Muutke küpsiste eelistusi

E-raamat: Security Technology, Disaster Recovery and Business Continuity: International Conferences, SecTech and DRBC 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings

Edited by , Edited by , Edited by , Edited by , Edited by
  • Formaat - PDF+DRM
  • Hind: 55,56 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Welcome to the proceedings of the 2010 International Conferences on Security Te- nology (SecTech 2010), and Disaster Recovery and Business Continuity (DRBC 2010) two of the partnering events of the Second International Mega-Conference on Future Generation Information Technology (FGIT 2010). SecTech and DRBC bring together researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of security and disaster recovery methodologies, including their links to c- putational sciences, mathematics and information technology. In total, 1,630 papers were submitted to FGIT 2010 from 30 countries, which - cludes 250 papers submitted to SecTech/DRBC 2010. The submitted papers went through a rigorous reviewing process: 395 of the 1,630 papers were accepted for FGIT 2010, while 57 papers were accepted for SecTech/DRBC 2010. Of the 250 papers 10 were selected for the special FGIT 2010 volume published by Springer in the LNCS series. 34 papers are published in this volume, and 13 papers were wi- drawn due to technical reasons. We would like to acknowledge the great effort of the SecTech/DRBC 2010 Int- national Advisory Boards and members of the International Program Committees, as well as all the organizations and individuals who supported the idea of publishing this volume of proceedings, including SERSC and Springer. Also, the success of these two conferences would not have been possible without the huge support from our sponsors and the work of the Chairs and Organizing Committee.
Impact of Finger Type in Fingerprint Authentication
1(7)
Davrondzhon Gafurov
Patrick Bours
Bian Yang
Christoph Busch
Using Arabic CAPTCHA for Cyber Security
8(10)
Bilal Khan
Khaled S. Alghathbar
Muhammad Khurram Khan
Abdullah M. AlKelabi
Abdulaziz AlAjaji
Information Assurance in Saudi Organizations - An Empirical Study
18(11)
Syed Irfan Nabi
Abdulrahman A. Mirza
Khaled Alghathbar
Emerging Biometric Modalities: Challenges and Opportunities
29(10)
Davrondzhon Gafurov
On Distinguished Points Method to Implement a Parallel Collision Search Attack on ECDLP
39(8)
Ju-Sung Kang
Ok-Yeon Yi
Data Confidentiality and Integrity Issues and Role of Information Security Management Standard, Policies and Practices - An Empirical Study of Telecommunication Industry in Pakistan
47(10)
Syed Irfan Nabi
Syed Waqar Nabi
Syed Awais Ahmed Tipu
Bushra Haqqi
Zahra Abid
Khaled Alghathbar
Evaluation of Performance of Secure OS Using Performance Evaluation Mechanism of LSM-Based LSMPMON
57(11)
Kenji Yamamoto
Toshihiro Yamauchi
Sample Bytes to Protect Important Data from Unintentional Transmission in Advanced Embedded Device
68(6)
Bo-Heung Chung
Jung-Nye Kim
Secure OSGi Platform against Service Injection
74(10)
Intae Kim
Keewook Rim
Junghyun Lee
A Mechanism That Bounds Execution Performance for Process Group for Mitigating CPU Abuse
84(10)
Toshihiro Yamauchi
Takayuki Hara
Hideo Taniguchi
Probabilistic Route Selection Algorithm for IP Traceback
94(10)
Hong-Bin Yim
Jae-Il Jung
An Efficient Audio Watermarking Algorithm in Frequency Domain for Copyright Protection
104(10)
Pranab Kumar Dhar
Mohammad Ibrahim Khan
Cheol-Hong Kim
Jong-Myon Kim
Robust Audio Watermarking Scheme Based on Deterministic Plus Stochastic Model
114(12)
Pranab Kumar Dhar
Cheol Hong Kim
Jong-Myon Kim
Histogram-Based Reversible Data Hiding with Quadtree Concepts
126(8)
Hsiang-Cheh Huang
Ting-Hsuan Wang
Wai-Chi Fang
MAS: Malware Analysis System Based on Hardware-Assisted Virtnalization Technology
134(8)
Taehyoung Kim
Inhyuk Kim
Changwoo Mm
Young Ik Eom
Performance Analysis of Cyber Security Awareness Delivery Methods
142(7)
Jemal Abawajy
Tai-Hoon Kim
Proxy Re-encryption with Keyword Search: New Definitions and Algorithms
149(12)
Wei-Chuen Yau
Raphael C.-W. Phan
Swee-Huay Heng
Bok-Min Got
One-Time Password System with Infinite Nested Hash Chains
161(10)
Mohamad Hamdy Eldefrawy
Muhammad Khurram Khan
Khalcd Alghathbar
Optimal Intelligent Supervisory Control System in Cyber-Plrysical Intelligence
171(8)
Hoon Ko
Zita Vule
Improved Hip-Based Individual Recognition Using Wearable Motion Recording Sensor
179(8)
Davrondzhon Gafurov
Patrick Bours
Fusion of Moving and Static Facial Features for Robust Face Recognition
187(10)
Dakshina Ranjan Kisku
Phalguni Gupta
Jamuna Kanta Sing
Human Authentication Based on ECG Waves Using Radon Transform
197(10)
Chetana Hegde
H. Rahul Prabhu
D.S. Sagar
P. Deepa Shenoy
K.R. Venugopal
L.M. Patnaik
Wireless Network Security Vulnerabilities and Concerns
207(13)
Ahmad Mushtaq
Figment Authentication Scheme in Wireless Sensor Network
220(4)
N. Ambika
G.T. Raju
Issues of Security and Network Load in Presence - A Survey
224(7)
Zeeshan Shafi Khan
Khaled Alghathbar
Muhammad Sher
Khalid Rashid
Discovering the Botnet Detection Techniques
231(5)
Aneel Rahim
Fahad T. Bin Muhaya
Contactless Biometrics in Wireless Sensor Network: A Survey
236(8)
Muhammad Imran Razzak
Muhammad Khurram Khan
Khaled Alghathbar
A Generic Approach to Security Assured Net-Centric Communications Network Architecture for C4I Systems
244(6)
Abdullah S. Alghamdi
Syed Amanullah Quadri
Iftikhar Ahmad
Khalid Al-Nafjan
Collaborative Geospatial Data as Applied to Disaster Relief: Haiti 2010
250(9)
A.J. Clark
Patton Holliday
Robyn Chau
Harris Eisenberg
Melinda Chau
Effects of Changes in Lugu Lake Water Quality on Schizothorax Yunnansis Ecological Habitat Based on HABITAT Model
259(10)
Wei Huang
Arthur Mynnet
Internet SCADA Utilizing API's as Data Source
269(7)
Rosslin John Robles
Haeng-Kon Kim
Tai-Hoon Kim
Insecure Information System's Solution Using Isolation Method
276(6)
Maricel Balilanas
Tai-Hoon Kim
Communication Security for Control Systems in Smart Grid
282(8)
Rosslin John Robles
Tai-Hoon Kim
NMACA Approach Used to Build a Secure Message Authentication Code
290(9)
Raed Alosaimy
Khaled Alghathbar
Alaaeldin M. Hafez
Mohamed H. Eldefrawy
Author Index 299