A call for papers was issued for the 7th Workshop on E-Learning Security in 2012 (WiKiCFP), 2012) but a list of articles was not available from the
ICITST website.
Owen, "Rep on the block: A next generation reputation system based on the blockchain," in Proceedings of the 10th International Conference for Internet Technology and Secured Transactions (
ICITST '15), pp.
A, "Information security awareness in UAE: A survey paper", In Internet Technology and Secured Transactions (
ICITST), 2010, International Conference for (pp.
Johnson, "Survey of SCADA security challenges and potential attack vectors," in Proceedings of the 2010 International Conference for Internet Technology and Secured Transactions,
ICITST 2010, November 2010.
Wolthusen, "Detecting anomalies in IaaS environments through virtual machine host system call analysis," in Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, (
ICITST '12), pp.
Vidalis, "Cloud Computing: The Impact on Digital Forensic Investigations," International Conference for Internet Technology and Secured Transactions (
ICITST), pp.
Gawanmeh, "Formal modeling and verification of DLK protocol," in Proceedings of the International Conference for Internet Technology and Secured Transactions (
ICITST '11), pp.
Abyaneh, "On the privacy of two tag ownership transfer protocols for RFIDs," in Proceedings of the International Conference for Internet Technology and Secured Transactions (
ICITST '11), pp.
Jassim, "Combining steganography and biometric cryptosystems for secure mutual authentication and key exchange," in Proceedings of the 2013 8th International Conference for Internet Technology and Secured Transactions (
ICITST '13), pp.