ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
2015 5th International Conference on IT Convergence and Security (ICITCS)
Latest Publications
TOTAL DOCUMENTS
119
(FIVE YEARS 0)
H-INDEX
6
(FIVE YEARS 0)
Published By IEEE
9781467365376
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Towards an Effective Modelling and Development of Educational Games with Subject-Matter: A Multi-Domain Framework
2015 5th International Conference on IT Convergence and Security (ICITCS)
◽
10.1109/icitcs.2015.7293027
◽
2015
◽
Cited By ~ 1
Author(s):
Mifrah Ahmad
◽
Lukman Ab. Rahim
◽
Noreen Izza Arshad
Keyword(s):
Subject Matter
◽
Educational Games
Download Full-text
A New Colour Image Watermarking Technique Using Special Domain
2015 5th International Conference on IT Convergence and Security (ICITCS)
◽
10.1109/icitcs.2015.7292922
◽
2015
◽
Author(s):
Abdulmawla M. A. Najih
◽
Syed Abdul Rahman Al-Haddad
◽
Abd Rahman Ramli
◽
Shaiful Jahari Hashim
Keyword(s):
Image Watermarking
◽
Colour Image
◽
Special Domain
Download Full-text
Optimization Model of Information Flow in Power Grid Engineering Construction Projects Based on Improved DSM
2015 5th International Conference on IT Convergence and Security (ICITCS)
◽
10.1109/icitcs.2015.7293003
◽
2015
◽
Author(s):
A-yong Li
◽
Li-rong Wei
Keyword(s):
Information Flow
◽
Optimization Model
◽
Construction Projects
◽
Power Grid
◽
Engineering Construction
Download Full-text
A Framework of Device Authentication Management in IoT Environments
2015 5th International Conference on IT Convergence and Security (ICITCS)
◽
10.1109/icitcs.2015.7292918
◽
2015
◽
Cited By ~ 2
Author(s):
AHyeon-Ju Park
◽
Hye-Young Kim
◽
Jong-In Lim
Keyword(s):
Authentication Management
Download Full-text
An Efficient ID-Based Mutual Authentication Secure against Privileged-Insider Attack
2015 5th International Conference on IT Convergence and Security (ICITCS)
◽
10.1109/icitcs.2015.7292941
◽
2015
◽
Cited By ~ 2
Author(s):
Song Yi Kim
◽
Hyoseung Kim
◽
Dong Hoon Lee
Keyword(s):
Mutual Authentication
◽
Insider Attack
◽
Privileged Insider Attack
Download Full-text
Occlusion Handling Based on Projective Depth in Object Tracking
2015 5th International Conference on IT Convergence and Security (ICITCS)
◽
10.1109/icitcs.2015.7293000
◽
2015
◽
Author(s):
Hwa-Jin Park
Keyword(s):
Object Tracking
◽
Occlusion Handling
Download Full-text
Generation of Data Warehouse Design Test Cases
2015 5th International Conference on IT Convergence and Security (ICITCS)
◽
10.1109/icitcs.2015.7292985
◽
2015
◽
Cited By ~ 1
Author(s):
Piyaporn Samsuwan
◽
Yachai Limpiyakorn
Keyword(s):
Data Warehouse
◽
Test Cases
◽
Warehouse Design
Download Full-text
ISEK: An Information Security Knowledge Graph for CISP Knowledge System
2015 5th International Conference on IT Convergence and Security (ICITCS)
◽
10.1109/icitcs.2015.7292991
◽
2015
◽
Author(s):
Yuangang Yao
◽
Xing Wang
◽
Xiangjie Meng
◽
Xiaofei Zhang
◽
Bin Li
Keyword(s):
Information Security
◽
Knowledge System
◽
Knowledge Graph
Download Full-text
Software Implementation of a Pairing Function for Public Key Cryptosystems
2015 5th International Conference on IT Convergence and Security (ICITCS)
◽
10.1109/icitcs.2015.7293019
◽
2015
◽
Cited By ~ 1
Author(s):
Yusuke Kanbara
◽
Tadanori Teruya
◽
Naoki Kanayama
◽
Takashi Nishide
◽
Eiji Okamoto
Keyword(s):
Software Implementation
◽
Public Key
◽
Public Key Cryptosystems
◽
Pairing Function
Download Full-text
Adding Advanced Debug Output Features to an Existing OpenGL ES 1.1 Implementation
2015 5th International Conference on IT Convergence and Security (ICITCS)
◽
10.1109/icitcs.2015.7292938
◽
2015
◽
Author(s):
Nakhoon Baek
Keyword(s):
Opengl Es
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close