Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Cheng, Zi-Yao
,
Yun Liu
,
Chin-Chen Chang
, and
Chen-Xu Liu
.
"
A Novel Biometric-Based Remote User Authentication Scheme Using Quadratic Residues
."
International Journal of Information and Electronics Engineering
3, no. 4 (2013).
Amin, Ruhul
,
SK Hafizul Islam
,
Arijit Karati
, and
G. P. Biswas
.
"
Design of an enhanced authentication protocol and its verification using AVISPA
." In
3rd International Conference on Recent Advances in Information Technology (RAIT)
. Dhanbad, India , 2016.
Park, Hyun-A
,
JaeHyun Park
,
JaeTark Choi
, and
DongHoon Lee
.
Toward an integrated system between cloud computing and smartcard application
In
5th International Conference on Computer Sciences and Convergence Information Technology
. Seoul, South Korea , 2010.
Jali, Mohd Zalisham
,
Shaharudin Ismail
, and
Zul Hilmi Abdullah
.
"
An Assessment on the Password Practices Among Students
."
Journal of Theoretical and Applied Information Technology
66, no. 3 (2014).
Cheng, Zi-Yao
,
Yun Liu
,
Chin-Chen Chang
, and
Shih-Chang Chang
.
An Improved Protocol for Password Authentication Using Smart Cards
., 2011.
Gaurav, Jayesh
,
Sanjive Tyagi
, and
Jayanthi Ranjan
.
"
Smart Card Fraud Prevention Scheme Using Fingerprinting Authentication
."
International Journal of Computer Science and Information Technologies
3, no. 1 (2012): 3059-3062.
Hadi, Raghad Mohammed
.
"
Security protocol for a remote user authentication system over unsecure network
."
Science articles exchange (مقالات العلوم الصرف)
18, no. 76 (2012).
Kumari, Anju
,
Deepti Tamhane
,
Komal Rani
, and
Ashwini Walunj
.
"
Credit Card Fraud Detection Using Biometric Fingerprint Authentication
."
IJSART
4, no. 12 (2018).
Ali, Muhammad Helmi
, and
Eddie Shahril Ismail
.
"
Password authentication scheme based on the quadratic residue problem
."
AIP Conference Proceedings
1830, no. 1 (2017).
Gaydarski, Ivan
, and
Zlatogor Minchev
.
Modelling, Analysis, Experimental Validation and Verification of Information Security Systems in Corporate Environment
In
IT4Sec Reports
. Sofia: Institute of Information and Communication Technologies, 2019.
Dang, Tran Khanh
.
"
Ensuring Correctness, Completeness, and Freshness for Outsourced Tree-Indexed Data
." In
Information Resources Management: Concepts, Methodologies, Tools and Applications
, 693-710. IGI Global, 2010.
Nguyen, Viet Hung
, and
Tran Khanh Dang
.
"
A Novel Solution to Query Assurance Verification for Dynamic Outsourced XML Databases
."
Journal of Software
3, no. 4 (2008).
Nguyen, Viet Hung
,
Tran Khanh Dang
,
Nguyen Thanh Son
, and
Josef Kung
.
"
Query Assurance Verification for Dynamic Outsourced XML Databases
." In
The Second International Conference on Availability, Reliability and Security (ARES'07)
. Vienna, Austria , 2007.
Wohlgemuth, Sven
,
Isao Echizen
, and
Noboru Sonehara
.
"
On Privacy-compliant Disclosure of Personal Data to Third Parties using Digital Watermarking
."
Journal of Information Hiding and Multimedia Signal Processing
2, no. 3 (2011).
Dang, Tran Khanh
.
"
Security Issues in Outsourced XML Databases
." In
Open and Novel Issues in XML Database Applications: Future Directions and Advanced Technologies
, 231-261. IGI Global, 2009.
Dang, Tran Khanh
, and
Nguyen Thanh Son
.
"
Providing Query Assurance for Outsourced Tree-Indexed Data
." In
Modeling, Simulation and Optimization of Complex Processes
. Berlin, Heidelberg: Springer, 2008.
Heurix, Johannes
, and
Thomas Neubauer
.
"
On the Security of Outsourced and Untrusted Databases
." In
IEEE/ACIS 9th International Conference on Computer and Information Science
. Yamagata, Japan , 2010.
Raybourn, Tracey
.
Bucketization Techniques for encrypted databases: Quantifying the impact of Query Distributions
In
Graduate College of Bowling Green State University
. Vol. Master of Science., 2013.
Zhang, Yong Hua
.
"
Anonymity Query Method of Outsourced Database
."
Advanced Materials Research
798-799 (2013): 837-841.
.W.T.Ngai, E
,
,
Y.H.Wong
,
, and
.
"
The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literature
."
Decision Support Systems
50, no. 3 (2011): 559-569.
T.S.Quah, Jon
, and
M.Sriganesh
.
"
Real-time credit card fraud detection using computational intelligence
."
Expert Systems with Applications
35, no. 4 (2008): 1721-1732.
Van Vlasselaer, Véronique
,
Cristián Bravo
,
Olivier Caelen
,
Tina Eliassi-Rad
,
Leman Akoglu
,
Monique Snoeck
, and
Bart Baesens
.
"
APATE: A novel approach for automated credit card transaction fraud detection using network-based extensions
."
Decision Support Systems
75 (2015): 38-48.
Delamaire, L.
,
HAH Abdou
, and
J. Pointon
.
"
Credit card fraud and detection techniques : a review
."
Banks and Bank Systems
4, no. 2 (2009): 57-68.
Abdallah, Aisha
,
Mohd Aizaini Maarof
, and
Anazida Zainal
.
"
Fraud detection system: A survey
."
Journal of Network and Computer Applications
68 (2016): 90-113.
Zareapoor, Masoumeh
,
K.R. Seeja
, and
M.Afshar.Alam
.
"
Analysis of Credit Card Fraud Detection Techniques: based on Certain Design Criteria
."
International Journal of Computer Applications (0975 – 8887)
52, no. 3 (2012).
Pages
« първа
‹ предишна
…
347
348
349
350
351
352
353
354
355
…
следваща ›
последна »
471010 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all