2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)

14-16 Dec. 2015

Filter Results

Displaying Results 1 - 25 of 106
  • [Front cover]

    Publication Year: 2015, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (46 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2015, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (98 KB)
    Freely Available from IEEE
  • Message to ICITST participants

    Publication Year: 2015, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (99 KB) | HTML iconHTML
    Freely Available from IEEE
  • Contents page

    Publication Year: 2015, Page(s):4 - 9
    Request permission for commercial reuse | PDF file iconPDF (129 KB)
    Freely Available from IEEE
  • Executive committees

    Publication Year: 2015, Page(s):10 - 13
    Request permission for commercial reuse | PDF file iconPDF (141 KB)
    Freely Available from IEEE
  • Keynote speakers

    Publication Year: 2015, Page(s): 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (59 KB)

    Provides an abstract for each of the keynote presentations and may include a brief professional biography of each View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ICITST honorary chair and distinguished keynote speaker: The cyborg experiments

    Publication Year: 2015, Page(s): 15
    Request permission for commercial reuse | PDF file iconPDF (91 KB)
    Freely Available from IEEE
  • Keynote speaker 1: Computer Evolution over the next decade: Fact or fiction?

    Publication Year: 2015, Page(s): 16
    Request permission for commercial reuse | PDF file iconPDF (106 KB)
    Freely Available from IEEE
  • Keynote speaker 2: Swimming against the current — Dealing with ICS cyber threats in the Water Sector

    Publication Year: 2015, Page(s):17 - 18
    Request permission for commercial reuse | PDF file iconPDF (129 KB)
    Freely Available from IEEE
  • Keynote speaker 3: Secure software engineering in the cloud

    Publication Year: 2015, Page(s): 19
    Request permission for commercial reuse | PDF file iconPDF (108 KB)
    Freely Available from IEEE
  • Keynote speaker 4: Socio-technical transitions towards sustainability

    Publication Year: 2015, Page(s): 20
    Request permission for commercial reuse | PDF file iconPDF (114 KB)
    Freely Available from IEEE
  • Keynote speaker 5: Issues in energy harvesting cyber-physical systems

    Publication Year: 2015, Page(s): 21
    Request permission for commercial reuse | PDF file iconPDF (98 KB)
    Freely Available from IEEE
  • PhD and doctorate consortium

    Publication Year: 2015, Page(s):22 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (138 KB) | HTML iconHTML

    Provides an abstract for each of the presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Workshops

    Publication Year: 2015, Page(s): 24
    Request permission for commercial reuse | PDF file iconPDF (47 KB)
    Freely Available from IEEE
  • Workshop 1: Chaos-information hiding and security (C-IHS-2015)

    Publication Year: 2015, Page(s): 25
    Request permission for commercial reuse | PDF file iconPDF (107 KB)
    Freely Available from IEEE
  • Bench-marking of traditional cryptographic algorithms and chaos-based algorithms with DNA operations

    Publication Year: 2015, Page(s):26 - 31
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (645 KB) | HTML iconHTML

    This paper presents a bench-marking analysis between traditional cryptographic algorithms and chaos-based cryptographic schemes with DNA operations. The study consists in the evaluation of the security and performance of each algorithm destined for image encryption purposes based on pre-established criteria which include: the key space, distribution of the cipher image, correlation between pixels,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hash function based on efficient Chaotic Neural Network

    Publication Year: 2015, Page(s):32 - 37
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (579 KB) | HTML iconHTML

    This paper presents an efficient algorithm for constructing a secure Hash function based on Chaotic Neural Network structure. The proposed Hash function includes two main operations: Generation of Neural Network parameters using fast and efficient Chaotic Generator and Iteration of the message through the Chaotic Neural Network. Our theoretical analysis and experimental simulations showed that the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel chaotic generator based on weakly-coupled discrete skewtent maps

    Publication Year: 2015, Page(s):38 - 43
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (439 KB) | HTML iconHTML

    In this paper, we propose a novel pseudo chaotic random number generator based on three weakly-coupled discrete Skew tent maps. Its implementation was performed with C language and finite precision N=32, including a chaotic multiplexing technique. We show that our approach permits to avoid dynamic degradation caused by finite precision in one hand, and to allow emergence from chaos toward randomne... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Chaos-based cryptosystems using dependent diffusion: An overview

    Publication Year: 2015, Page(s):44 - 49
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (800 KB) | HTML iconHTML

    Based on some important properties of chaos, such as ergodicity, quasi-randomness, and high sensitivity to the secret key, chaos is a hot research field in secured communication, and recently a variety of chaos-based cryptosystems have been proposed for achieving the confidentiality of transmitted images over public channels. Most of chaos-based encryption algorithms are based on the Fridrich stru... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Workshop 2: Cloud applications and security (CAS'15)

    Publication Year: 2015, Page(s): 50
    Request permission for commercial reuse | PDF file iconPDF (88 KB)
    Freely Available from IEEE
  • A proposed framework for proactive vulnerability assessments in cloud deployments

    Publication Year: 2015, Page(s):51 - 57
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (230 KB) | HTML iconHTML

    Vulnerability scanners are deployed in computer networks and software to timely identify security flaws and misconfigurations. However, cloud computing has introduced new attack vectors that requires commensurate change of vulnerability assessment strategies. To investigate the effectiveness of these scanners in cloud environments, we first conduct a quantitative security assessment of OpenStack's... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A survey of authentication methods in mobile cloud computing

    Publication Year: 2015, Page(s):58 - 63
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (295 KB) | HTML iconHTML

    Mobile Cloud Computing (MCC) is an emerging technology which attempts to combine the storage and processing resources of cloud environment with the dynamicity and accessibility of mobile devices. Security, particularly authentication, is fast evolving as a focal area in mobile cloud computing research. This paper comprehensively surveys the various authentication mechanisms proposed so far for mob... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Workshop 3: The 7th international workshop on RFID security and cryptography 2015 (RISC'15)

    Publication Year: 2015, Page(s): 64
    Request permission for commercial reuse | PDF file iconPDF (92 KB)
    Freely Available from IEEE
  • Recent advances of smart glass application security and privacy

    Publication Year: 2015, Page(s):65 - 69
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (222 KB) | HTML iconHTML

    The recent developments in technology have led to new emerging wearable devices such as Smart Glasses. Usually, consumer electronics devices are designed for the benefits and functionalities they can provide, and the security aspect is incorporated later. In its core, a Smart Glass is based on components available in modern smartphones. This includes the CPU, Sensors and Operating System. Thus wou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security and privacy framework for ubiquitous healthcare IoT devices

    Publication Year: 2015, Page(s):70 - 75
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (418 KB) | HTML iconHTML

    With the support of the wearable devices, healthcare services started a new phase in serving patients need. The new technology adds more facilities and luxury to the healthcare services, Also changes patients' lifestyles from the traditional way of monitoring to the remote home monitoring. Such new approach faces many challenges related to security as sensitive data get transferred through differe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.