(s):15 - 18
    Request permission for commercial reuse | PDF file iconPDF (73 KB)
    Freely Available from IEEE
  • Keynote speakers

    Publication Year: 2012, Page(s): 19
    Request permission for commercial reuse | PDF file iconPDF (16 KB)
    Freely Available from IEEE
  • Keynote speaker 1 [Open Learning and the 3D Web: Applications and Challenges]

    Publication Year: 2012, Page(s): 20
    Request permission for commercial reuse | PDF file iconPDF (106 KB)
    Freely Available from IEEE
  • Keynote speaker 2 [Cybercrime and mobile devices]

    Publication Year: 2012, Page(s): 21
    Request permission for commercial reuse | PDF file iconPDF (66 KB)
    Freely Available from IEEE
  • Keynote speaker 3 [Entropy Maximisation, Queueing and Performance Related Security Trade-offs]

    Publication Year: 2012, Page(s): 22
    Request permission for commercial reuse | PDF file iconPDF (82 KB)
    Freely Available from IEEE
  • Keynote speaker 4: RFID security and cryptography 2012 (RISC'12) workshop [Smart cards, Secure Elements and NFC Security - The Status Quo]

    Publication Year: 2012, Page(s): 23
    Request permission for commercial reuse | PDF file iconPDF (77 KB)
    Freely Available from IEEE
  • Invited speaker: RFID security and cryptography 2012 (RISC'12) workshop [Chaos Based Information Hiding and Security]

    Publication Year: 2012, Page(s): 24
    Request permission for commercial reuse | PDF file iconPDF (73 KB)
    Freely Available from IEEE
  • Workshops

    Publication Year: 2012, Page(s): 25
    Request permission for commercial reuse | PDF file iconPDF (15 KB)
    Freely Available from IEEE
  • Workshop 1 (part I): International workshop on information security, theory and practice (ISTP-2012)

    Publication Year: 2012, Page(s): 26
    Request permission for commercial reuse | PDF file iconPDF (30 KB)
    Freely Available from IEEE
  • Assessing the security of subsampling process using modified EKF and nonlinear least squares methods

    Publication Year: 2012, Page(s):27 - 31
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (774 KB) | HTML iconHTML

    Since the theory of chaos was introduced in cryptography, the use of chaotic dynamical systems to secure communications has been widely investigated, particularly to generate chaotic pseudorandom numbers as cipher-keys. The emergent property of the ultra-weak multidimensional coupling of p one-dimensional dynamical systems lead to randomness preserving chaotic properties of continuous models in nu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic routing in covert channel overlays based on control protocols

    Publication Year: 2012, Page(s):32 - 39
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (999 KB)

    Covert channels aim to carry information in a way prohibited by the security policy and can be used to bypass censorship (e.g. by journalists). To establish secure covert channel communications, overlay networks with internal control protocols can be built. We present a design method for control protocols within covert channels. Our protocol design provides the advantage of space-efficiency (in co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How to guarantee secured transactions with QoS and real-time constraints

    Publication Year: 2012, Page(s):40 - 44
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1648 KB) | HTML iconHTML

    A growing number of systems are highly connected and distributed over the internet. These systems require innovative software services and infrastructures in order to guarantee security and reliability. This issue has a particular relation with a wide range of topics such as real-time scheduling and encryption with Quality of Service constraints which are the main interests of this paper. The prop... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Workshop 1 (part II): International workshop on information security, theory and practice (ISTP-2012)

    Publication Year: 2012, Page(s): 45
    Request permission for commercial reuse | PDF file iconPDF (31 KB)
    Freely Available from IEEE
  • Improved blind DCT watermarking by using chaotic sequences

    Publication Year: 2012, Page(s):46 - 50
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1434 KB) | HTML iconHTML

    This paper proposes a modified blind DCT watermarking method for grayscale images, by the use of chaotic maps. The proposed method is resilient to certain watermarking attacks (compression, filtering, noise addition, cropping etc.) and represents an improvement in terms of security for Zhao et al.'s method. Furthermore, we propose a watermark removal attack, which succeeds against the standard met... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Validating the existence of watermarks on digital images using a mobile phone

    Publication Year: 2012, Page(s):51 - 55
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2011 KB) | HTML iconHTML

    The use of digital watermark in mobile platforms has been recently considered. This paper presents an strategy for watermark detection on digital images using a mobile phone. In the proposed scheme a digital watermark is inserted into an image and can be retrieved after a digital-analog (D/A) and analog-digital (A/D) conversion process. We propose the use of Neyman-Pearson criterion for the select... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Chaotic generator synthesis: Dynamical and statistical analysis

    Publication Year: 2012, Page(s):56 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (681 KB) | HTML iconHTML

    The paper presents a novel chaotic encryption algorithm which can be used to improve the communication security. An uncomplicated process of chaotic substitution permutation network (SPN) with variable control parameters is proposed to form a robust chaotic cryptosystem. A new chaotic generator, firstly proposed by Lozi, is used for this purpose. For the new cryptosystem, the results of the statis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new method to improve cryptographic properties of chaotic discrete dynamical systems

    Publication Year: 2012, Page(s):60 - 65
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1088 KB) | HTML iconHTML

    In this paper, we propose a new method, based on composition of chaotic maps of same type, to ameliorate some shortcomings of using chaotic discrete dynamical systems in cryptographic applications. Such well-known drawbacks are a small keyspace and high predictability of the values generated by the orbits of a single dynamical system. We prove, using some specific tools from chaos theory (such as ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Workshop 2 (part I): The 4th international workshop on RFID security and cryptography 2012 (RISC'12)

    Publication Year: 2012, Page(s): 66
    Request permission for commercial reuse | PDF file iconPDF (28 KB)
    Freely Available from IEEE
  • Chaos Based Information Hiding and Security

    Publication Year: 2012, Page(s):67 - 72
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (681 KB) | HTML iconHTML

    Digital chaotic generators have been investigated for many decades. However, their performances in terms of the tradeoff between security and speed, as well as their use in many systems for secure information, has not been sufficiently addressed and demonstrated. We propose a very efficient digital chaotic generator and we demonstrate its capability to build robust and fast chaos based cryptosyste... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Workshop 2 (part II): The 4th international workshop on RFID security and cryptography 2012 (RISC'12)

    Publication Year: 2012, Page(s): 73
    Request permission for commercial reuse | PDF file iconPDF (30 KB)
    Freely Available from IEEE
  • Detecting counterfeit-money using RFID-enabled mobile devices

    Publication Year: 2012, Page(s):74 - 79
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (685 KB) | HTML iconHTML

    RFID-tags are becoming very fashionable and attractive tools for banknotes authentication and identification. As they have a tiny microchip embedded with other functionalities that can be utilized for security defense. This chip functionality makes it possible to detect and prevent money counterfeiting. RFID-enabled notes can be easily tracked and verified by an authorized party. In this paper, we... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.